Question

1. Discuss and explain network bandwidth and latency issues common to Internet architecture. (Maximum 50 words...

1. Discuss and explain network bandwidth and latency issues common to Internet architecture. (Maximum 50 words to discuss this topic)
2. Discuss and explain the importance of high availability and security within data centers and the primary data center facility components and hardware. (Maximum 50 words to discuss this topic)
3. Discuss and explain basic security concepts related to cloud computing, including Confidentiality, Integrity, Authenticity, Availability, Threat, Vulnerability, Risk, Security Controls, Security Mechanisms, Security Policies. (Maximum 50 words to discuss this topic)
4. Discuss and describe the overlapping trust boundaries security threat and how it results from multiple cloud consumers sharing the same cloud-based IT resources. (Maximum 50 words to discuss this topic)

Text Book: Cloud Computing: Concepts, Technology & Architecture

0 0
Add a comment Improve this question Transcribed image text
Answer #1

1. latency does not affect bandwidth, but insufficient bandwidth can reduce latency, insufficient bandwidth leads to link congestion, that means that the equipment buffers will be full and so some packets will be delayed, waiting for their turn to be sent from those buffers, thus increasing latency.

2.High availability important because to ensure data is readily available in situations like server failover, crash etc when you site fails to load because of problems with your database, you risk losing revenues and data center security is the set of policies,precautions and practices adopted to avoid unauthorized access and manipulation of a data center's resources.

3. Confidentiality something being made accessible only to authorized parties integrity not having been altered by an unauthorized party.availability being accessible and usable during a specified time period. threat is potential security violations that can challenge defenses in an attempt to breach privacy and cause harm. Risk is the possibility of loss or harm arising from performing an activity. security controls are countermeasures used to prevent or respond to security threats and to reduce or avoid risk. vulnerability is a weakness that can be exploited either because it is protected by insufficient security controls, for because existing security controls are overcome by an attack. security mechanisms are components comprising a defensive framework that protect IT resources, information, and services. security policy establishes a set of security rules and regulations.

4. Overlapping trust boundaries. since cloud services often share resources among many different customers great care must be taken in establishing boundaries between them. attackers, or the underlying infrastructure as a way to get access to other customers resources VLANs for each entity provides traffic isolation and is ideal method for mitigating this threat.

Add a comment
Know the answer?
Add Answer to:
1. Discuss and explain network bandwidth and latency issues common to Internet architecture. (Maximum 50 words...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • IN YOUR OWN WORDS. 100 words for each question. read the article attached and answer. Discuss...

    IN YOUR OWN WORDS. 100 words for each question. read the article attached and answer. Discuss the importance of confidentiality, integrity and availability. Discuss some of the pertinent principles in health informatics ethics Based on you information provided on confidentiality, integrity, availability, and ethics, discuss what would you do as the resident physician and explain why. CHAPTER 2 Ethical Decision-Making Guidelines and Tools Jacqueline ). Glover, PhD Scenario 2-A Decision Making for an Adolescent M Learning Objectives After completing this...

  • 1. Data management, device management and network management of IoT is crucial to data integrity and...

    1. Data management, device management and network management of IoT is crucial to data integrity and transmission. T F 2. An IoT application is a set of wireless devices that act together to perform some sensing and control function. Most applications also provide a user interface, such as a mobile app or cloud-based service. In general, each application is deployed independently of any other applications that may be operating in the area and forms its own separate, cryptographically isolated network....

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT