Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Cloud Computing: Analyzing Security Challenges and Solutions - Prof. Trung, Cheat Sheet of Information Technology

Data Security in Cloud ComputingCloud SecurityCost Optimization in Cloud ComputingVirtualization in Cloud Computing

An assignment for a BTEC Level 5 HND Diploma in Computing, focusing on Unit 16: Cloud Computing. It covers the technical challenges and risks in cloud applications, with a focus on security issues. common problems, solutions, and security risks in cloud environments, as well as cost optimization and compliance concerns.

What you will learn

  • What are the challenges of securing virtualized environments in cloud computing?
  • What are the primary security risks in Software-as-a-Service (SaaS) applications?
  • How can businesses optimize costs in cloud computing while maintaining security and compliance?
  • What are the most common technical challenges and risks for cloud applications?
  • How can organizations ensure privacy and security in a cloud computing environment?

Typology: Cheat Sheet

2020/2021

Uploaded on 08/18/2021

pham-nam
pham-nam 🇻🇳

1 document

1 / 37

Toggle sidebar

Related documents


Partial preview of the text

Download Cloud Computing: Analyzing Security Challenges and Solutions - Prof. Trung and more Cheat Sheet Information Technology in PDF only on Docsity! ‘BTEC ASSIGNMENT 2 FRONT SHEET Qualification IBTEC Level 5 HND Diploma in Computing |Unit number and title [Unit 16: Cloud Computing Submission date \Date Received Ist submission |Re-submission Date \Date Received 2nd submission Student Name ILE TRA MY Student ID IBHAF190187 (Class BHAF-2005-2.3 |Assessor name ILE VAN THUAN Student declaration Il certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that making a false declaration is a form of malpractice. Student’s signature Grading grid IP5|P6|P7|P8|M3|M4|D2|D3) 1|Page ‘BTEC 0 Summative Feedback: 0 Resubmission Feedback: Grade: Assessor Signature: Date: Signature & Date: 2|Page Cloud Computing Deploy web app to HEROKU. Li Af sll aa 5|Page Table Contents 1. Necessary tools, environments and techniques for implementation 2. Service Configurations and Deployment 3. Implementation steps eyes 6|Page 1. Necessary tools, environments and techniques for implementation. 7|Page 2. Service Configurations and Deployment © These are service configurations, deployment in terms of cloud services and deployment, such as Heroku, Amazon - EC2 p———wery database. ia “1 Ped tte eas me. 10|Page 2. Service Configurations and Deployment O Sign up & Sign in Heroku Seago) 11|Page SBTEC 2. Service Configurations and Deployment © Successfully log in Heroku Architecture Command Line {) Deployment . & >) Continuous Delivery PHP (©) Language Support Node j ur way with the tools you love PHP ga rr “ Contoso Ltd. =a 12|Page ‘BTEC 3. Implementation steps © Step 1: We need a project = |, 15|Page ‘BTEC 3. Implementation steps © Step 2:Create © On the GITHUB, create 1 a new repo on repo and I named it ATN- GITHUB web. After Successfully creating the repo, scrolling down below GIT will give us the command lines. © Right now, go back to the directory with the project, open GIT BASH and paste those command into GIT BASH. <n |. 16|Page ‘BTEC 3. Implementation steps O Step 3: Push © After successful push, code to the screen will display GITHUB using like this and to see GIT BASH the status of the branch, I type GIT status as ok ==> O Successful =m |, 17|Page 3. Implementation steps © OL Connected to [tem AB0901/ATNweb by @/temd.eoo0. oe aa ra 2 Disconnect. ‘BTEC © When entering the app select Connect to GITHUB. © Click search and connect to ATN-web cr + Pelee ee |. 20|Page ‘BTEC 3. Implementation steps Enable automatic deploys from GitHub Every push to the branch you specify branch is always in.a deployable state and any tests have passed before you push. Learn more here will deploy a new version of this app. Deploys happen automatically: be sure that this Choose a branch to-deploy afigure loy a GitHub branch s will deploy the current state of the branch you specify below. Learn more. Choose a branch to deploy Pp main eeu tet ET Beas 17 21|Page 3. Implementation steps Deploy a GitHub branch rn men This will deploy the curr ‘Choose a branch to deploy PP main $ Lesa ileal Rec 1 Git. @ Build main |efasotss ©) Release phase &) Deploy to Heroku o Your app was successfully doy & view =m |, 22|Page ‘BTEC 3. Implementation steps LIST OF PRODUCTS PRODUCT PORTFOLIO at nh & > Bom 21 25|Page ‘BTEC 3. Implementation steps FOOTER felix 22 26|Page 3. Implementation steps Register Create an Account Chon tép | Khéng <6 tép nao duoc chon r . Pash Ea 23 27|Page ‘BTEC LINK WEBSITE https://atn-web- final.herokuapp.com 26 30|Page ‘BTEC Thank You wa & TRAMY O 03123456789 mytrale01@gmail.com 31|Page ‘BTEC C. LO4 Analyse the technical challenges for cloud applications and assess their risks I. Analyse the most common problems which arise in a Cloud Computing platform and discuss appropriate solutions to these problems (P7) Cloud Challenges Security Managing cloud spend Br Lack of resources/expertise Governance/control Compliance 21% Ee Managing multiple clouds Performance 14% ma ® Significant challenge Building a private cloud ae 33% ™ Somewhat of a challenge Source: RightScale 2018 State of the Cloud Report 1. Security issues - No matter how safe our system is, we should be aware that there is no such thing as a secure system. This increases the cloud computing risks that can arise during the implementation or management of the cloud. Headlines highlighting data breaches, compromised credentials, and broken authentication, hacked interfaces and APIs, account hijacking haven’t helped alleviate concerns. - All of this makes trusting sensitive and proprietary data to a third party hard to stomach for some and, indeed, highlighting the challenges of cloud computing. Luckily as cloud providers and users, mature security capabilities are constantly improving. - To ensure your organization’s privacy and security is intact, verify the SaaS provider has secure user identity management, authentication, and access control mechanisms in place. - The security risks of cloud computing have become a reality for every organization, be it small or large. That’s why it is important to implement a secure BI cloud tool that can leverage proper security measures. 2. Cost management and containment - For the most part cloud computing can save businesses money. In the cloud, an organization can easily ramp up its processing capabilities without making large investments in new hardware. Businesses can instead access extra processing through pay-as-you-go models from public cloud providers. However, the on- demand and scalable nature of cloud computing services make it sometimes difficult to define and predict quantities and costs. 32|Page ° ‘BTEC ° it also exposes the service to additional security risks. The Cloud Security Alliance has released a document that describes the current state of mobile computing and the top threats in this area such as information stealing mobile malware, insecure networks (WiFi), vulnerabilities found in the device OS and official applications, insecure marketplaces, and proximity-based hacking. Virtualization Virtualization allows users to create, copy, share, migrate, and roll back virtual machines, which may allow them to run a variety of applications. However, it also introduces new opportunities for attackers because of the extra layer that must be secured. Virtual machine security becomes as important as physical machine security, and any flaw in either one may affect the other. Virtualized environments are vulnerable to all types of attacks for normal infrastructures; however, security is a greater challenge as virtualization adds more points of entry and more interconnection complexity. Unlike physical servers, VMs have two boundaries: physical and virtual. Shared resource VMs located on the same server can share CPU, memory, I/O, and others. Sharing resources between VMs may decrease the security of each VM. For example, a malicious VM can infer some information about other VMs through shared memory or other shared resources without need of compromising the hypervisor. Using covert channels, two VMs can communicate bypassing all the rules defined by the security module of the VMM. Thus, a malicious Virtual Machine can monitor shared resources without being noticed by its VMM, so the attacker can infer some information about other virtual machines. Virtual machine rollback Furthermore, virtual machines are able to be rolled back to their previous states if an error happens. But rolling back virtual machines can re-expose them to security vulnerabilities that were patched or re-enable previously disabled accounts or passwords. In order to provide rollbacks, we need to make a “copy” (snapshot) of the virtual machine, which can result in the propagation of configuration errors and other vulnerabilities. Virtual networks Network components are shared by different tenants due to resource pooling. As mentioned before, sharing resources allows attackers to launch cross-tenant attacks. Virtual Networks increase the VMs interconnectivity, an important security challenge in Cloud Computing. The most secure way is to hook each VM with its host by using dedicated physical channels. However, most hypervisors use virtual networks to link VMs to communicate more directly and efficiently. For instance, most virtualization platforms such as Xen provide two ways to configure virtual networks: bridged and routed, but these techniques increase the possibility to perform some attacks such as sniffing and spoofing virtual network. Summarry About Security: System security is complex and requires careful investment; not only must we safeguard the system in the internet environment, but we must also protect it in the physical environment. As our lives progress, new technologies and methods of assault will emerge, requiring us to update, maintain, and upgrade our storage systems on a regular basis. Essentially, we must protect 35|Page ° ‘BTEC ° against attacks in both physical and network settings, as well as encrypt data to prevent the attack if it succeeds; the attacker is also improbable. It is feasible to make use of data that has been encrypted. . Conclusion In a nutshell, the above report I gave a way to bring the website to the cloud (Heroku). Besides, I also clearly analyze the common problems of cloud computing and have come up with the most effective way to fix them. 36|Page ‘BTEC F. References Durcevic, S., 2019. Cloud Computing Risks, Challenges & Problems Businesses Are Facing. [online] BI Blog | Data Visualization & Analytics Blog | datapine. Available at: <https://www.datapine.com/blog/cloud-computing-risks-and- challenges/> [Accessed 16 August 2021]. Infocyte. 2021. The Most Common Cloud Security Threats and How to Avoid Them - Infocyte. [online] Available at: <https://www.infocyte.com/blog/2019/12/12/the-most-common-cloud-security- threats-and-how-to-avoid-them/> [Accessed 16 August 2021]. Subashini S, Kavitha V: A survey on Security issues in service delivery models of Cloud Computing. J Netw Comput Appl 2011, 34(1):1-11. 10.1016/j.jnca.2010.07.006. Mell P, Grance T: The NIST definition of Cloud Computing. Gaithersburg, MD: NIST, Special Publication 800-145; 2011. Zhang Q, Cheng L, Boutaba R: Cloud Computing: state-of-the-art and research challenges. Journal of Internet Services Applications 2010, 1(1):7—-18. 10.1007/s13174-010-0007-6 Ertaul L, Singhal S, Gokay S: Security challenges in Cloud Computing. In Proceedings of the 2010 International conference on Security and Management SAM’10. Las Vegas, US: CSREA Press; 2010:36-42. Owens D: Securing elasticity in the Cloud. Commun ACM 2010, 53(6):46-51. 10.1145/1743546.1743565 37|Page
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved