Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

In examining cloud technology, or any technology for that matter, security of th

ID: 3675481 • Letter: I

Question

In examining cloud technology, or any technology for that matter, security of the data is an important consideration. In this assignment, explore methods of managing cloud architecture and ensuring data security. Investigate attacks on the cloud and ways data can be compromised, including the following:

Apply tools to troubleshoot network problems

Use implementation, management, and maintenance skills in network configuration

Discuss emerging topics in network operation and administration

Assignment Guidelines

Research security in cloud computing and explain the security concerns regarding cloud computing.

List and describe at least 2 ways a data attack on the cloud can occur.

What networking tools can you use to ameliorate data attacks on cloud data?

What tools would you use to troubleshoot problems when configuration is an issue?

Choose and investigate one tool used to administer data in the cloud, take a screenshot of the tool, and embed the picture in your document. Provide a detailed analysis of the tool and how it is used.

Give a recommendation on whether companies should use or not use the cloud, based on the security, the management, or any barrier found in using cloud technology.

Explanation / Answer

For managing cloud architecture and ensuring data security, we can go for cloud service providers. There are various cloud service provider companies as given below:

There are various cloud service providers in the market these days. If we talk about the top three of cloud
service provider, then the top three list is as follows:

1) Amazon
2) Google
3) Microsoft

These three are the top in the list in cloud service providers. If we are talking about cloud service then we must
talk about the key features of the cloud service, that are
1) High availability
2) Service on demand
3) Resource sharing and pooling
3) Multi device support

Different Attacks on Cloud
There are various attacks that can affect the cloud. One of the attack can be the injection of malware in cloud. This can be done by the intuder to attack on the client as well over server. Other attacks can be flooding attacks, in which there is flood of messages from cloud to client. The makes the client to behaviour in abnormal way.


Security Handling in Cloud

Cloud security also refer to the information security on the broad level, for securing the cloud data verious set of rules and protocols have been made. One of these rules is cipher creation of the cloud data, that can be done using asymmetric or the symmetric encryption alog's

Network Troubleshooting Tool for Cloud computing

Wireshark is one of the important troubleshooting tool. With wireshark you can take snoop of the traffic data
and with this snoop, you can easily troubleshoot the ip packets and bits which are getting transfered. Snoop
is important in case of packet loss from cloud or in case of network congation.