In examining cloud technology, or any technology for that matter, security of th
ID: 3676497 • Letter: I
Question
In examining cloud technology, or any technology for that matter, security of the data is an important consideration. In this assignment, explore methods of managing cloud architecture and ensuring data security. Investigate attacks on the cloud and ways data can be compromised, including the following:
Apply tools to troubleshoot network problems
Use implementation, management, and maintenance skills in network configuration
Discuss emerging topics in network operation and administration
Assignment Guidelines
Research security in cloud computing and explain the security concerns regarding cloud computing.
List and describe at least 2 ways a data attack on the cloud can occur.
What networking tools can you use to ameliorate data attacks on cloud data?
What tools would you use to troubleshoot problems when configuration is an issue?
Choose and investigate one tool used to administer data in the cloud, take a screenshot of the tool, and embed the picture in your document. Provide a detailed analysis of the tool and how it is used.
Give a recommendation on whether companies should use or not use the cloud, based on the security, the management, or any barrier found in using cloud technology.
Explanation / Answer
Answer:
A )
security concerns regarding cloud computing are given below:
1. Data leakage. You could encrypt your data to reduce the impact of a breach, but if you lose your encryption key, you'll lose your data. However, if you opt to keep offline backups of your data to reduce data loss, you increase your exposure to data breaches.
2. The second-greatest threat in a cloud computing environment, according to CSA, is data loss: the prospect of seeing your valuable data disappear into the ether without a trace. A malicious hacker might delete a target's data out of spite -- but then, you could lose your data to a careless cloud service provider or a disaster, such as a fire, flood, or earthquake.
3. The third-greatest cloud computing security risk is account or service traffic hijacking.
4. Insecure interfaces and APIs. IT admins rely on interfaces for cloud provisioning, management, orchestration, and monitoring.
5. Denial of service. DoS has been an Internet threat for years, but it becomes more problematic in the age of cloud computing when organizations are dependent on the 24/7 availability of one or more services.
6. Malicious insiders
7. Cloud abuse, such as a bad guy using a cloud service to break an encryption key too difficult to crack on a standard computer.
8. Insufficient due diligence; that is, organizations embrace the cloud without fully understanding the cloud environment and associated risks. For example, entering the cloud can generate contractual issues with providers over liability and transparency.
9. Shared technology vulnerabilities as the largest security threat to cloud computing. Cloud service providers share infrastructure, platforms, and applications to deliver their services in a scalable way. "Whether it's the underlying components that make up this infrastructure (e.g. CPU caches, GPUs, etc.) that were not designed to offer strong isolation properties for a multi-tenant architecture (IaaS), re-deployable platforms (PaaS), or multi-customer applications (SaaS), the threat of shared vulnerabilities exists in all delivery models
B )List and describe at least 2 ways a data attack on the cloud can occur.
1. If an attacker gains access to your credentials, he or she can eavesdrop on your activities and transactions, manipulate data, return falsified information, and redirect your clients to illegitimate sites. "Your account or services instances may become a new base for the attacker.
2. a current or former employee, a contractor, or a business partner who gains access to a network, system, or data for malicious purposes. Mhacker using cloud servers to launch a DDoS attack, propagate malware, or share pirated software.
C ) What networking tools can you use to ameliorate data attacks on cloud data?
1. Qualys
2. White Hat Security
3. Okta
4. Proofpoint
5. Zscaler
6. CipherCloud
7. DocTrackr
8. Centrify
9. Vaultive
10. SilverSky
D) What tools would you use to troubleshoot problems when configuration is an issue?
Subnet and IP Calculator : One of the most important tools in the belt of a junior network engineer is an IP network calculator. These can be used to unsure a correct IP address selection and with this a correct IP address configuration. While this type of tool is used by senior level network engineers, much of the information obtained from the tool becomes simpler to calculate the longer and more experience you have in the field. Two of the more commonly used free IP calculators include Wildpackets (Bitcricket) Network Calculator and Solarwinds Advanced Subnet Calculator
E ) Choose and investigate one tool used to administer data in the cloud, take a screenshot of the tool, and embed the picture in your document. Provide a detailed analysis of the tool and how it is used.
Google Cloud SDK
The Google Cloud SDK is a set of tools that you can use to manage resources and applications hosted on Google Cloud Platform. These include the gcloud tool, which provides the main command-line interface for Cloud Platform products and services
F ) Give a recommendation on whether companies should use or not use the cloud, based on the security, the management, or any barrier found in using cloud technology.
Companies should use cloud technology :
1. Cost reduction
2. Increased Data security
3. Possibility to work remotely