Wednesday, June 19, 2019

Security protocols Case Study Example | Topics and Well Written Essays - 3000 words

Security protocols - Case Study ExampleCurrently, entirely company servers (file, email, data, web, radius and FTP servers etc.) are located in the server farm at its head office in Birmingham. The other two locates are connected to the head office by dint of leased lines. We ordain address identified security threats to the current network by categorizing them in to two categories External Threats Virus, Trojan, Worms, Spyware, Cyber-attack, Denial of Service Attack, Distributed Denial of Service Attack symmetricalness Threats Vulnerabilities within the RADIUS server. Only Firewall is implemented on the edge router with packet filtering enabled. 2 Feasibility for the Cloud The Cloud computing helps to provide advantages in term of reducing cost related to the hardware, software and human resource. On the other hand, various controversial issues such as individuals privacy, security concur risks and data sharing are still in need for a better solution. Similarly, in order to provide cost benefit analysis while practicing risk assessment, better development techniques, less cost, high scalability with next generation architecture will be utilized for EEC. However, the pass on source is considered in providing shopping mall facilities in cloud computing in order to enable the cost reduction input or cost free structure for cloud work providers. In fact, the cloud computing service can use the open source in order to gain power and control to launch next generation proprietary platforms which can be similar to Web 2.0. The Linux operating outlines are also utilized for cloud computing, as companys ecommerce site is run on a UNIX based web server. Moreover, if there is no license cost such as Microsoft operating system than Linux operating system is likely to use cloud computing services. In fact, it is visibly stated by IBM in the economics of scale that one of the primary drivers for expanding the cloud is open source. The application or the softwar e in any computing environment is believed as a core element, however it is expensive. The open source is not all the time successful because they are partially present in some organizations. A number of open source applications are related with the cloud and is accessed through a variety of obligations. These obligations include open source license and other relevant stuff. Similarly, an efficient compliance procedure related to address issues and diminish risk, a software license is required. Moreover, new risks are not initiated by the cloud computing. However, the services that are linked with cloud computing generates risk. The applications that are associated with the operational tasks on with cloud computing are distributed as compared to other software applications. In fact, reduced visibility along with no evaluation or calculation of the pains is present. Therefore, it cannot be characterized as the obligations incorporating copy license. In order to access cloud computi ng online services through web browser, you need an updated computer that can take over all the necessary features regarding current Web browsers. Moreover, fast Internet connection is also required in order to experience sheer clod computing features. Including an updated workstation along with all the needed updates are installed. An old workstation is update to Windows 7 will cost about $70 but on the other hand, Windows 7 or Vista does not support all the VGA drivers and there are hardware compatibility issues are also present. In

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.