Cloud Infrastructure Mechanisms

Write a discussion on the following topic: List and briefly discuss some of the Cloud Infrastructure Mechanisms. In your opinion, why are these important in cloud computing services?

Note: Please use APA 7 (https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_formatting_and_style_guide/general_format.html) format for references and in text citations. Content should be minimum of 250 words.

Answer preview

These mechanisms are essential to cloud computing due to several reasons. The primary reason is the security and confidentiality of data. Many companies are impressed by the benefits of cloud computing but concerned by the possible security issues of storing their data in the cloud (Dai, Qiu, Wu & Qiu (2016). Mechanisms like logical network perimeter assist in boosting cloud computing security by limiting access from multiple physical locations. These mechanisms are also crucial in offering alternatives to users. For instance, those who lease or install virtual servers get the option of storing their data either physically or in the cloud where they can access it easily. These mechanisms also provide a much-needed structure to utilize cloud computing effectively. In conclusion, cloud computing offers numerous benefits to users.

[371 Words]

Cloud Infrastructure Mechanisms

Computing professionals

Do you believe that all data should be encrypted? Many computing professionals think this is a good idea. But a small number of computing experts feel that no data should be encrypted—that all data and software should be openly available to anyone who wants it. Explain your answer (whether you believe all data should or should not be encrypted).

Answer preview

Additionally, the process of encryption of all files takes forethought and work. Most computers nowadays come with a default setting that has activated encryption (Li, 2020). Such parameters make it easy for the user to encrypt all their information. However, if this is not the case, encrypting can prove cumbersome to some users because setting up encryption is not always a straightforward task. For such users, it is more practical to encrypt only necessary documents, such as tax and business documents, especially if sent via cloud and email. The main questions that users need to ask themselves before embarking on encryption are whether the information needs to be encrypted. According to Li (2020) there is no perfect form of security whether physical or virtual. As such, those encrypting all their data on their computer and cloud without prioritizing could waste time. Instead, users can use stronger passwords, two-factor authentication, and excellent computer security practices. In conclusion, I believe that encryption

[402 Words]

Computing professionals

Specialized Cloud Mechanisms

Write a discussion on the following topic – List and briefly discuss some of the Specialized Cloud Mechanisms. In your opinion, why are these important in cloud computing services?

Write a discussion on the following topic – List and briefly discuss some of the Specialized Cloud Mechanisms. In your opinion, why are these important in cloud computing services?

Note: Length of the content should be 350 – 400 words. Please use APA 7 format (https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_formatting_and_style_guide/general_format.html) for references and in text citations.

Answer preview

A hypervisor is an important mechanism that generates virtual servers on physical servers. Litchfied & Shahzad (2017) say that hypervisors ensure that virtual machines remain as separate entities, and they ensure that the security of the machines is upheld. Hypervisors are vital as it protects the security of the virtual machines. Resource cluster is another mechanism for grouping geographically diverse resources to operate as single resources. Resource clustering architecture is dependent on cluster nodes and task scheduling, systems synchronization, and data sharing. Resource cluster is crucial since it groups various IT resources ad makes them appear as single resources and hence enhancing their efficiency. Audit monitor is another mechanism for tracking and collecting data in the network.

[431 Words]

Specialized Cloud Mechanisms

Cloud Computing technologies

For this project, select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage. Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges. The paper should include the following sections each called out with a section header with proper APA formatting:

• Company Overview: The section should include the company name, the industry they are in and a general overview of the organization.

• Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.

• Solution: Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation. What was the result of implementing Cloud Computing? Did they meet their objectives for fall short?

• Recommendations: What recommendations would you provide to this organization to better accomplish the challenge(s)? This is from your opinion not someone else on the Internet.

• Conclusion: Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success.

Requirements:

The paper must adhere to APA guidelines including Title and Reference pages. There should be at least six (6) scholarly sources listed on the reference page (with in-text citations). Each source should be cited in the body of the paper to give credit where due. Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches. The body of the paper should be 2000 words in length. The Title, Abstract, Table of Contents (if applicable), and Reference pages do not count towards the page count requirements. All references must be scholarly references (NOT WIKIPEDIA). Use one of the methods provided in residency for researching scholarly journals and websites.

DO NOT USE THE FOLLOWING COMPANIES:

• Equifax

• Any Cell Phone Company

• UBER

• Amazon

• Microsoft

• Adobe

• Capital One

• LinkedIn

• eBay

Answer preview

One challenge that Netflix faced is increasing customer demand against old infrastructure that could not support growing needs. Netflix has had a positive growth as subscribers increased. The increasing number of customers exceeded the capabilities of the existing infrastructure of the organization, and this necessitated the need to migrate to cloud technology. Initially, Netflix used relational databases that proved challenging to cope with the increasing information. Information growth was becoming an issue for the relational databases since they could not handle real-time data to facilitate the operations of the company. Scalability is another challenge posed by the usage of relational databases. With relational databases, the distribution of data across multiple serves is challenging. Additional problems that Netflix faced when using relational databases are de-normalization when the cache is distributed, rebalancing issues when sharing data, and a high cost of dealing with extensive data in traditional databases.

[2325 Words]

Cloud Computing technologies

Cybersecurity

1. Need to Correlate my job responsibilities(ELECTRICAL ENGINEER) with the eight-week online course Cybersecurity.

YOU NEED TO WRITE 250 WORDS CORRELATING my job responsibilities(ELECTRICAL ENGINEER) TO MY COURSE CYBER SECURITY

THESE ARE TOPICS COVERED IN MY COURSE

This course examines aspects of cyber security and the associated computer and network hardware and software used to identify harmful digital activities and associated actions used to prevent harmful data breaches. Students will investigate network domains such as Internet, Intranet, Extranet, and the different instantiations of Cloud Computing. Studies will include: 1) domain and network layers of the OSI model; 2) intrusion detection system (IDS)

– systems used to monitor network traffic for suspicious activity and issues alerts when such activity is discovered; 3) intrusion prevention systems (IPS) which operates much line IDS but adds a layer of security to reject (or nullify) the potentially malicious activity; 4) Honeypots – used to attract harmful activities in order to understand the mechanisms used; malicious software 6) software vulnerabilities; 7) cryptography – the practice and study of techniques for secure communication in the presence of third parties called adversaries; 8) encryption and decryption techniques used to secure data and limit the potential for data breaches. Please see Cyber Security Knowledge Areas in this syllabus for additional details.

Answer preview

Conteh, & Schmick, (2016) highlight the cyber attackers are more inclined to attack electrical devices and telecommunication companies.  Electrical engineers have a huge role to play to deter cyber-attacks. The cybersecurity knowledge and skills essential in understanding the motivation behind cyberattacks.   Understanding the hackers’ motivation to attack electrical infrastructure and devices will help to build more reliable and robust devices that cannot be easily attacked by hackers. The cybersecurity knowledge and skills will help electrical engineers to develop infrastructures that are able to withstand cyberattacks. The electrical engineers can work collaboratively with IT technicians to design advanced control systems that will deter cyber-intrusion. In electrical Engineering, having cybersecurity knowledge is not just important, but it is absolutely critical.  The cybersecurity knowledge can help electrical engineers to design, execute, and evaluate attack resistant devices or system which promote cybersecurity.

[324 Words]

Cybersecurity

Benefits of virtualization software

Discuss the benefits of virtualization software, as described in the text (Page 138 of attachment). Do you agree/disagree with these benefits, or can you think of additional benefits not already presented?

Also discuss the security concerns highlighted by server sprawl and how you would propose to solve those in your (real or hypothetical) organization.

At least one scholarly source should be used. Use proper citations and references in your post.

Answer preview

The security concerns presented by virtual server sprawl are based on the ease in developing virtual machines. The critical security issue is that virtual applications and devices’ proliferation are highly uncontrollable (Gupta, Srivastava, and Chauhan, 2016). Mangers play a role in security concerns by providing insufficient servers. However, in a hypothetical organization, security problems can be addressed by implementing strict policies preventing sprawl. Also, providing a virtual machine library is crucial for monitoring software updates. Software with a report feature should be used to provide alerts on misuses of resources. Another strategy to solve thus issues is through revitalization.

[402 Words]

Benefits of virtualization software

Information models and delivery systems

Respond to one of the following topics.

  1. In their article, Baehr and Lang note that “Vannevar Bush envisioned information overload as one of the main problems facing workers in the computer-based information age. Today, content management and data mining are two important information management approaches that represent a blending of hypertext and Web 2.0 traits. For example, building an XML database may involve developing a structured authoring approach (rhizomatic schema or information model), multi-purpose templates (blending content types and style sheets), interactive navigation (intertextual user search and help tools), and methods for testing, mining, and archiving the data (usability, research).” (p. 48). They go on to further contend that current Web 2.0 tools allow for greater interaction between author and reader. What challenges do you think arise from creating online documentation that seeks to reduce information overload through targeted information models and delivery systems, but at the same time allows users flexibility in how they interact with that information?
  2. Tom Johnson in his article states, “Even if you get a user to the right topic, the topic often fails the user. Many users know this, which is why they often don’t bother to consult the help at all.” Have you had the experience of having online help fail you? Describe the situation (Why did you need the help? How did it fail to meet your needs?), then detail what you as an author could have done to rectify this failure.
  3. Online documentation encompasses many forms such as online help, interactive web-based tutorials, and screen tips. What comes first to your mind when you hear the term “online documentation”? Did you find any items in this week’s lecture that you had not thought about being under the umbrella of online documentation? Are there items you would add to this list? How would you define online documentation to someone with little technical knowledge?

Answer preview

The results were way off for an educative piece. The piece ended up looking fabricated and exaggerated. The period I had spent working on it was all in vain because eventually, I had to pull it down. This was disheartening. I had to get another different topic to do my research and use other sources since the source I initially used could not be trusted.

What could I have done as the author to rectify this?

As an author of a site that contains data used by various people, it is crucial to get your data correct. Such data can lead to panic in some areas. It also causes stigma, especially when the data is dealing with sensitive issues.

[335 Words]

Information models and delivery systems

Benefits of virtualization software

Discuss the benefits of virtualization software, as described in the text. Do you agree/disagree with these benefits, or can you think of additional benefits not already presented? Also discuss the security concerns highlighted by server sprawl and how you would propose to solve those in your (real or hypothetical) organization.

Please prepare one main discussion and two response posts substantive. A substantive post will do at least two of the following:

At least two scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

I will post other student discussions here once you are done with main discussion.

Requirements: APA | Discussion | 2 pages, Double spaced

Answer preview

However, in some cases, users adopt more computing resources that supersize their financial capabilities. Organizations employ numerous servers in their data centers to facilitate processing, networking, and storage needs. The application of numerous servers can sometimes exceed organizational business requirements. Some of the servers applied are not exploited to their full capacity. This situation is known as servers sprawl. The server sprawl pushes the organization to spend more money running the servers, paying their energy and cooling costs, and getting inequivalent performance from the servers in return. Also, there are increased chances of security vulnerabilities when using a low server consolidation ratio. The cost of installing security infrastructure for many servers is stiff, making organizations choose to install alternative cheaper security measures instead of using few high-performance servers with superior security infrastructure.

[640 Words]

Benefits of virtualization software

Privacy and Security

According to the authors, privacy and security go hand in hand; and hence, privacy cannot be protected without implementing proper security controls and technologies. Today, organizations must make not only reasonable efforts to offer protection of private

According to the authors, privacy and security go hand in hand; and hence, privacy cannot be protected without implementing proper security controls and technologies. Today, organizations must make not only reasonable efforts to offer protection of privacy of data, but also must go much further as privacy breaches are damaging to its customers, reputation, and potentially could put the company out of business. As we continue learning from our various professional areas of practice, its no doubt that breaches have become an increasing concern to many businesses and their future operations.

For this discussion, find an example of a security breach which compromised data records at a company in the same industry as you will be using in your final paper. Summarize the breach, discuss the data that was lost and identify security controls that you would recommend be in place (be certain to remember to cite sources) that could have prevented this breach from occurring. Remember to critical respond appropriately to two other leaners for full points.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.
Answer preview

There were specific pieces of data that were viewed without authorization and stolen during the breach. Canva (2021) explained that hackers managed to access cryptographically protected passwords. This means that the hackers could log into the accounts of everyone who had not logged in using their google account but had a user name and password option instead. The company noted that cybercriminals only viewed but did not steal the payment method and credit card information. For those using google accounts as their logins, Canva (2021) stated that even thigh the hackers boasted of obtaining the OAuth information, they had no evidence to suggest this was true. Lastly, hackers viewed the information of users but did not have the means to steal it.

[480 Words]

Privacy and Security

Emergency Notification Systems

The report should have a cover page, table of contents. In the introduction describe the system you have selected with respect to what it does, who uses it and why they use it and well as the analysis of information requirements from each system user using input-process-output model.

The project reports must be at least 1000 words to fulfill the university’s writing intensive requirement and this excludes the cover page and table of contents

https://www.marymount.edu/Student-Life/Health-Well… this is the link to the system description in the university website. I attached two screen shots from my account to show to you the system.

I will the class material and please don’t use any other sources and make it look simple and thanks!

Answer preview

The various users expect different information according to their roles in the institution. Safety is crucial, and everyone is concerned with their safety. For students, safety is vital, and the information they receive from the system alerts them of impending weather-related disasters, which enables them to take precautions. The faculty staff, just like the students, expect information that allows them to take safety precautions. The emergency and weather information that the staff receives enables them to take precautionary measures to safeguard themselves. Marymount community members are also concerned with weather issues affecting the school. Parents are concerned with the safety of their children since they are away from them. Since they are near the university, the community members are likely to be affected by weather disasters. The alert system updates them on weather information, and this allows them to take safety

[1054 Words]

Emergency Notification Systems