Thursday, September 26, 2019

Security protocols Case Study Example | Topics and Well Written Essays - 3000 words

Security protocols - Case Study Example Currently, all company servers (file, email, data, web, radius and FTP servers etc.) are located in the server farm at its head office in Birmingham. The other two sites are connected to the head office through leased lines. We will address identified security threats to the current network by categorizing them in to two categories: External Threats: Virus, Trojan, Worms, Spyware, Cyber-attack, Denial of Service Attack, Distributed Denial of Service Attack Residual Threats: Vulnerabilities within the RADIUS server. Only Firewall is implemented on the edge router with packet filtering enabled. 2 Feasibility for the Cloud The Cloud computing helps to provide advantages in terms of reducing cost related to the hardware, software and human resource. On the other hand, various controversial issues such as individual’s privacy, security control risks and data sharing are still in need for a better solution. Similarly, in order to provide cost benefit analysis while practicing risk a ssessment, better development techniques, less cost, high scalability with next generation architecture will be utilized for EEC. However, the open source is considered in providing core facilities in cloud computing in order to enable the cost reduction input or cost free structure for cloud service providers. In fact, the cloud computing service can use the open source in order to gain power and control to launch next generation proprietary platforms which can be similar to Web 2.0. The Linux operating systems are also utilized for cloud computing, as company’s ecommerce site is run on a UNIX based web server. Moreover, if there is no license cost such as Microsoft operating system than Linux operating system is likely to use cloud computing services. In fact, it is visibly stated by IBM in the economics of scale that â€Å"one of the primary drivers for expanding the cloud is open source.† The application or the software in any computing environment is believed as a core element, however it is expensive. The open source is not all the time successful because they are partially present in some organizations. A number of open source applications are related with the cloud and is accessed through a variety of obligations. These obligations include open source license and other relevant stuff. Similarly, an efficient compliance procedure related to address issues and diminish risk, a software license is required. Moreover, new risks are not initiated by the cloud computing. However, the services that are linked with cloud computing generates risk. The applications that are associated with the operational tasks along with cloud computing are distributed as compared to other software applications. In fact, reduced visibility along with no evaluation or calculation of the industry is present. Therefore, it cannot be characterized as the obligations incorporating copy license. In order to access cloud computing online services through web browser, you need an updated computer that can support all the necessary features regarding current Web browsers. Moreover, fast Internet connection is also required in order to experience sheer clod computing features. Including an updated workstation along with all the needed updates are installed. An old workstation is update to Windows 7 will cost about $70 but on the other hand, Windows 7 or Vista does not support all the VGA drivers and there are hardware compatibility issues are also present. In

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.