NEC IAM in Federated Cloud Application & Relationship Between Users and Roles in Databases Essay

User Generated

fnaznynivwnl4

Writing

Description

Question 1:

Write an essay of at least 500 words discussing discussing IAM in a federated cloud application.

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign.

Write in essay format not in outline, bulleted, numbered or other list format.

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google. Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your submission Do not use spinbot or other word replacement software. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.

Question 2:

Discuss, in your own words using 500 words or more, the relationship between users and roles in databases. Explain why we use roles rather than simply assigning rights and privileges to each individual user. Consider how to handle new hires and job changes.

Cite your sources. Do not copy. Write in essay format not in bulleted, numbered or other list format.

Reply to two classmates' posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions.

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not 'nice post' or the like). Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software.

Question 3:

Write an essay of at least 500 words analyzing the principle of least privilege. Use an example from the news.

Include at least one quote from each of 3 different articles, place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations). Write in essay format not in bulleted, numbered or other list format.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: DATABASE SECURITY

1

Database security

Student

Institution affiliation

DATABASE SECURITY

2

Question 1
IAM is used to denote identity and access management. On the other hand, a federated cloud
application is a general term used for many public or private environments in the cloud that are
used to offer different services. When the two features are used together, IAM in the federated
cloud, they have a higher capacity to offer various services. They avail of different services in
the cloud environment, and many users can manage (Reeder et al. 2008).
Thus, IAM can be assumed to be a well-designed application with quality standards, policies,
and methods that can regulate access to digital services in the cloud. The requirement of a
modem at a particular hour for various services at different locations makes the techniques to
spread around the globe. When the services are combined, a set of skills that have minimum
efforts and time are required when applying the use of IAM for the cloud.
The uses of IAM can be found both in Authentication and Authorization. When used in
authorization, it identifies a valid user while in authentication, it will guide the allowed user in
executing specific tasks. The IAM function can be used to allow or not deny permission to
access the services concerning the access rights that are set. For instance, it can allow a user to
have some given volume of resources and not go beyond the set limit (Almulla, & Yeun, 2010).
The application is suitable for SME’S who have the goal of providing services to many users on
a global scale from any given location and time. The small enterprises can develop their own
IAM or may acquire it from off-shelf vendors who specialize in creating the services. Currently,
on a global scale, we have a variety of IAM being used. The following are examples where the
applications are used; the Amazon web services, Microsoft Azure. The above organizations use
the application on a broader scale. For instance, in Google, they utilize computations over the
cloud, and in IBM, they manage their services using IAM. The users are enabled to manage and

DATABASE SECURITY

3

manage resources through the use of cloud federation. These can be done centrally or use of a
single sign (SSO) in various accounts. In the federation cloud, they have designed their services
to be either premium or free. For the premium, the users pay some fees according to ...

Related Tags