Network Security Discussion
How is the implementation of network security similar and different between on-perm and cloud environments? Give some examples.
Reply:
Discussion 1
COLLAPSE
Network security is a software security solution that protects the network against specific attacks such as attacks by remote network agents, network attacks, and malicious software. Most likely, the security solution in their network is called a network firewall or WAN firewall or WAN VPN (Pirbasti & Das, 2020). The Implementation of network security is updating to prevent future attacks, security systems, and procedures against attacks and information sharing. In the case of a network attack, a hacker can obtain a specific password. The user password should not be changed. The network should be protected from attacks by a user-defined group, including the local network administrators and users (Pirbasti & Das, 2020).They should be prepared to change the passwords of non-users or protect the network. On-premises are essentially a cloud storage service. The cloud solution allows users to control many aspects of their IT infrastructure, including deployment and security. On-Premises allow users to configure their virtual networks and services to their criteria. On-Premises provide a complete solution that allows the customer to create or modify their virtual networks and manage their network configuration (Sharma et al, 2020).
Cloud Computing has several advantages over traditional cloud computing. For one, it provides a high-speed distribution of computing resources. For example, distributed computing is used to solve big problems while in most cases; computers are not available for all the work needed to solve the task. However, this gives the customer greater flexibility in the cost of computing resources by allowing the customers to choose a particular solution (Sharma et al, 2020). There is a tendency to use the standard computing resources in many products, where the client is not aware of the difference. The customers of such products do not have the choice of choice (Sharma et al, 202z
References:
Pirbasti, M. R., & Das, O. (2020). Modeling multi-site computation offloading in unreliable cloud environments. Performance Evaluation, 102136.
Sharma, M., Elmiligi, H., & Gebali, F. (2020). Network security and privacy evaluation scheme for cyber physical systems (CPS). In Handbook of Big Data Privacy (pp. 191-217). Springer, Cham.
Discussion 2
COLLAPSE
The term network security can refer to both types of security measures used to prevent unauthorized access and manipulation of user data. Network Security has traditionally been applied to protect the information stored on a server and network to prevent unauthorized access by other users on the same server or network. Network security includes providing network security by preventing access from outside the network and protecting the networks to which the network connects (Al-Fedaghi & Alnasser, 2020).
The implementation of network security is one reason there are problems; there are many ways to improve the user experience and improve the security of applications.While many are thinking about addressing these security issues, it is about security and security for all applications (Al-Fedaghi & Alnasser, 2020). They will start by looking at how network security contributes to application security. In this, they will present some key network security considerations that will significantly impact applications' security (Nahmias et al, 2020).
The on-premise definition for online service providers is also significant because this includes the internet on their platform. It is essential to understand because, in most cases, these services are not delivered to customers via the internet; they deliver to customers via the digital networks that are available over their infrastructure. Therefore, services provide both on-premise and on-premise. Customers would not be able to consume or use the service if they did not have access to their facilities to run it. It is, therefore, important that both businesses be able to provide the service when necessary (Nahmias et al, 2020).
Cloud is a collection of software applications that provides control, data management, access, and storage services to users of any device that works on the cloud. Cloud applications serve various applications, ranging from security, storage, and application management systems, databases, and server hosting services, software, and applications that provide a wide range of services, ranging from data analysis and analysis to system administration and data storage (Nahmias et al, 2020).
References
Al-Fedaghi, S., & Alnasser, H. (2020). Modeling network security: Case study of email system. arXiv preprint arXiv:2003.13509.
Nahmias, D., Cohen, A., Nissim, N., & Elovici, Y. (2020). Deep feature transfer learning for trusted and automated malware signature generation in private cloud environments. Neural Networks, 124, 243-257.