Access over 20 million homework & study documents

Vpc technology edited 1

Content type
User Generated
Rating
Showing Page:
1/3
Running head: SECURITY IN THE CLOUD 1
s
Title:
Student’s name:
Professor’s name:
Date:

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/3
SECURITY IN THE CLOUD 2
Discuss security in the cloud using the shared responsibility model and identity and
access management (IAM).
It noted that when one is in a data station or one may be using a server bases IaaS
instances or any other cloud service. He/she is responsible all-time for ensuring that what’s under
his/her control is security guaranteed. Security in the cloud includes retaining control over data
and information, where one takes charge and maintains how and when data is used. It also
involves resource configuration where spinning up is done, thus taking control of the
environment. It can also be achieved by having access and identity, setting up authentication, and
other authorization techniques. Even password management, thus limiting any chances of
unauthorized personnel’s having access to the configure data also according to the model, can be
achieved through application code and logic enhancement where it involves securing code
repositories from a malicious intrusion, where the codes are integrated thus making them hard to
crack and so maintaining a high-security level for any systems (Lewis, 2017).
Discuss the networking services that can be used to build a VPC for the company.
It noted that a VPC is a virtual network system implemented on Google’s productions
using Andromeda. Some of the networking services that the company can use in building VPC
are internet gateways that provide network address translation and also provides gives a target in
the company VPC route platforms for the internet routable traffic. It can also use carrier
gateways that help in inbounding and outbound traffic to and from the carrier network. The other
one is the DHCP that provides a recommendable standard for transferring configuration data to
the host on an IP network. Lastly, they can also use the DNS, which helps resolve DNS
hostnames found to their other IP addresses corresponding to it (Hon & Millard, 2013).

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/3

Sign up to view the full document!

lock_open Sign Up
Unformatted Attachment Preview
1 Running head: SECURITY IN THE CLOUD s Title: Student’s name: Professor’s name: Date: SECURITY IN THE CLOUD 2 Discuss security in the cloud using the shared responsibility model and identity and access management (IAM). It noted that when one is in a data station or one may be using a server bases IaaS instances or any other cloud service. He/she is responsible all-time for ensuring that what’s under his/her control is security guaranteed. Security in the cloud includes retaining control over data and information, where one takes charge and maintains how and when data is used. It also involves resource configuration where spinning up is done, thus taking control of the environment. It can also be achieved by having access and identity, setting up authentication, and other authorization techniques. Even password management, thus limiting any chances of unauthorized personnel? ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
Really great stuff, couldn't ask for more.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4