Network Security in Business Discussion & Responses
Create one discussion thread and answer the following questions:
How is the management of network security similar and different between on-perm and cloud environments? Give some examples.
Discussion 1
COLLAPSE
An on-perm system is what most people associate with an on-premises environment. If the network is on a mobile device, it might be easy to forget that the user must be connected to network resources to resume the computer when there is network downtime. An on-premises environment works differently. The system that hosts the data can be used on one desktop computer, and the cloud can have it at fingertips on a server, which can be accessed from all devices. These two environments require similar management and configuration for each. As with anywhere, this is an environment of choice (Wang et al., 2017).
For the Cloud Environment: A hybrid on-premises and cloud environment are usually used where all computers and network resources are on the same physical device. The system that hosts the data can be used on one laptop computer, and the cloud can have it at fingertips on a server, which a be accessed from all devices. This type of approach is ideal for smaller organizations and companies, but not for substantial one-off corporate networks.
For the On-Premises: While in hybrid on-premises, the cloud is accessible from a network with a single device, on a single desktop, there is no need for a single platform. On a single device, it is usually more ideal for sticking with the hybrid on-premises to ensure that the data is backed up into the cloud, as it will have the best reliability.
On-Cloud is a method where cloud platforms, servers, and platform components are provided in a single cloud platform. This type of on-premises management is called cloud-based management and may use some cloud components, but it is still cloud-based. The management strategy of on-perm networks and cloud is very similar to how it should be used in on-cloud scenarios. The user has cloud assets, and the user has on-premises assets. The same management strategy is applied with all cloud platforms (Khosravi-Farmad & Ghaemi-Bafghi, 2020).
References
Khosravi-Farmad, M., & Ghaemi-Bafghi, A. (2020). Bayesian Decision Network-Based Security Risk Management Framework. Journal of Network and Systems Management, 1-26.
Wang, M., Liu, J., Chen, J., Liu, X., & Mao, J. (2017). Perm-guard: Authenticating the validity of flow rules in software defined networking. Journal of Signal Processing Systems, 86(2-3), 157-173.
----------------------------------------------------
Discussion 2
COLLAPSE
On-perm environments are built based on existing data but can be built, modified, and changed at any time, as needed. On-perm networks, known as nodes, contain both IP addresses and subnets of IP addresses. On-perm Networks are composed of several parts: a router, an address space, and some other bits of data. The user creates access to the entire network, and then the user creates a user and permissions. On-prem requires a different layer on the platform, and the user needs to do that as well, but that is essentially the essence of what is different (Akeju et al., 2018).
A Cloud environment is a collection of applications that can communicate via the cloud platform using the cloud's services. Cloud environments may be in the form of a network, an internet connection, a private cloud environment, or both. The cloud services include access to sensitive data and storage in the cloud, access to remote servers with remote access capability, and communication with server resources over the network. In the cloud, it is an application with an interface where an underlying server is a service object (SO). Then the user has all the functionality that is necessary to provide a service. The management of network security is a service, which is different because not managing from a central server and that central service has more requirements on that service object, so the service is managed by own app that can perform security checks for the user. The user can then deploy and manage different services using the app. In the cloud, it is a subscription where the user creates a subscription object with all the functionality necessary to grant all the users access to the service (Akeju et al., 2018).
The management of network security and security policy is the same for both, but once the user has the application in the cloud, there are still some differences. Cloud does not require any new code, just the API for the service; then the user have the cloud app or the application on the mobile device, then only managing access to the relevant services on the platform, then the user has an API client for the mobile device, then not only managing the access but actually managing the content and building an application based on the content. The most significant difference in the on-prem and on-prem is that the platform provider is the IT department, a cloud provider, and a remote management platform provider. Then there is a customer to customer connection between the cloud platform and the on-prem platform. Examples are: On-perm Cloud Management (MOC) is the method where the cloud platform provides a virtualized environment with a dedicated server (host) to manage its assets and control operations; Cloud Platform Management (CPM) is the method where management of applications such as users, network and networks is performed from the cloud platform. This is done from the client device to the cloud device or from the client to the cloud device (Elgendy et al., 2017).
References
Akeju, O., Butakov, S., & Aghili, S. (2018). Main factors and good practices for managing BYOD and IoT risks in a K-12 environment. International Journal of Internet of Things and Cyber-Assurance, 1(1), 22-39.
Elgendy, R., Morad, A., Elmongui, H. G., Khalafallah, A., & Abougabal, M. S. (2017). Role-task conditional-purpose policy model for privacy preserving data publishing. Alexandria Engineering Journal, 56(4), 459-468.