ITM 820 Lecture Notes - Lecture 5: Point-To-Point Tunneling Protocol, Platform As A Service, Network Security

121 views3 pages

Document Summary

4 topics: cloud characteristics, cloud computing is based on earlier tech a. i. Cloud computing is a type of it outsourcing. Incompatibility , e. g java vs . net: nos (network operating system) vulnerability linux, windows, paas update/upgrade, e. g upgrading windows r1 -> r2, data leak, software based data leak a. i. Sql injection: hardware based data leak b. i. Memory**: vm data may be leaked through shared storage or shared router/switch. Server memory is shared by many other processes in the form of blocks of memory cells. High priority processes may occupy space shared by low/normal priority processes, data leak may happen. Hardware, network, storage may be attacked e. g ddos attack on a server will cause serious problems for vm"s residing on that server make sure sla agreement addresses this issue. Note: any problems linked to iaas has a direct impact on other layers (saas & paas) Cloud security management: secure hypervisor (controls all vm"s)

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents