ITM 820 Lecture Notes - Lecture 5: Point-To-Point Tunneling Protocol, Platform As A Service, Network Security

99 views3 pages
Cloud Computing / Cloud Security
4 topics
1. Cloud characteristics
a. Cloud computing is based on earlier tech
a.i. Web 2.0
a.ii. Grid computing (cpu sharing resources)
a.iii. Virtual machines (virtually partition the server)
a.iv. Resource P2P sharing
a.v. Outsourcing (not tech)
Cloud computing is a type of IT outsourcing.
Cloud security:
SaaS Security
PaaS Security
Hardware (cpu)
Storage
Network
DB -> SQL injection
SaaS security:
1. API, software package security risk
2. Web interface (Firefox, IE, Chrome)
3. Hypervisor issues (sandboxing)
4. Software update/debug
5. PaaS, IaaS impacts SaaS, a bad NIC (IaaS) may leak SaaS info out or a bug in Java PaaS may
impact web interface
PaaS security:
1. Incompatibility , e.g Java vs .NET
find more resources at oneclass.com
find more resources at oneclass.com
Unlock document

This preview shows page 1 of the document.
Unlock all 3 pages and 3 million more documents.

Already have an account? Log in

Get access

Grade+
$10 USD/m
Billed $120 USD annually
Homework Help
Class Notes
Textbook Notes
40 Verified Answers
Study Guides
1 Booster Class
Class+
$8 USD/m
Billed $96 USD annually
Homework Help
Class Notes
Textbook Notes
30 Verified Answers
Study Guides
1 Booster Class