Infrastructure as a service (iaas) from a cloud service

Assignment Help Basic Computer Science
Reference no: EM13936480

The Scenario

An organization is planning to use Infrastructure as a Service (IaaS) from a cloud service provider to host their web site and e-commerce applications. This will consist of an appropriate number of suitably sized Linux Virtual Servers and Virtual Storage. These servers will support the various software components including: load balancer, web server, application and database server. The cloud service provider is responsible for securing the infrastructure that supports the virtual machines, storage and network. However the tenant (i.e. the organization using the service) is responsible for securing the Operating System, and the components of their application. The task for this assignment is to secure these virtual servers.

Assignment Task

Computer security aims to ensure the confidentiality, integrity and availability of systems and information. Due to the wide-ranging environments and platforms that are in use, and the lack of security awareness by many users, security is a complex task. This has resulted in a high level of data breaches and financial loss to businesses from threats ranging from insider fraud through to organized cyber-crime.
This assignment requires you to provide security functionality for an Ubuntu operating system (OS). First, you are required to discuss appropriate tools and techniques for the provision of security for this OS. The level of security required (ensuring confidentiality, integrity and availability) is appropriate for the non-ecommerce systems in the above scenario (i.e. the servers supporting the organization's informational website). Second, you are to demonstrate the implementation of the tools and techniques identified by your research and introduced in the lab sessions to the Ubuntu 2* virtual machine (VM). Third, you will demonstrate that the levels of security required have been achieved by using employing appropriate tools and techniques to test and demonstrate the security of the Ubuntu 2 OS. Finally, you are to provide a number of recommendations to raise the level of security of this OS to meet the needs of a more secure environment for example to support the e-commerce requirements.

Details of Tasks

Part 1. Discussion of tools and techniques for securing a Linux Server.

You are required to write a report with references to papers in journals, conference proceedings, Web sites or books on securing computer systems for an SME user. This should focus on the Linux operating system and in particular Ubuntu. The level of security required is deemed to be ‘medium', i.e. the system supports the business informational website and ensures that confidentiality, integrity and availability of the OS is maintained. As a guide, an approximate word count for this section is 800 words.

Part 2. Demonstrate Securing an Ubuntu System.

Using the VirtualBox VM image Ubuntu 2*, implement the level of security as detailed in part 1. To demonstrate the tools and techniques used to make this system more secure than an ‘out-of-the-box' installation, this section should include appropriate screenshots and supporting text. As a guide, an approximate word count for this section is 500 words.

Part 3. Demonstration of security achieved.
Using tools introduced during lab sessions in this module and other appropriate techniques, demonstrate that the OS has been made more secure by undertaking part 2 above. This section should include appropriate screenshots and supporting text to support your assertions of security. As a guide, an approximate word count for this section is 500 words.

Part 4. Recommendations for making the system ‘harder'.
Recommend what tools and techniques you would employ to ‘harden' the security of the Ubuntu 2 image so that it could be used where a more secure environment is needed (for example for e-commerce). As a guide, an approximate word count for this section is 200 words and may be in bullet point style.

Reference no: EM13936480

Questions Cloud

Occurred risk likelihood and risk impact : Name of the threat description when and where it occurred risk likelihood and risk impactHow the threat attacks the system
Which product would you recommend the bank invest in and why : The bank estimates its economic capital on product 1 to be $25 million and for product 2 to be $90 million. The bank's target hurdle rate is 20 percent. Which product would you recommend the bank invest in and why?
What parasites might the physician have suspected : What bacterial pathogens should be included in the screening of a routine stool culture, and how would the clinical laboratory scientist processing the culture recognize these potential pathogens?
Network requirements of the user and design : Create the designed file and folder structure using appropriate administration and system tools. Document the file system using a security matrix.
Infrastructure as a service (iaas) from a cloud service : An organization is planning to use Infrastructure as a Service (IaaS) from a cloud service provider to host their web site and e-commerce applications. This will consist of an appropriate number of suitably sized Linux Virtual Servers and Virtual ..
Why alcoholic acidity is determined : Why alcoholic acidity is determined and ash content is important factor in wheat flour?
What is probability of observing five operational risk event : What is the probability of observing five operational risk events in a single year for the 2000-2007 period?
Total processing speed of microprocessors : Task Part A : 1. The total processing speed of microprocessors (based on clock rate and number of circuits) is doubling roughly every year. Today, a symmetric session key needs to be 100 bits long to be considered strong. How long will a symmetric..
Explain about enterprise architecture of automotive industry : Explain a bit further. When we talk about enterprise architecture, we strategically consider the alignment of business, applications, data, and technologies. How does this fit with your thoughts on the automotive industry

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Paper on human-computer interaction

Write a paper which is called Human-computer interaction

  Benefits of binary file called registry

Write down the benefits and disadvantages of configuration in binary file called registry.

  What is a peer-to-peer network

Explain what is a peer-to-peer network and the advantages and disadvantages a peer-to-peer network has over server based networks.

  The three components represented in that cell

Write a brief statement on how you would address the three components represented in that cell.

  What will be a likely future for pnds

Why have Personal Navigation Devices become popular? What technologies are required to facilitate the success of PNDs? Who are some of the leaders in PNDs? What are the likely factors that will contribute to winning in this marketplace? What will be ..

  What is run time polymorphism

What is run time polymorphism

  Make report to print gross earnings and tax payable

Your report is to print the gross earnings, tax payable, medical levy and net earnings for each employee. At the end of the report, print the total gross earnings, total tax, total medical levy and total net earnings.

  Problem regarding advanced challenge

Currently, the contents of the Category column in the BOOKS table are the actual name for each category. This structure presents a problem if one user enters COMPUTER for the Computer category and another user enters COMPUTERS.

  Write a c++ program that prompts the user for two values

Write a C++ program that prompts the user for two values. The program then prints the two numbers in ascending order. If the two values are identical it prints a single line saying that both numbers are identical.

  An internet phone application generates packets

An Internet phone application generates packets

  Write a function print_array()

The program should have a function count() for counting the number of negative elements and the number of non-negative elements of an array, a function split() for splitting the list into negative and non-negative lists, and a function print_array..

  Human and nature dynamics (handy) model

This paper is centered around some results obtained from the Human and Nature Dynamics (HANDY) model. This model is equation 3 in their paper.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd