Infrastructure as a service (iaas) from a cloud service

Assignment Help Basic Computer Science
Reference no: EM13936480

The Scenario

An organization is planning to use Infrastructure as a Service (IaaS) from a cloud service provider to host their web site and e-commerce applications. This will consist of an appropriate number of suitably sized Linux Virtual Servers and Virtual Storage. These servers will support the various software components including: load balancer, web server, application and database server. The cloud service provider is responsible for securing the infrastructure that supports the virtual machines, storage and network. However the tenant (i.e. the organization using the service) is responsible for securing the Operating System, and the components of their application. The task for this assignment is to secure these virtual servers.

Assignment Task

Computer security aims to ensure the confidentiality, integrity and availability of systems and information. Due to the wide-ranging environments and platforms that are in use, and the lack of security awareness by many users, security is a complex task. This has resulted in a high level of data breaches and financial loss to businesses from threats ranging from insider fraud through to organized cyber-crime.
This assignment requires you to provide security functionality for an Ubuntu operating system (OS). First, you are required to discuss appropriate tools and techniques for the provision of security for this OS. The level of security required (ensuring confidentiality, integrity and availability) is appropriate for the non-ecommerce systems in the above scenario (i.e. the servers supporting the organization's informational website). Second, you are to demonstrate the implementation of the tools and techniques identified by your research and introduced in the lab sessions to the Ubuntu 2* virtual machine (VM). Third, you will demonstrate that the levels of security required have been achieved by using employing appropriate tools and techniques to test and demonstrate the security of the Ubuntu 2 OS. Finally, you are to provide a number of recommendations to raise the level of security of this OS to meet the needs of a more secure environment for example to support the e-commerce requirements.

Details of Tasks

Part 1. Discussion of tools and techniques for securing a Linux Server.

You are required to write a report with references to papers in journals, conference proceedings, Web sites or books on securing computer systems for an SME user. This should focus on the Linux operating system and in particular Ubuntu. The level of security required is deemed to be ‘medium', i.e. the system supports the business informational website and ensures that confidentiality, integrity and availability of the OS is maintained. As a guide, an approximate word count for this section is 800 words.

Part 2. Demonstrate Securing an Ubuntu System.

Using the VirtualBox VM image Ubuntu 2*, implement the level of security as detailed in part 1. To demonstrate the tools and techniques used to make this system more secure than an ‘out-of-the-box' installation, this section should include appropriate screenshots and supporting text. As a guide, an approximate word count for this section is 500 words.

Part 3. Demonstration of security achieved.
Using tools introduced during lab sessions in this module and other appropriate techniques, demonstrate that the OS has been made more secure by undertaking part 2 above. This section should include appropriate screenshots and supporting text to support your assertions of security. As a guide, an approximate word count for this section is 500 words.

Part 4. Recommendations for making the system ‘harder'.
Recommend what tools and techniques you would employ to ‘harden' the security of the Ubuntu 2 image so that it could be used where a more secure environment is needed (for example for e-commerce). As a guide, an approximate word count for this section is 200 words and may be in bullet point style.

Reference no: EM13936480

Questions Cloud

Occurred risk likelihood and risk impact : Name of the threat description when and where it occurred risk likelihood and risk impactHow the threat attacks the system
Which product would you recommend the bank invest in and why : The bank estimates its economic capital on product 1 to be $25 million and for product 2 to be $90 million. The bank's target hurdle rate is 20 percent. Which product would you recommend the bank invest in and why?
What parasites might the physician have suspected : What bacterial pathogens should be included in the screening of a routine stool culture, and how would the clinical laboratory scientist processing the culture recognize these potential pathogens?
Network requirements of the user and design : Create the designed file and folder structure using appropriate administration and system tools. Document the file system using a security matrix.
Infrastructure as a service (iaas) from a cloud service : An organization is planning to use Infrastructure as a Service (IaaS) from a cloud service provider to host their web site and e-commerce applications. This will consist of an appropriate number of suitably sized Linux Virtual Servers and Virtual ..
Why alcoholic acidity is determined : Why alcoholic acidity is determined and ash content is important factor in wheat flour?
What is probability of observing five operational risk event : What is the probability of observing five operational risk events in a single year for the 2000-2007 period?
Total processing speed of microprocessors : Task Part A : 1. The total processing speed of microprocessors (based on clock rate and number of circuits) is doubling roughly every year. Today, a symmetric session key needs to be 100 bits long to be considered strong. How long will a symmetric..
Explain about enterprise architecture of automotive industry : Explain a bit further. When we talk about enterprise architecture, we strategically consider the alignment of business, applications, data, and technologies. How does this fit with your thoughts on the automotive industry

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is a lan how does the implementation of a lan work

You are employed as an engineer for a startup company. The company is now in the planning stage, and some important decisions must be made about what technology will be leveraged. The company is to be headquartered in Chicago, with small branch..

  Write a program and create a flow chart

The game of Nim. This is a well-known game with a number of variants. We will consider the following variants, which has an interesting winning strategy. Two players alternately take marbles from a pile.

  Application that would have a very low cache

Can you think of an application that would have a very low cache and main memory hit rate and give an example of a very simple program whose data references demonstrate locality of reference?

  Write a program that instantiates objects of your classes

Write a program that instantiates objects of your classes and outputs each object's area (except Quadrilateral).

  Develop a contingency plan for ipremier

Develop a contingency plan for iPremier to be better prepared for similar future events

  Forest point construction at forest point construction

Forest Point Construction At Forest Point Construction, your boss says that he can estimate the total project time based on his personal experience. You are trying to convince him that he should use project management techniques to handle a comple..

  How success or failure of restoration effort is estimated

Expalin why and how is success or failure of restoration effort estimated? Write down some significant considerations in creating monitoring plan to estimate restoration effort?

  Write an application that accepts a user''s password

Write an application that accepts a user's password from the keyboard. When the entered password has fewer than six characters, more than 10 characters, or does not contain at least one letter and one digit, prompt the user again.

  Why is enumeration useful?

Why is port scanning useful? Why would attackers scan systems and networks?

  Public peering and private peering in net neutrality

What is the difference between "public peering" and "private peering"?

  Embed charts and tables

Embed charts and/or tables within the paper as needed..

  What is a good ide for c# coding specially for game design

What is a good IDE for C# coding specially for game design?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd