Service (iaas) from a cloud service provider

Assignment Help Basic Computer Science
Reference no: EM13936435

The Scenario

An organization is planning to use Infrastructure as a Service (IaaS) from a cloud service provider to host their web site and e-commerce applications. This will consist of an appropriate number of suitably sized Linux Virtual Servers and Virtual Storage. These servers will support the various software components including: load balancer, web server, application and database server. The cloud service provider is responsible for securing the infrastructure that supports the virtual machines, storage and network. However the tenant (i.e. the organization using the service) is responsible for securing the Operating System, and the components of their application. The task for this assignment is to secure these virtual servers.

Assignment Task

Computer security aims to ensure the confidentiality, integrity and availability of systems and information. Due to the wide-ranging environments and platforms that are in use, and the lack of security awareness by many users, security is a complex task. This has resulted in a high level of data breaches and financial loss to businesses from threats ranging from insider fraud through to organized cyber-crime.
This assignment requires you to provide security functionality for an Ubuntu operating system (OS). First, you are required to discuss appropriate tools and techniques for the provision of security for this OS. The level of security required (ensuring confidentiality, integrity and availability) is appropriate for the non-ecommerce systems in the above scenario (i.e. the servers supporting the organization's informational website). Second, you are to demonstrate the implementation of the tools and techniques identified by your research and introduced in the lab sessions to the Ubuntu 2* virtual machine (VM). Third, you will demonstrate that the levels of security required have been achieved by using employing appropriate tools and techniques to test and demonstrate the security of the Ubuntu 2 OS. Finally, you are to provide a number of recommendations to raise the level of security of this OS to meet the needs of a more secure environment for example to support the e-commerce requirements.

Details of Tasks

Part 1. Discussion of tools and techniques for securing a Linux Server.
You are required to write a report with references to papers in journals, conference proceedings, Web sites or books on securing computer systems for an SME user. This should focus on the Linux operating system and in particular Ubuntu. The level of security required is deemed to be ‘medium', i.e. the system supports the business informational website and ensures that confidentiality, integrity and availability of the OS is maintained. As a guide, an approximate word count for this section is 800 words.

Part 2. Demonstrate Securing an Ubuntu System.
Using the VirtualBox VM image Ubuntu 2*, implement the level of security as detailed in part 1. To demonstrate the tools and techniques used to make this system more secure than an ‘out-of-the-box' installation, this section should include appropriate screenshots and supporting text. As a guide, an approximate word count for this section is 500 words.

Part 3. Demonstration of security achieved.
Using tools introduced during lab sessions in this module and other appropriate techniques, demonstrate that the OS has been made more secure by undertaking part 2 above. This section should include appropriate screenshots and supporting text to support your assertions of security. As a guide, an approximate word count for this section is 500 words.

Part 4. Recommendations for making the system ‘harder'.
Recommend what tools and techniques you would employ to ‘harden' the security of the Ubuntu 2 image so that it could be used where a more secure environment is needed (for example for e-commerce). As a guide, an approximate word count for this section is 200 words and may be in bullet point style.

Reference no: EM13936435

Questions Cloud

Discuss the differences between formulas and functions : Discuss the differences between formulas and functions. Pick a function in Excel and discuss how that function is used to calculate results in your worksheets. Review your classmates posts to make sure that you're not duplicating formulas/functions a..
Ben ren and vectra suddenly realize that they have no idea : So Ben Ren and Vectra suddenly realize that they have no idea what a force is (other than "the Force is what gives a Jedi his power. It's an energy field created by all living things. It surrounds us and penetrates us; it binds the galaxy together.")..
Convert infix to postfix and also calculate the result : I have to convert infix to postfix and also calculate the result. We have been given test data via a text file.
How many bacteria were on the soap : Starting with four bacterial cells per cm3 in a rich nutrient medium, with a 20-minutes generation time, how many cells will there be in 1 dm3 of this culture after 1 hour?
Service (iaas) from a cloud service provider : An organization is planning to use Infrastructure as a Service (IaaS) from a cloud service provider to host their web site and e-commerce applications. This will consist of an appropriate number of suitably sized Linux Virtual Servers and Virtual ..
Advice on strategies for your project execution : You have been told during this process to reach out to other CA City Retail Group Cafés to obtain appropriate advice on strategies for your project execution. What are three questions you could ask to guarantee success - Explain the process for ide..
Show how this priority queue is affected by adding string : To tell if one element in ZooGraph has relation X to another element, you look for a path between them. Show whether the following statements are true, using the picture or adjacency matrix.
Evaluation and interpretation of criminal justice data : Discuss why these aspects were selected. Describe how the selected aspects relate to the evaluation and interpretation of criminal justice data and research findings. Explain why researchers would consider qualitative methods an artistic expression o..
Organization and develop an information security strategy : The task is to carry out an information security risk assessment for an organization and develop an Information Security Strategy for that organization. This should include, at least:

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Service level agreements

Write a short paper on Service Level Agreements. Pick a topic, do the research, use references, be careful about plagiarism, and have fun. Select a specific topic within SLAs, not a general definition.

  Write voip research paper

Write VoIP Research Paper. Write a term paper in which you introduce the issue, define the problem, research the literature, analyze the problem, offer possible solutions, propose a single solution, develop an implementation plan, and justify why/..

  Find datagrams needed to send mp3 of several bytes

Suppose 20-byte TCP header and 20-byte IP header, how many datagrams would be needed to send MP3 consisting of 4 million bytes? Illustrate your work.

  Software development life cycle

Literature Review - 3-4 pages Take the paper to next level. Identify about 15 scholarly articles using VIU library resources as related to your topic, extract information as needed and blend the content into your paper with suitable sections

  Find integers q and r

Q1. For each of the following values of n and d find integers q and r such that n =dq+r and 0≤r

  Write a c program using the fork() system

Write a C program using the fork() system call that generates this sequence in the child process. The starting number will be provided from the command line. For example, if 8 is passed as a parameter on the command line, the child process will ou..

  Implement a binary search or avl tree

You are to implement a Binary Search or AVL tree containing the details of known criminals.  The criminal object must minimally contain the following information.

  Find the transmission rate in bits per second

Suppose all headers (including RTP, UDP and IP) have a total length of h and an IP datagram is emitted every 40 msecs.

  Fsm packet sending and receiving protocols

Consider a scenario in which a Host, A, wants to simultaneously send messages to Hosts B, C, and D. A is connected to B, C, and D via a broadcast channel, and a packet sent by A is carried by this channel to each of B, C, and D.

  What command is used to save the standard output in a file

What command is used to save the standard output in a file, as well as display it on the terminal?

  Calculations and reporting

Project managers do a lot more than calculations and reporting; they must keep the team on track, ensure ethical decisions are made, deal with conflict, and, depending on the type of organization, they may perform employee evaluations, issue bonuses,..

  Design two level and-or and not circuit

Design a two level AND , OR ,NOT circuit for the following I/O priority circuit,when the ack input is true ack will be made true for the smallest j for which req is true.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd