Discussion On Cloud Services And The SLA

Introduction less than 50 words and analysis 300 words
Attached the requirement file along with PDF book.
Chapter 3 and section 4.3 (98-102) page look
Risks and Challenges. Whole discussion should co related to this section.
=====================================================
 
We are going to explore the Web regarding cloud service level agreements (SLA).
Topic- cloud services and the SLA
A. Find an article on the Web that is no more than 4 years old that describes a poor experience with cloud services and SLAs.
B. Remember the article must contain two (2) elements to be considered in this assignment, e.g. cloud services and the SLA.  You must use your own words. Do not copy and paste any part of the article into the discussion.
C. Once you have found an appropriate article, tell the story IN YOUR OWN WORDS and correlate the pertinent elements to Erl, 2013, Chapter 3, Section 3.4.  Be selective in the article you choose to explain to the class.
D. Finally, summarize and provide your own recommendation on how to mitigate the problem(s) you described.
Here are the topics in Erl, 2013 that you must correlate your article towards.
· Reduced Operational Governance Control
· Limited Portability Between Cloud Providers
· Multi-Regional Compliance and Legal Issues
*Be sure to read Erl, 2013, Chapter 3, Section 3.4 before your Web search to avoid making a critical mistake in your discussion.
Keep your story as short as possible.  Do not exceed 450 words.  Provide a valid link (URL) to your article so that we may find and read it.
Chapter 3
Section 3.4 (Page no 98- 102)
3.4. Risks and Challenges
Several of the most critical cloud computing challenges pertaining mostly
to cloud consumers that use IT resources located in public clouds are
presented and examined.
Increased Security Vulnerabilities
The moving of business data to the cloud means that the responsibility
over data security becomes shared with the cloud provider. The remote
usage of IT resources requires an expansion of trust boundaries by the
cloud consumer to include the external cloud. It can be difficult to
establish a security architecture that spans such a trust boundary
without introducing vulnerabilities, unless cloud consumers and cloud
providers happen to support the same or compatible security
frameworks—which is unlikely with public clouds.
Another consequence of overlapping trust boundaries relates to the
cloud provider’s privileged access to cloud consumer data. The extent to
which the data is secure is now limited to the security controls and
policies applied by both the cloud consumer and cloud provider.
Furthermore, there can be overlapping trust boundaries from different
cloud consumers due to the fact that cloud-based IT resources are
commonly shared.
The overlapping of trust boundaries and the increased exposure of data
can provide malicious cloud consumers (human and automated) with
greater opportunities to attack IT resources and steal or damage business
data. Figure 3.9 illustrates a scenario whereby two organizations
accessing the same cloud service are required to extend their respective
trust boundaries to the cloud, resulting in overlapping trust boundaries.
It can be challenging for the cloud provider to offer security mechanisms
that accommodate the security requirements of both cloud service
consumers.
Figure 3.9. The shaded area with diagonal lines indicates the overlap of two organizations’
trust boundaries.
Overlapping trust boundaries is a security threat that is discussed in
more detail in Chapter 6.
Reduced Operational Governance Control
Cloud consumers are usually allotted a level of governance control that is
lower than that over on-premise IT resources. This can introduce risks
associated with how the cloud provider operates its cloud, as well as the
external connections that are required for communication between the
cloud and the cloud consumer.
Consider the following examples:
• An unreliable cloud provider may not maintain the guarantees it makes
in the SLAs that were published for its cloud services. This can
jeopardize the quality of the cloud consumer solutions that rely on these
cloud services.
• Longer geographic distances between the cloud consumer and cloud
provider can require additional network hops that introduce fluctuating
latency and potential bandwidth constraints.
The latter scenario is illustrated in Figure 3.10.
Figure 3.10. An unreliable network connection compromises the quality of
communication between cloud consumer and cloud provider environments.
Legal contracts, when combined with SLAs, technology inspections, and
monitoring, can mitigate governance risks and issues. A cloud
governance system is established through SLAs, given the “as-a-service”
nature of cloud computing. A cloud consumer must keep track of the
actual service level being offered and the other warranties that are made
by the cloud provider.
Note that different cloud delivery models offer varying degrees of
operational control granted to cloud consumers, as further explained
in Chapter 4.
Limited Portability Between Cloud Providers
Due to a lack of established industry standards within the cloud
computing industry, public clouds are commonly proprietary to various
extents. For cloud consumers that have custom-built solutions with
dependencies on these proprietary environments, it can be challenging
to move from one cloud provider to another.
Portability is a measure used to determine the impact of moving cloud
consumer IT resources and data between clouds (Figure 3.11).
Figure 3.11. A cloud consumer’s application has a decreased level of portability when
assessing a potential migration from Cloud A to Cloud B, because the cloud provider of
Cloud B does not support the same security technologies as Cloud A.
Multi-Regional Compliance and Legal Issues
Third-party cloud providers will frequently establish data centers in
affordable or convenient geographical locations. Cloud consumers will
often not be aware of the physical location of their IT resources and data
when hosted by public clouds. For some organizations, this can pose
serious legal concerns pertaining to industry or government regulations
that specify data privacy and storage policies. For example, some UK
laws require personal data belonging to UK citizens to be kept within the
United Kingdom.
Another potential legal issue pertains to the accessibility and disclosure
of data. Countries have laws that require some types of data to be
disclosed to certain government agencies or to the subject of the data.
For example, a European cloud consumer’s data that is located in the
U.S. can be more easily accessed by government agencies (due to the U.S.
Patriot Act) when compared to data located in many European Union
countries.
Most regulatory frameworks recognize that cloud consumer
organizations are ultimately responsible for the security, integrity, and
storage of their own data, even when it is held by an external cloud
provider.
Summary of Key Points
• Cloud environments can introduce distinct security challenges, some of which
pertain to overlapping trust boundaries imposed by a cloud provider sharing IT
resources with multiple cloud consumers.
• A cloud consumer’s operational governance can be limited within cloud
environments due to the control exercised by a cloud provider over its platforms.
• The portability of cloud-based IT resources can be inhibited by dependencies
upon proprietary characteristics imposed by a cloud.
• The geographical location of data and IT resources can be out of a cloud
consumer’s control when hosted by a third-party cloud provider. This can
introduce various legal and regulatory compliance concerns.

Using Loops In Python

In Python, create a program in Jython IDE (https://www.jython.org/download) or online IDE (https://repl.it/languages/python) that meets the following requirements:

  • Take two integers from the user. (Be sure to check for integer. If input is not an integer, shows an error message.
  • Save the lower number as x.
  • Save the largest integer as y.
  • Write a loop that counts from x to y by twos.
  • Print out the values of that loop using the Print function in Python.
  • Write another code section that adds x and y, and saves the value as Z.
  • Print out the values of Z using the Print function in Python.

For example: (integer inputs) 
Enter first number:
12
Enter second number:

Increment by 2 
4
6
8
10
12
sum is 16
For example: (non-integer input)
Enter first number:
12
Enter second number:
abc
Not an integer value…Good Bye
Provide the code and take a screenshot of the output, then paste the screenshot(s) into a Microsoft® Word document.
Review Chapters 6 and 11 of Python for Everyone if you have additional questions on creating a program in Python.
Submit your document.
Resources

Using Loops In Python

In Python, create a program in Jython IDE (https://www.jython.org/download) or online IDE (https://repl.it/languages/python) that meets the following requirements:

  • Take two integers from the user. (Be sure to check for integer. If input is not an integer, shows an error message.
  • Save the lower number as x.
  • Save the largest integer as y.
  • Write a loop that counts from x to y by twos.
  • Print out the values of that loop using the Print function in Python.
  • Write another code section that adds x and y, and saves the value as Z.
  • Print out the values of Z using the Print function in Python.

For example: (integer inputs) 
Enter first number:
12
Enter second number:

Increment by 2 
4
6
8
10
12
sum is 16
For example: (non-integer input)
Enter first number:
12
Enter second number:
abc
Not an integer value…Good Bye
Provide the code and take a screenshot of the output, then paste the screenshot(s) into a Microsoft® Word document.
Review Chapters 6 and 11 of Python for Everyone if you have additional questions on creating a program in Python.
Submit your document.
Resources

Topic :The Future of Blockchain

Topic :The Future of Blockchain

This week’s reading discussed the current state of blockchain technology and suggested what the technology may look like in the near future. The author provided several suggestions that would increase blockchain’s value to the enterprise. Create a new thread and choose whether you would consider interoperability or scalability to be more important to blockchain’s future. Explain your decision and use examples from . Then think of three questions you’d like to ask other students and add these to the end of your thread. The questions should be taken from material you read or videos you watched from this week’s assigned activities. You’re not trying to test each other, but you are trying to start a discussion.
You must do the following:
1) Create a new thread. As indicated above, create a new thread, and choose whether you would consider interoperability or scalability to be more important to blockchain’s future. Explain your decision and use examples from . Then think of three questions you’d like to ask other students and add these to the end of your thread. The questions should be taken from material you read or videos you watched from this week’s assigned activities. You’re not trying to test each other, but you are trying to start a discussion.
2) Select AT LEAST 3 other students’ threads and post substantive comments on those threads. Your comments should answer AT LEAST one of the questions posed in the thread and extend the conversation started with that thread. Make sure that you include the question in your comment so I can see what question you’re answering.
ALL original posts and comments must be substantive AND ORIGINAL. (I’m looking for about a paragraph – not just a short answer.) Do not plagiarize!! Use your own words

Topic :The Future of Blockchain

Topic :The Future of Blockchain

This week’s reading discussed the current state of blockchain technology and suggested what the technology may look like in the near future. The author provided several suggestions that would increase blockchain’s value to the enterprise. Create a new thread and choose whether you would consider interoperability or scalability to be more important to blockchain’s future. Explain your decision and use examples from . Then think of three questions you’d like to ask other students and add these to the end of your thread. The questions should be taken from material you read or videos you watched from this week’s assigned activities. You’re not trying to test each other, but you are trying to start a discussion.
You must do the following:
1) Create a new thread. As indicated above, create a new thread, and choose whether you would consider interoperability or scalability to be more important to blockchain’s future. Explain your decision and use examples from . Then think of three questions you’d like to ask other students and add these to the end of your thread. The questions should be taken from material you read or videos you watched from this week’s assigned activities. You’re not trying to test each other, but you are trying to start a discussion.
2) Select AT LEAST 3 other students’ threads and post substantive comments on those threads. Your comments should answer AT LEAST one of the questions posed in the thread and extend the conversation started with that thread. Make sure that you include the question in your comment so I can see what question you’re answering.
ALL original posts and comments must be substantive AND ORIGINAL. (I’m looking for about a paragraph – not just a short answer.) Do not plagiarize!! Use your own words

PKI and Encryption at Work

PKI and Encryption at Work

Learning Objectives and Outcomes

  • Develop a plan to deploy public key infrastructure (PKI) and encryption solutions to protect data and information.

Assignment Requirements
In this assignment, you play the role of chief information technology (IT) security officer for the Quality Medical Company (QMC). QMC is a publicly traded company operating in the pharmaceutical industry.
 
QMC is expanding its arena of work through an increase in the number of clients and products. The senior management of the company is highly concerned about complying with the multitude of legislative and regulatory laws and issues in place. The company has an internal compliance and risk management team to take care of all the compliance-related issues. The company needs to make important decisions about the bulk of resources they will need to meet the voluminous compliance requirements arising from the multidimensional challenge of expansion.
 
QMC will be required to conform to the following compliance issues:

  • Public-company regulations, such as the Sarbanes-Oxley (SOX) Act
  • Regulations affecting financial companies, companies that make loans and charge interest, such as the U.S. Securities and Exchange Commission (SEC) rules and Gramm-Leach-Bliley Act (GLBA)
  • Regulations affecting healthcare privacy information, such as Health Insurance Portability and Accountability Act (HIPAA)
  • Intellectual Property Law that is important for information asset protection particularly for organizations in the pharmaceutical and technology industry
  • Regulations affecting the privacy of information, including personal identification information, such as personally identifiable information (PII) regularly collected from employees, customers, and end users
  • Corporate governance policies including disclosures to the board of directors and the auditors and the policies related to human resources, governance, harassment, code of conduct, and ethics

 
Compliance with regulatory requirements implies encrypting sensitive data at rest (DAR) and allowing access to role-holders in the enterprise who require the access. It also implies that sensitive data in motion (DIM) or data that is being communicated via e-mail, instant message (IM), or even Web e-mail must be suitably protected and sent only to the individuals who have a right to view it. The company is conscious about the loss they may face in terms of penalty and brand damage if they fail to abide by the compliance laws, especially in the online information transfer phase. Therefore, as a dedicated employee, your task is to develop a content monitoring strategy using PKI as a potential solution. You will need to determine a process or method to identify multiple data types, processes, and organizational policies. Incorporate them into a plan, and select a PKI solution that will effectively address the content management needs of your company.
You need to present your PKI solution in the form of a professional report to the senior management.
Required Resources
None
Submission Requirements

  • Format: Microsoft Word
  • Font: Arial, 12-Point, Double-Space
  • Citation Style: APA
  • Length: 1–2 pages

Self-Assessment Checklist
Use the following checklist to support your work on the assignment:

  • I have identified specific data types related to the specific compliance regulatory requirements.
  • I have indicated a solution for sharing data beyond the borders of the organization.
  • I have appropriately selected and developed a PKI solution for content control.
  • I have followed the submission requirements.

NETWORKING TECHNOLOGY FOR INDUSTRY ANALYSIS ASSIGNMENT

ETCS 680 NETWORKING TECHNOLOGY FOR INDUSTRY ANALYSIS ASSIGNMENT 3
1. List five common applications of the Internet.
2. In the Internet address www.qxrj.net, what is the type of domain and what is the host?
3. What symbol or character designates an e-mail address?
4. Name the three most common ways that a person accesses the Internet from home.
5. What do you call the company that provides an Internet connection to subscribers?
6. What piece of software is needed to access the World Wide Web?
7. What networking technology is gradually replacing ATM and SONET in the backbone?
8. What is the size of the packet used in ATM systems?
9. What piece of equipment is used in the transmission of ATM packets?
10. What are the main advantages of OTN over SONET?
11. What network topologies are common with SONET?
12. What are the designation and speed of the fastest SONET connection?
13. Name the equipment used to get data into and out of a SONET system.
14. What is the total number of bytes or octets in a SONET frame?
15. True or false? SONET can be used to carry packetized data.
16. What is the fastest current OTN data rate?
17. What is the maximum payload of an OTN frame?
18. What FEC is used in OTN?
19. What specifically does a router look for during packet transmission?
20. How does a router know where to send a packet?
21. What is the name of the basic input/output interfaces used in routers?
22. What is the name of the circuit that lets any input be connected to any output in a router?
23. Why is the line rate of an OTN packet higher than the actual data rate?
24. What is the name of the circuit used for serial-to-parallel conversion?
25. What is the name given to the fiber-optic network making up the Internet?
26. What WAN transmission media and protocols are used in the Internet?
27. Explain the process of packet switching.
28. What is the name of the equipment used to inspect every packet transmitted over the Internet?
29. What software protocol prepares packets for transmission over the Internet?
30. What software protocol actually transmits the packets?
31. What software makes sure that any packets transmitted out of sequence get reassembled correctly?
32. Is TCP actually called into play during a packet’s transmission from source to destination? Explain.
33. Name the two basic speeds of the Internet backbone.
34. What name is given to the format of an IP address?
35. How many different classes of IP addresses are there?
36. What devices are identified by IP addresses in classes A, B, and C?
37. In the IP address 133.46.182.9, identify the class, network ID, and host ID.
38. What is a mask?
39. What logical process is used with the mask and the IP address?
40. What is a subnet?
41. What are the two names given to clusters of disk drives used for massive storage?
42. What is the name given to external disk drives connected to a PC or server via the SCSI?
43. What is SCSI? What is its nickname?
44. Name the two kinds of large-scale storage system networked to PCs. What is the main difference between them?
45. In a SAN, what is the name of the interface and protocol used in connecting the disk drive systems to the servers?
46. What is the physical medium used in an FC system?
47. What are the speeds of transmission of an FC system?
48. Name the interface used to attach a server or disk system to the SAN.
49. How are servers and disk systems connected to one another in a SAN?
50. What is the name of the SAN interface used in place of FC?
PROBLEMS 
1. What is the shortest time for transmitting 50 ATM packets at 2.5 Gbps?
2. How many bits does it take to represent an IPv4 address of 124.76.190.38?
3. Convert the IPv4 address 222.155.8.17 to binary and hexadecimal.
4. Logically AND the number 125 with 128, 0, 15, and 240. Express the result in decimal.
5. How many bits and octets are there in the IPv6 address of: 0123:2456:789A:BCDE:F987:6543:210A:EF75?

Assistive technology

1. Explain how categories of assistive technology are identified based upon the seven areas of human function.
2.Summarize the core components of collaboration and who should be involved to provide appropriate assistive technology supports and services.
Chapter 12
3. Describe the difference between gross and fine motor skills
4. List and describe some of the common motor difficulties for individuals with autism. Review the case studies on page 192 and identify their motor skills deficiencies
Chapter 13
5. Respond to Case Study 2: Teaching sexuality education through collaboration on page 208. Provide an example of how to implement collaboration strategies to use when working with the IEP team.
6. Idenitfy appropriate curricula for teaching sexuality

Assistive technology

1. Explain how categories of assistive technology are identified based upon the seven areas of human function.
2.Summarize the core components of collaboration and who should be involved to provide appropriate assistive technology supports and services.
Chapter 12
3. Describe the difference between gross and fine motor skills
4. List and describe some of the common motor difficulties for individuals with autism. Review the case studies on page 192 and identify their motor skills deficiencies
Chapter 13
5. Respond to Case Study 2: Teaching sexuality education through collaboration on page 208. Provide an example of how to implement collaboration strategies to use when working with the IEP team.
6. Idenitfy appropriate curricula for teaching sexuality

Information Security Governance

This week we discuss Information Security Governance.  Discuss ISG.  Discuss how ISG moves information security beyond technical decisions and makes security a strategic decision.  How and why does ISG move information security from the technical arena to the business arena.  Discuss why this is necessary.
Answer the question with a short paragraph, between 250 and 350 words.  Brevity is a virtue.  That is why you are limited to 350 words.  If you can’t present your hypothesis in 350 words or less then it is too complicated.   Remember that when you state a fact if you don’t provide a reference, it is not a fact but rather an opinion.