Project Name: Desktop Virtualization with Directory via
Workspaces
Technology: Cloud Computing
Market: Desktop Replacement, Thin Client
AWS: Workspaces, WorkDocs, Directory Services (Microsoft AD,
Simple AD, etc.), VPC
Intended Services to Provision:
Virtual Desktop (Windows)
Design:
Your goal is to document the process of setting up an example
for desktop virtualization.
Important Note:
At this stage in the course we are beginning to architect,
configure, and deploy real services in the public cloud
(specifically AWS). When you are beginning designing and...
How would you describe virtualization? What role does
virtualization play in a cloud computing platform? Under what
circumstances would you recommend a cloud platform over
Virtualbox?
What is cloud computing from a "* as a Service"
perspective? How does virtualization work on say, VirtualBox? What
role does virtualization play on the cloud platform?
What are some differences between using a Cat6 cable and
Wi-Fi for say, watching Netflix? What security implications can you
think of between the two approaches? Use layers to
explain.
What are the advantages of IPv6 over IPv4? Why is
security often considered to be a major advantage in
IPv6?
What is cloud...
5. Virtualization and cloud computing are rapidly expanding into
the enterprise as viable solutions. Discuss the connections between
these two technologies and the security implications of a virtual
network infrastructure in the cloud vs. a physical network
infrastructure onsite.
Do you use virtualization and/or cloud computing at home or at
work? If so, how? Which applications do you use? Do you like
them/hate them? Do you have any recommendations for us?
If you have limited experience working with cloud
computing/virtualization, do some research on different services
available. Which do you think you might consider using in the
future?
Many firms are relying on cloud
computing, also known as “the cloud,” to perform key business
functions. By moving transactional processing to the cloud, firms
are exposing themselves to additional attacks as well as to tighter
scrutiny from regulators and stakeholders. From the e-Activity,
assume that you are the CFO of Amazon.com. Create an argument
indicating how your firm will be able to balance the needs of
security with the desire of being a dominant player in the global
market....
Describe the following cloud computing
concepts:
Connectivity issues (as a business concern)
Virtualization
High availability
Containerization
Describe the following cloud computing principles as it relates
to cloud security:
Malicious service agent
Trusted attacker
Traffic eavesdropping
Overlapping trust boundaries
1. Explain the purpose of resource pooling in regards to cloud
computing.
2.When data is uploaded to a cloud service provider's
infrastructure, it is often said the organization loses physical
control over their data. Explain how this is not entirely true.
3. Select the cloud technology that best fits the following
scenario. A VM is allocated 8GB of memory and averages 3 to 4GB of
memory utilization. Another VM is started and needs an additional
4GB of memory. The hypervisor...