Question

In: Computer Science

Sub: cloud computing Based on below scenario answer the question With DTGOV’s client portfolio expanding to...

Sub: cloud computing

Based on below scenario answer the question

With DTGOV’s client portfolio expanding to include public-sector organizations, many of it cloud computing policies have become unsuitable and require modification. Considering that public-sector organizations frequently handle strategic information, security safeguards needs to be established to protect data manipulation and to establish a means of auditing activities that may impact government operations.
What security measures would have been implemented by DTGOV to resolve this?

Solutions

Expert Solution

Answer:

Cloud Security Mechanisms:

-Encryption

-Hashing

-Digital Signature

-Public Key Infrastructure(PKI)

-Identity and Access Management(IAM)

-Single Sign-On(SSO)

-Cloud-Based Security Groups

-Hardened Virtual Server Images.

Digital Signature:

The digital signature mechanism is a means of providing data authenticity and integrity through authentication and non-repudiation.A message is assigned a digital signature prior to transmission,which is then rendered invalid if the message experiences any subsequent,unauthorized modifications.A digital signature provides evidence that the message received is the same as the one created by its rightful sender.

Both hashing and asymmetrical encryption are involved in the creation of a digital signature,which essentially exists as a message digest that was encrypted by a private key and appended to the original message.The recipient verifies the signature validity the signature validity and uses the corresponding public key to decrypt the digital signature,which produces this message digest.Identical results from the two different processes indicate that the message maintained its integrity.

DTGOV proceeds to implement the digital signature mechanism.Virtual server self-provisioning inside the IaaS environment and the tracking functionality of realtime SLA and billing are all performed via Web portals.As a result,user error or malicious actions could result in legal and financial consequences.

-Whenever a cloud consumer performs a management action that is related to IT resources provisioned by DTGOV,the cloud service consumer program must include a digital signature in the message request to prove the legitimacy of its user.

Digital signatures provides DTGOV with the guarantee that every action performed is linked to its legitimate originator.Unauthorized access is expected to become highly improbable,since digital signatures are only accepted if the encryption key is identical to the secret key held by the rightful owner.Users will not have grounds to deny attempts at message adulteration because the digital signatures will confirm message integrity.


Related Solutions

Subject: cloud computing Based on below case, answer the question The migration of applications to ATN’s...
Subject: cloud computing Based on below case, answer the question The migration of applications to ATN’s new PaaS platform was successful, but also raised a number of new concerns pertaining to the responsiveness and availability of PaaS-hosted IT resource. ATN intends to move more applications to a PaaS platform, but decides to do so by establishing a second PaaS environment with a different cloud provider. This will allow them to compare cloud providers during a three month assessment period. Discuss...
Subject : Professional ethics in computing Based on the given scenario answer the following question Software...
Subject : Professional ethics in computing Based on the given scenario answer the following question Software Engineer Christopher is hired by software company, ABC Software, and involved in the design of specialized software for Gladstone City Council (GCC) in connection with the operations of facilities that impact on public health and safety, such as those that control air and water quality. Testing the software system is part of the design process. Christopher conducts extensive testing and finds that the software...
5. Virtualization and cloud computing are rapidly expanding into the enterprise as viable solutions. Discuss the...
5. Virtualization and cloud computing are rapidly expanding into the enterprise as viable solutions. Discuss the connections between these two technologies and the security implications of a virtual network infrastructure in the cloud vs. a physical network infrastructure onsite.
Answer the question below based on the following scenario: A company has $1,000,000 in annual sales...
Answer the question below based on the following scenario: A company has $1,000,000 in annual sales and the owner pays himself 100% of profits. The cost-of-goods-sold is $900,000. The company manufactures 9,000 units each year. The present defect rate is about 3%. Assume that the price/unit is based on this information and is equal in each of the scenarios. Also, 1) the cost/unit is calculated by dividing the number of saleable units by the total cost of goods sold and,...
What, in your opinion, is the difference in decentralized/distributed (client/server) architecture and centralized (Cloud Computing or...
What, in your opinion, is the difference in decentralized/distributed (client/server) architecture and centralized (Cloud Computing or Mainframe) architecture? Give an example of a business decision that would be affected by the choice of the architecture
What is the cloud computing delivery model for Amazon S3. Justify your answer.
What is the cloud computing delivery model for Amazon S3. Justify your answer.
Project 1: Cloud computing has become a viable and competitive option to the client/server networking model...
Project 1: Cloud computing has become a viable and competitive option to the client/server networking model due to its lower cost, scalability, and agility. A local business in your town has asked you to develop a full plan, an analysis to determine the requirement and a design to specify the input, output, and processing prerequisites. Since you are a knowledgeable systems analyst, you have decided to take the job. You understand all the benefits that come along with cloud computing....
Discuss 3 risks and 3 benefits of cloud-based computing especially as it relates to the expenditure...
Discuss 3 risks and 3 benefits of cloud-based computing especially as it relates to the expenditure cycle of an organization.
Answer the following four sub-questions. Each sub-question is independent and has no no link with the...
Answer the following four sub-questions. Each sub-question is independent and has no no link with the other sub questions. a) Two neutral spheres are spaced 3 m apart. Calculate how many electrons must be transferred from one sphere to another so that they each experience a force of 14 N, and say whether the forces will be attractive or repulsive. b) Calculate the uniform electric field to be applied parallel to a moving proton at 2⋅106 m / s in...
this question is related to cloud computing. Describe how S3 handles consistency of objects and how...
this question is related to cloud computing. Describe how S3 handles consistency of objects and how this approach affects the state of objects when they are read using a GET.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT