Cloud Computing

Cloud computing originally surfaced around 2007 as simply a means of offloading services from the local intranet to the Internet itself.

Although services such as email have long been put in such an environment, many other services have migrated to cloud-based offerings over the past decade. Services such as scheduling, storage, and infrastructure and thousands of other services have become offerings now available over the Internet and in the cloud.

Organizations started moving services to the cloud for several reasons: lower support costs, reduced internal resource requirements, reduced personnel requirements, and increased flexibility and capacity.

Cloud service providers offer a wide range of cloud services. The most popular types of offerings are based on three models: Platform as a Service (PaaS), Software as a Service (SaaS), and Infrastructure as a Service (IaaS).

Google Docs would be a good example of SaaS because it is available from anywhere and runs over the Internet. Some companies, such as Microsoft, have used this model as a way to allow applications to be used on a subscription basis rather than through the standard licensing model.

IaaS typically refers to a virtual environment in the cloud, in which a business or individual obtains, or provisions, hardware services as needed. Cloud capacity can be provisioned with greater or fewer resources, based on the current needs. Because the infrastructure is cloud based and not owned by the client, the costs typically are lower and paid only as needed. The more resources are used, the more the client will pay. Additionally, companies have realized higher reliability and uptime because cloud vendors provide dedicated environments.

The third cloud computing model is PaaS. This model lives between IaaS and SaaS. With PaaS, the client not only rents access to a virtual infrastructure but also access to certain preinstalled software components. For example, an IaaS offering may provide a collection of virtual machines and storage nodes. The client must install everything. With PaaS, the client would rent access to virtual machines with operating systems, databases, and web servers already installed and configured and any other system-wide software as necessary.

In cloud environments, there are some security issues that can arise above and beyond what is observed with traditional, on-premises environments.

  • Availability—Because the environment is offsite and accessed by an Internet connection, any Internet outages would affect accessibility of services.

  • Reliability—Again, because the service is in another’s hands, subscribers may find themselves at the whims of the vendor. However, cloud service providers invest heavily to ensure minimum uptime guarantees.

  • Loss of control—When services and other items are hosted internally, the company is in control of the stability of its environment. Once these services are moved offsite, control of resources is decreased because it is now handled by another party.

Although there are concerns and potential drawbacks to migrating to cloud computing, a growing number of organizations have already determined that the benefits outweigh the risks. Cloud computing is a reality in most of today’s organizations. It is expected to continue to increase in popularity as computing services move closer and closer to commodity service offerings.

CHAPTER 9 ASSESSMENT

  1.   1. Input validation is a result of SQL injections.

    1. A. True

    2. B. False

  2.   2. Web applications are used to ________.

    1. A. Allow dynamic content

    2. B. Stream video

    3. C. Apply scripting

    4. D. Impose security controls

  3.   3. Which of the following challenges can be solved by firewalls?

    1. A. Protection against buffer overflows

    2. B. Protection against scanning

    3. C. Enforcement of privileges

    4. D. Ability to use nonstandard ports

  4.   4. Databases can be a victim of source code exploits.

    1. A. True

    2. B. False

  5.   5. The stability of a web server does not depend on the operating system.

    1. A. True

    2. B. False

  6.   6. ________ are scripting languages. (Select two.)

    1. A. ActiveX

    2. B. JavaScript

    3. C. CGI

    4. D. PHP

  7.   7. ________ is used to audit databases.

    1. A. Ping

    2. B. IPConfig

    3. C. NCC SQuirreL

    4. D. SQLRECON

  8.   8. Browsers do not display ________.

    1. A. ActiveX

    2. B. Hidden fields

    3. C. Java

    4. D. JavaScript

  9.   9. ________ can be caused by the exploitation of defects and code.

    1. A. Buffer overflows

    2. B. SQL injection

    3. C. Buffer injection

    4. D. Input validation

  10. 10. Which cloud computing service model provides a virtual infrastructure and some preinstalled software components?

    1. A. IaaS

    2. B. PaaS

    3. C. DBsaaS

    4. D. SaaS

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
13.58.82.79