Chapter 6 The Cloud How About $10 Per Terabyte. Lease storage capacity from third party. All incoming data from drones automatically uploaded.
Average monthly storage costs cut at least 50%. Power savings, backup time saved, no new hardware configuration. One-time set up and development costs. Copyright 2017 Pearson Education, Inc. 6-2 Study Questions Q1: Why is the cloud the future for most organizations? Q2: What network technology supports the cloud?
Q3: How does the cloud work? Q4: How do organizations use the cloud? Q5: How can Falcon Security use the cloud? Q6: How can organizations use cloud services securely? Q7: 2026? Copyright 2017 Pearson Education, Inc. 6-3 Q1: Why Is the Cloud the Future for Most Organizations?
The Cloud Elastic leasing of pooled computer resources via Internet. Elastic Automatically adjusts for unpredictable demand, Limits financial risks. Pooled Same physical hardware Economies of scale Copyright 2017 Pearson Education, Inc. 6-4
Example of a Video Banner Ad Customer Copyright 2017 Pearson Education, Inc. 6-5 Pooled Economies of scale Average cost decreases as size of operation increases. Major cloud vendors operate enormous data centers (Web farms).
Copyright 2017 Pearson Education, Inc. 6-6 Apple Data Center in Maiden, NC Billion-dollar facility contains more than 500,000 sq. ft.
Copyright 2017 Pearson Education, Inc. 6-7 Why Is the Cloud Preferred to In-House Hosting? Copyright 2017 Pearson Education, Inc. 6-8 Why Is the Cloud Preferred to In-House Hosting?
(cont'd) Copyright 2017 Pearson Education, Inc. 6-9 Why Now? 1. Cheap processors, essentially free data communication and storage. 2. Virtualization technology. 3. Internet-based standards enable flexible, standardized processing capabilities.
Copyright 2017 Pearson Education, Inc. 6-10 When Does the Cloud Not Make Sense? When law or standard industry practice require physical control or possession of the data. Financial institutions legally required to maintain physical control over its data. Copyright 2017 Pearson Education, Inc.
6-11 Ethics Guide: Cloudy Profit? Data broker (or data aggregator). Acquiring and analyzing market, buyer, and seller data for real estate agents. Alliance transitioned data storage and processing from own Web farm to the cloud. Improved speed and quality of data services at fraction of prior costs, cut in-house hardware support staff by 65%. Plowing money back into R&D.
Copyright 2017 Pearson Education, Inc. 6-12 Q2: What Network Technology Supports the Cloud? Copyright 2017 Pearson Education, Inc. 6-13
Typical Small Office/Home Office (SOHO) LAN Copyright 2017 Pearson Education, Inc. 6-14 LAN Protocol IEEE 802.3 Bluetooth
Wired LAN Transmits data short distances. 10/100/1000 Mbps Connect computer, keyboard, Ethernet mouse, printer, smartphones, IEEE 802.11 smartwatches, automobiles, Wireless LAN sports equipment, clothing. 802.11ac Speeds up to 1.3 Gbps
Copyright 2017 Pearson Education, Inc. 6-15 Abbreviations Used for Communications and Computer Memory Speeds
Communications equipment, K(ilo) = 1,000, not 1,024 (as for memory); M(ega) = 1,000,000, not 1,024 1,024; G(iga) = 1,000,000,000, not 1,024 1,024 1,024. 100 Mbps =100,000,000 bits per second. Communications speeds expressed in bits, memory sizes in bytes. Copyright 2017 Pearson Education, Inc. 6-16
Connecting Your LAN to the Internet Important ISP functions: 1.Provide legitimate Internet address. 2. Provide gateway to Internet. 3.Pay access fees and other charges to telecoms. WAN wireless average performance 1 Mbps, with peaks of up to 3.0 Mbps. Typical wireless LAN 50 Mbps. Copyright 2017 Pearson Education, Inc. 6-17
Summary of LAN Networks Copyright 2017 Pearson Education, Inc. 6-18 Q3: How Does the Cloud Work? The cloud resides in the Internet Copyright 2017 Pearson Education, Inc.
6-19 Carriers and Net Neutrality Messages, broken into packets. Packets move across Internet, passing through networks owned by telecom carriers. Peering agreements - Carriers freely exchange traffic amongst themselves without paying access fees. Net neutrality principle All data treated equally. Problem: some people use more bandwidth than others.
Copyright 2017 Pearson Education, Inc. 6-20 Internet Addressing Public IP addresses Identifies a unique device on Internet. Assigned by ICANN (Internet Corporation for Assigned Names and Numbers. Private IP addresses Identifies a device on a private network, usually a LAN. Assignment LAN controlled.
Copyright 2017 Pearson Education, Inc. 6-21 IP Addressing: Major Benefits 1. Public IP addresses conserved One public IP address per LAN. 2. Using private IP addresses Eliminates registering public IP address with ICANNapproved agencies. Protects against direct attack.
Copyright 2017 Pearson Education, Inc. 6-22 Public IP Addresses and Domain Names IPv4 184.108.40.206 Domain name Unique name affiliated with a public IP address. Dynamic affiliation of domain names with IP addresses. Multiple domain names for same IP address. URL (Uniform Resource Locator
Internet address protocol, such as http:// or ftp://. Copyright 2017 Pearson Education, Inc. 6-23 Domain Registry Company Copyright 2017 Pearson Education, Inc. 6-24
Processing on a Web Server What happens when you visit a Web site and order something, and pay for it? Copyright 2017 Pearson Education, Inc. 6-25 Three-tier Architecture
Copyright 2017 Pearson Education, Inc. 6-26 Watch the Three Tiers in Action! Sample of Commerce Server Page 1. Commerce server requests shoe data from DBMS. 2. DBMS reads from database, returns data to commerce server. 3. Commerce server formats Web page with data and sends html version of page to users computer. 4. Customer places items in shopping cart.
5. Customer checks out, commerce server program processes payment, schedules inventory processing, arranges shipping, email receipt to customer. Copyright 2017 Pearson Education, Inc. 6-27 SOA Analogy: Approval Request Interactions Among Three Departments CheckCustomerCredit
ApproveCustomerCredit VerifyInventoryAmount AllocateInventory ReleaseAllocatedInventory Copyright 2017 Pearson Education, Inc. 6-28 Using SOA Principles, Each Department Defines: CheckCustomerCredit
ApproveCustomerCredit Inventory Department VerifyInventoryAmount AllocateInventory ReleaseAllocatedInventory Each department formally states data to receive with request and data promised to return in response. Every interaction done exactly same way. Copyright 2017 Pearson Education, Inc. 6-29
Using SOA Principles: Encapsulation No department needs to know who works in another department, or how dept. accomplishes work. Each department free to change personnel task assignments, change processes for performing services. Falcon Security could dynamically create 1,000 Inventory Departments and Sales Department with no need to change anything it does. Copyright 2017 Pearson Education, Inc.
Copyright 2017 Pearson Education, Inc. 6-31 Protocols Supporting Web Services Copyright 2017 Pearson Education, Inc. 6-32 WSDL, SOAP, XML, and JSON WSDL (Web Services
Description Language) Standard for describing services, inputs, outputs, other data supported by a Web service. Documents coded machine readable and used by developer tools for creating programs to access the service. SOAP Protocol for requesting Web services and for sending responses to Web (no longer an acronym) service requests. XML (eXtensible Markup Language)
Copyright 2017 Pearson Education, Inc. 6-33 Example XML and JSON Documents Copyright 2017 Pearson Education, Inc. 6-34 Q4: How Do Organizations Use the Cloud?
Three Fundamental Cloud Types Cloud Services from Cloud Vendors Copyright 2017 Pearson Education, Inc. 6-35 Content Delivery Networks from Cloud Vendors Content delivery network (CDN)
Stores user data in many different geographical locations and makes data available on demand. Specialized type of PaaS, but usually considered in its own category. Minimizes latency. Used to store and deliver content seldom changed. Copyright 2017 Pearson Education, Inc. 6-36 CDN Benefits
Copyright 2017 Pearson Education, Inc. 6-37 Servers Used in a Typical CDN Service Copyright 2017 Pearson Education, Inc. 6-38 Using Web Services Internally
Private Internet Infrastructure Copyright 2017 Pearson Education, Inc. 6-39 Q5: How Can Falcon Security Use the Cloud? SaaS products Falcon Security could use. Google Mail Google Drive
Office 365 Salesforce.com Microsoft CRM OnLine many others . . . Copyright 2017 Pearson Education, Inc. 6-40 PaaS Services from Amazon DBMS Products with Elastic Cloud 2 (EC2)
Falcon Security could use CDN to distribute content worldwide and respond to leads generated from advertising. Copyright 2017 Pearson Education, Inc. 6-41 IaaS Services at Falcon Security
Provides basic hardware in the cloud. May acquire servers to load operating systems. Considerable technical expertise and management. Alternative: Use elastic data storage services. SaaS and PaaS provide more added value to Falcon Security. Copyright 2017 Pearson Education, Inc. 6-42
Q6: How Can Organizations Use Cloud Services Securely? Remote Access Using VPN: Actual Connections Copyright 2017 Pearson Education, Inc. 6-43 Remote Access Using VPN: Apparent Connection Copyright 2017 Pearson Education, Inc.
6-44 Private Cloud for Inventory and Other Applications Copyright 2017 Pearson Education, Inc. 6-45 Accessing Private Cloud over a Virtual Private Network Copyright 2017 Pearson Education, Inc.
6-46 Using A Virtual Private Cloud Subset of a Public Cloud With Highly Restricted, Secure Access Copyright 2017 Pearson Education, Inc.
6-47 Q7: 2026 Cloud services faster, more secure, easier to use, cheaper. Fewer organizations own their computing infrastructure. More pooling of servers across organizations.
Overall size of the cloud gets bigger. Individuals, small businesses, large organizations obtain elastic resources at very low cost. Cloud fosters new categories of work. Copyright 2017 Pearson Education, Inc. 6-48 Q7: 2026 (contd) Remote action systems Telediagnosis
Telesurgery Telelaw enforcement Provide services in dangerous locations. Watch top-notch performers and performances. Reduces value of local mediocrity. Copyright 2017 Pearson Education, Inc. 6-49 So What? "Net Neutrality Enabled" ISPs little control over amount, type, or origin of content.
30% of U.S. Internet traffic during peak hours associated with using Netflix. Net neutrality All users and content providers treated equally. No fast or slow lanes. ISPs not allowed to block, or slow, content associated with competitors. ISPs cant charge heavy Internet users additional fees or taxes.
Copyright 2017 Pearson Education, Inc. 6-50 FCC Approved New Regulations (2015) Renders Internet a utility. Complaint: Interfering with free markets. ISPs argue loss of potential revenue stream inhibits infrastructure development, limits growth, and stifles innovation. Larger war on net neutrality may have only just begun!
Copyright 2017 Pearson Education, Inc. 6-51 Security Guide: From Anthem to Anathema Greater accessibility data more accessible to hackers. 80 million customers affected. Stole names, addresses, Social Security numbers, and salaries. Stored in plain text. Lawsuits filed.
Premera Blue Cross Bank-account and medical data of 11 million customers. Copyright 2017 Pearson Education, Inc. 6-52 Guide: Is It Spying or Just Good Management? 92% of employers monitor employees email, telephone, and Internet use. Key loggers Log files Packet sniffers
Text mining First Amendment Preserves free speech regarding laws Congress may enact, limited protection for federal employees. Does not protect you at work. Copyright 2017 Pearson Education, Inc. 6-53 Active Review Q1: Why is the cloud the future for most organizations?
Q2: What network technology supports the cloud? Q3: How does the cloud work? Q4: How do organizations use the cloud? Q5: How can Falcon Security use the cloud? Q6: How can organizations use cloud services securely? Q7: 2026? Copyright 2017 Pearson Education, Inc. 6-54 Case Study 6: FinQloud Forever Well, At Least
For The Required Interval Securities and Exchange Commission (1937). Securities brokers' records must be stored on media that cannot be altered. Interpreted to enable storage of records on read-write medium, provided it includes software to prohibit data alteration (2003). Copyright 2017 Pearson Education, Inc. 6-55 Components of the FinQloud System
Copyright 2017 Pearson Education, Inc. 6-56 FinQloud Forever (cont'd) Creates finger print based on content of record. SEC specifically excludes extrinsic controls: Authentication, passwords, and manual procedures, Believes such systems to could be readily misused to overwrite records. When properly configured, meets requirements of SECs
Rule17a-3) and similar rules of Commodities Futures Trading Commission. Copyright 2017 Pearson Education, Inc. 6-57 Copyright 2017 Pearson Education, Inc.
ASIA SKALA OŠTEĆENJA. A kompletno oštećenje (ne postoji očuvanost niti motornih niti senzitivnih funkcija u sakralnim segmentima S4-S5) ... odnosi se na dermatome i miotome ispod neurološkog nivoa lezije koji su delimično inervisani. Registruje se tačan broj parcijalno denervisanih ...
To search for a student enter as much information as is known. Hovering over each section will create a link to click for additional results. Similarly, simply hover over the students name to create a link to view the individual...
a g Carbon Concentration Free Energy a x x x ag ga a + strain * Materials, transformation temperatures & strength Olson and Hartman, 1982 Olson and Hartman, 1982 Olson and Hartman, 1982 Martensite can form at very low temperatures.
or in a different way smoothed over an inflict harm, and if his actions do not contain other corpus delicti. Civil Liability According to the article 37 of the Federal law "On Protection of Competition" and the article 15 of...
A CREOLIZED LANGUAGE is a language that results from mixing a colonizer's language with the indigenous language (ex. French Creole). THE. ROMANCE. BRANCH. If the Germanic, Romance, Balto-Slavic and Indo-Iranian language branches are all related, then they much have descended...
COSC 101-007 Presentation. This presentation will show: What is hacktivism and activism. The difference between a hacker and a hacktivist. The causes of hacktivism. What risks hacktivism . Some famous examples of Hacktivism. Overview.
Chapter 21: Metamorphism The Limits of Metamorphism Low-temperature limit grades into diagenesis The boundary is somewhat arbitrary Diagenetic/weathering processes are indistinguishable from metamorphic Metamorphism begins in the range of 100-150oC for the more unstable types of protolith Some zeolites are...
Ready to download the document? Go ahead and hit continue!