Discuss the impact of cloud processing environments on application security. Be sure to define cloud computing, application security, and the various types of implications.

  

The paper is to be between 2,000 and 2,500 words. 

It must be formatted using APA style. 

A least five scholarly resources must be utilized. Scholarly resources include journal articles in peer reviewed journals, textbooks, and Educational and Government websites. Wikipedia, message boards, blogs, and commercial websites are not scholarly. While you can cite a commercial website, it will not count as one of the scholarly sources. The paper will be evaluated using plagiarism scanning technology, so be careful to include citations and follow APA procedures when dealing with direct quotes. It is expected that one of the five sources will be your text.

  

The PowerPoint should support a 10-minute presentation. 

Avoid slides with many words on it. 

One tip is to not use a font smaller than 20 point. 

Ensure that you have enough slides to address the topic, 

Do not go over the 10-minute limit.

Include a slide that discusses who wrote what, and who presented what

Regarding big data 2 pages 500 words

it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career. 

Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

  • Provide a 500 word (or 2 pages double spaced) minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should not provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

preventing attacks on web applications_FP

 Write about preventing attacks on web applications

This project consists of 3 parts:

1. An annotated bibliography of at least five sources. The annotations must be at least five sentences long.

2. A PowerPoint with at least 12 slides not including the title and references addressing the topic approved in your Final Project Proposal.

3. A 700 word summary of your findings. This must be appropriate for graduate-level work. It should not be a survey. Please, do not double space your submission.

info tech import plan

 

The vast majority of the population associates Blockchain with cryptocurrency Bitcoin; however, there are many other uses of blockchain; such as Litecoin, Ether, and other currencies. In this discussion, please describe at least two cryptocurrencies with applicable examples. Discuss some similarities and differences. Lastly, discuss if you have any experience using any cryptocurrencies.

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

Swift Programming _Biography viewer

I need help creating an iphone app using swift programming > Here we have to  Choose one of our  favorite games /anime, and implement an app that shows the biography of each character of the game/anime .

cloud computing

What is one significant data breach through the cloud that has occurred in the field you are interested in?  How was this breach launched, what was lost and how could that breach have been prevented? Minimum 700 words

Need Response to below discussion

Please read the below discussion posts and provide two responses in 50 to 75 words

Post#1

 

DNS Failover is designed to operate at the DNS level. That is, the level before a client connects to any of your servers. DNS essentially converts your domain name (e.g.www.example.com) into the IP address of your server. By monitoring applications and altering DNS dynamically so clients are pointed to different IP addresses, you can control traffic fairly easily and expensively. However, DNS failover does have two notable limitations: a) DNS Failover does not fix an outage when a client is already connected to an application. This is because their browser may not query DNS again for quite some time. b) DNS Failover has a TTL cache issue that could take anywhere from 1 to 30 minutes or more for the IP address change to be visible around the world. This is since many ISP’s recursive DNS servers cache longer than required to reduce traffic. “Time is an important component of the Domain Name System (DNS) and the DNS Security Extensions (DNSSEC). DNS caches rely on an absolute notion of time (e.g., “August 8, 2018 at 11:59pm”) to determine how long DNS records can be cached (i.e., their Time To Live (TTL)) and to determine the validity interval of DNSSEC signatures. This is especially interesting for two reasons” (Malhotra, 2019).

DNS Failover has been around for quite some time and is reliable. As a result, the sequential mode is the most popular for e-commerce applications or where back-end databases exist and some type of synchronization step is required before falling back to the primary. The cloud network monitors all of the available servers based on the monitoring criteria you specify via the management GUI and when it detects the primary down, it automatically fails over to the secondary IP (or if the secondary is down, fails over to the tertiary, etc.). In a typical static content scenario, when the primary comes back, it updates DNS again to send traffic to the primary. However, in an application where back-end databases must be synchronized, you can easily disable auto-failback to prevent the primary server from receiving traffic again. “A passive redundancy approach with diversification has been applied to intrusion-tolerant systems (ITSs) that aim to tolerate cyberattacks on a server” (Okamoto, 2017).

The monitoring system will still alert you that it is back online, but you have to manually force it to start receiving traffic again. This allows you to perform whatever tasks are required to ensure that the primary has the latest copy of the database or whatever is required. One critical drawback to using DNS failover in a situation where back-end synchronization is critical is when the primary is only down for a very short period. The short period would be sufficient to trigger a failover, but insufficient so that existing client connections (or new connections where the TTL cache has not expired) permit some clients to still hit the primary site. In this case, both the primary and secondary sites could receive traffic and create completely different databases that are very difficult to synchronize. “A DNS Load Balancer Daemon (LBD) has been developed at CERN as a cost-effective way to balance applications accepting DNS timing dynamics and not requiring persistence” (Reguero Naredo, 2017).

Post#2

 

            Cloud computing efficiency and security depends on several security concerns related to networks and connectivity. Protecting information system in cloud environment, from threats can be done largely by maintaining secure data traffic. The concepts of Domain Name System failover and Cloud failover come in this context of data traffic security. These two are most popular approaches in cloud security and share some similarities and dissimilarities between each other.

Comparison

            Functionality of DNS and cloud failover depends on the authentication of IP addresses largely. Both the preventive measures in cloud service security find out necessary action to recover from failures such as downtime recovery. Both the solutions need open access to public cloud in order to become active. The monitoring mechanism used in both the systems are almost equal and works in the same way for identification of servers and detection of faults (Naredo & Pardavila, 2017). DNS and Cloud failover are equally capable of delivering fast recovery as soon as within 60 seconds and can change functions automatically based on the requirement scenario.

The differences in cloud and DNS failover starts with the process through which these functions run. DNS finds easiest solution in re-routing of traffic in cases where a particular server fails, and it makes the traffic run through other active servers. A system embedded in the process helps in detecting the active server through a technique known as ‘round-robin’ method. A fault in DNS failover is that it contains the cached data which keeps revolving till one user’s Time to Live (TTL) in the server. “A DNS Load Balancer Daemon (LBD) has been developed at CERN as a cost-effective way to balance applications accepting DNS timing dynamics and not requiring persistence” (Naredo & Pardavila, 2017).

Cloud failover is popular for its accuracy and precision of carrying out the task necessary for sustained uptime. It does not send cached data back frequently. Sessions cared by cloud have better utilization capacities as it allows remote deployment unlike DNS failover where critical applications of a server are interrupted. To sustain through the TTLs, cloud failover uses session-wise load-balancing that proves to be more efficient than round-robin of DNS. Further, DNS failover fails to offer the flexibility due to the pre-determined conditioning that makes it a rigit system. Cloud, however, includes the DNS often for offering optimized result via a permanent proxy IP address. “DNS, being open-source, is less secure and it has no uncommon method for deciding if data has been intercepted while transmission or information of a domain name originates from an approved domain owner or not” (Ansari et. Al., 2020).

Conclusion

As a result of limitations, cloud failover service is costlier than DNS. There are steady improvements identifiable in DNS in global network. Some of the services are also allowing cache-free recovery of server. In spite of the advancements, it is yet to compete equally with cloud failover. On the other hand, cloud has its challenges too. “In spite of Cloud Computing services seem to be very attractive as an alternative to traditional on-premise data centers, there is still some concern about the providers availability” (Goncalves  & Fagotto, 2018).

2 discussions due in 16 hours

50 words in initial post:

  

INSTRUCTIONS: 

  • Respond to the below topic in a minimum of 50 words.  (5 points)
  • Reply to at least 1 of your classmates. Be constructive and professional in your responses. (5 points)

Your participation in this online activity will count toward this week attendance.

How to Manage your Outlook Mailbox Effectively 

There are many benefits of using email over paper, phone, and face-to-face communications such sending messages whenever you wish. You do not have to wait for the people you need to talk with to be in their offices. Other users can send email messages to you, even if you do not have your email program open. Your messages can be as long as you wish, so you are not limited to the short time typically allowed on some voice mail systems. You can also attach a file (such as a spreadsheet or word processing document) to a message.

Describe some of the issues that can be caused by not properly managing the size of one’s Outlook® mailbox.

What are some ways to organize messages and clean up or reduce the size of one’s Outlook® mailbox?

TEYLOR’S POST: 

 One of the most effective ways to organize your messages would be by creating certain folders for your important mail. Creating folders and using the quick step tools allow us to reduce our mailbox size. Also responding to mail that takes us seconds to reply helps with this as well. If we do not correctly manage our mailbox important mail could be overlooked and ignored. 

 

INSTRUCTIONS: 

  • Respond to the below topic in a minimum of 50 words.  (5 points)
  • Reply to at least 1 of your classmates. Be constructive and professional in your responses. (5 points)

Your participation in this online activity will count toward this week attendance.

Digital Literacy

It’s hard to imagine a job that doesn’t require a working knowledge of a personal computer. 

Research the term digital literacy. Use several different websites to get an idea of what this term means.  

What does it mean to be digitally literate, especially in career that you plan to pursue, and why is it important?

SHELBY’S POST:

 
Digital literacy becomes very important when you are trying to start your career. Digital literacy means having the knowledge to work and learn how to communicate through the internet. In most careers you use web browsers, email, PowerPoints and have to create and edit things and that is digital literacy. 

Discussion for Decision support

To help you understand the major differences between blind searching (uniformed search) and heuristic searching (informed search).

Topic of Discussion

  • Compare the problem-solving search techniques: blind searching (uniformed search) and heuristic searching (informed search).
  • Which one do you believe is more efficient and effective?

Submission Instructions

  • Post your responses, examples, ideas, and discussions on this topic on the blackboard. 
  • You should write at least 120-word response on the topic of discussion.