Tuesday, January 28, 2020
Cloud computing security
Cloud computing security Abstract The term Cloud computing becomes more popular day by day. As this is happening, security concerns start to arise. Maybe the most critical one is that as information is spread into the cloud, the owner starts to lose the control of it. In this paper we attempt to give a brief overview of what is described by the term Cloud computing and provide a small introduction to what we mean by Cloud computing security [Brunette, 2009]. Make a discussion of what are the security benefits that Cloud computing introduces and also the security risks that arise due to its adaptation according to [ENISA, 2009]. Index Terms Cloud, security, risks, security benefits. Introduction Cloud computing funds started to build in early 90s. The main idea behind cloud computing is to separate the infrastructure and the mechanisms that a system is composed of, from the applications and services that delivers [Brunette, 2009]. Clouds are designed in such a way that can scale easily, be always available and reduce the operational costs. That is achieved due to on demand multi-tenancy of applications, information and hardware resources (such as network infrastructure, storage resources and so on). According to [Mell, 2009] Cloud computing is composed by five Essential Characteristics, three Service Models and four Deployment Models as shown in figure bellow. More details on each of the above components can be found in [Mell, 2009] Security The way that security control is implemented on Cloud computing is most of the times similar to this of traditional IT environments. But due to the distributed nature of the assets security risks vary depending on the kind of assets in use, how and who manages those assets, what are the control mechanisms used and where those are located and finally who consumes those assets [Brunette, 2009]. Furthermore earlier we mentioned that multi-tenancy. This means that a set of policies should be implementing how isolation of resources, billing, segmentation and so on is achieved is a secure and concise way. In order to measure whether the security that a Cloud Provider (CP) offers is adequate we should take under consideration the maturity, effectiveness, and completeness of the risk-adjusted security controls that the CP implements. Security can be implement at one or more levels. Those levels that cover just the Cloud infrastructure are: physical security, network security, system security and application security. Additionally security can take place at a higher level, on people, duties and processes. It is necessary at this point to have understanding of the different security responsibilities that CPs and end users have. And also that sometimes even among different CPs the security responsibilities differ. Security Benefits [ENISA, 2009] in its report has spotted the following top security benefits that arise due to the use of Cloud computing. Security and the benefits of scale: when implementing security on a large system the cost for its implementation is shared on all resources and as a result the investment end up being more effective and cost saving. Security as a market differentiator: as confidentiality, integrity and resilience is a priority for many the end users, the decision on whether they will choose one CP over another is made based on the reputation this CP has on security issues. Hence competition among CPs made them provide high level services. Standardise interfaces for managed security services: as CPs use standardise interfaces to manage their security services the Cloud computing market benefits from the uniformity and tested solutions this introduces. Rapid, smart scaling of resources: Cloud computing is considered resilient since it has the ability to dynamically reallocate resources for filtering, traffic shaping, authentication, encryption. Audit and evidence gathering: since virtualization is used in order to achieve Cloud computing, it is easy to collect all the audits that we need in order to proceed with forensics analysis without causing a downtime during the gathering process. More timely, effective and effective updates and defaults: another thing that Cloud computing benefits from virtualization is that virtual machines (VM) can come pre-patched and hardened with the latest updates. Also in case of a configuration fault or a disaster caused by changes made on the VM, we can rollback to a previous stable state. Benefits of resource concentration: having all of your resources concentrated makes it cheaper to maintain and allows physical access on those easier. That outweighs most of the times the risk the disadvantages that this generates. Security Risks The following classes of cloud computing risks were identified by [ENISA, 2009]. Loss of governance: as users do not physically posses any resources, CPs can take control on a number of resources. If those resources are not covered from an SLA security risks arise. Lock-in: as we write this paper there is still no standardization on how to move data and resources among different CPs. That means in case a user decides to move from a CP to another or even to migrate those services in-house, might not be able to do so due to incompatibilities between those parties. This creates a dependency of the user to a particular CP.. Isolation failure: one of the disadvantages of multi-tenancy and shared resources occurs when the resource isolation mechanism fails to separate the resource among users. That can occur either due to an attack (guest-hopping attacks) or due to poor mechanism design. In present days attacks of this kind are pretty rare compared to the traditional Oss but for sure we cannot rely just on that fact. risk category covers the failure of mechanisms separating storage, memory, routing and even reputation between different tenants. Compliance risks: there is a possibility that investing on achieving certification is put under risk due to the following: The CP cannot provide evidence of their own compliance with the relevant requirements The CP does not permit audit by the cloud customer (CC). Also it is possible that compliance with industry standards is not able to be achieved when using public Cloud computing infrastructure. Management interface compromise: CPs provide to the users, management interface for their resources on public Cloud infrastructures. That makes those interfaces available over the internet allowing remote access applications or web browsers vulnerabilities to allow access on resources from unauthorised users. Data protection: CP is possible to handle data in ways that are not known (not lawful ways) to the user since the users looses the complete governance of the data. This problem becomes even more obvious when data are transferred often between locations. On the other hand, there are lot of CPs that provide information on how data are handled by them, while other CPs offer in addition certification summaries on their data processing and data security activities. Insecure or incomplete data deletion: there are various systems that upon request of a resource deletion will not completely wipe it out. Such is the case with Cloud computing as well. Furthermore difficulties to delete a resource on time might arise due to multi-tenancy or dues to the fact that many copies of this resource can exist for backup/ redundancy reasons. In cases like this the risk adds to the data protection of the user is obvious. Malicious insider: there is always that possibility that an insider intentionally causes damage. For that reason a policy specifying roles for each user should be available. The risks described above constitute the top security risks of cloud computing. [ENISA, 2009] further categorises risks into policy and organizational risks, technical risks, legal risks and finally not specific risks. Vulnerabilities The list of vulnerabilities that follows [ENISA, 2009], does not cover the entirety of possible Cloud computing vulnerabilities, it is though pretty detailed. AAA Vulnerabilities: Special care should be given on the authentication, authorization and accounting system that CPs will use. Poor designed AAA systems can result to unauthorized users to have access on resources, with unwanted results on both the CP (legal wise) and the user (loss of information). User provisiontion vulnerabilities: Customer cannot control provisioning process. Identity of customer is not adequately verified at registration. Delays in synchronisation between cloud system components (time wise and of profile content) happen. Multiple, unsynchronised copies of identity data are made. Credentials are vulnerable to interception and replay. User de-provisioning vulnerabilities: Due to time delays that might occur, credential of user that have earlier logged out might appear to still be valid. Remote access to management interface: Theoretically, this allows vulnerabilities in end-point machines to compromise the cloud infrastructure (single customer or CP) through, for example, weak authentication of responses and requests. Hypervisor Vulnerabilities: In virtualized environments Hypervisors is a small piece of middleware that is used in order to be able to control the physical resources assigned to each VM. Exploitation of the Hypervisors layer will result on exploiting every single VM on a physical system. Lack of resource isolation: Resource use by one customer can affect resource use by another customer. For example IaaS infrastructures use systems on which physical resources are shared among VMs and hence many different users.. Lack of reputational isolation: The resource sharing can result on one user acting in such a way that its actions have impact on the reputation of another user. Communication encryption vulnerabilities: while data move across the internet or among different location within the CP premises it is possible that someone will be reading the data when poor authentication, acceptance of self-signed certificates present and so on. Lack of or weak encryption of archives and data in transit: In conjunction with the above when failing to encrypt data in transit, data held in archives and databases, un-mounted virtual machine images, forensic images and data, sensitive logs and other data at rest those are at risk. Poor key management procedures: Cloud computing infrastructures require the management and storage of many different kinds of keys; examples include session keys to protect data in transit, file encryption keys, key pairs identifying cloud providers, key pairs identifying customers, authorisation tokens and revocation certificates. Because virtual machines do not have a fixed hardware infrastructure and cloud based content tends to be geographically distributed, it is more difficult to apply standard controls, such as hardware security module (HSM) storage, to keys on cloud infrastructures. Key generation: low entropy for random number generation: The combination of standard system images, virtualisation technologies and a lack of input devices means that systems have much less entropy than physical RNGs Lack of standard technologies and solutions: This is the case of lock-in risk, where users cannot move across different providers due to the lack of standards. No control on vulnerability assessment process: If CPs will not prevent their users from port scanning and testing for possible vulnerabilities and also there is no audit on the time of use (ToU) for a user (something that places responsibility on the customer) severe infrustrusture security problems will arise. Possibility that internal (Cloud) network probing will occur: Cloud customers can perform port scans and other tests on other customers within the internal network. Possibility that co-residence checks will be performed: Side-channel attacks exploiting a lack of resource isolation allow attackers to determine which resources are shared by which customers. Lack of forensics readiness: While the cloud has the potential to improve forensic readiness, many providers do not provide appropriate services and terms of use to enable this. For example, SaaS providers will typically not provide access to the IP logs of clients accessing content. IaaS providers may not provide forensic services such as recent VM and disk images. Sensitive media sanitization: Shared tenancy of physical storage resources means that sensitive data may leak because data destruction policies applicable at the end of a lifecycle may either be impossible to implement because, for example, media cannot be physically destroyed because a disk is still being used by another tenant or it cannot be located, or no procedure is in place. Synchronizing responsibilities or contractual obligations external to cloud: Cloud customers are often unaware of the responsibilities assigned to them within the terms of service. There is a tendency towards a misplaced attribution of responsibility for activities such as archive encryption to the cloud provider even when it is clearly stated in the terms of the contract between the two parties that no such responsibility has been undertaken. Cross cloud applications creating hidden dependency: Hidden dependencies exist in the services supply chain (intra- and extra-cloud dependencies) and the cloud provider architecture does not support continued operation from the cloud when the third parties involved, subcontractors or the customer company, have been separated from the service provider and vice versa. SLA clauses with conflicting promises to different stakeholders: An SLA might include terms that conflict one another, or conflict clauses made from other providers. SLA causes containing excessive business risk: From CPs perspective an SLA can hide a bunch of business risks when someone thinks of the possible technical failures that might arise. At the end user point SLAs can include terms that can be disadvantageous. Audit or certification not available to customers: The CP cannot provide any assurance to the customer via audit certification. Certification schemes not adapted to cloud infrastructures: CPs will not really take any actions to provide security measures that comply with Cloud computing security standards. Inadequate resource provisioning and investments in infrastructure: This vulnerability comes in hand with the one that follows. Provisioning of resources should be done carefully in order to avoid failures of the provided services. No policies for resource capping: CPs should make really well provisioning of their resources. Also end users should be able to configure the resources that are allocated to them. If the limits of requested resources exceed this of the available resources results can be unpredictable. Storage of data in multiple jurisdictions and lack of transparency: Multiple copies of users data can exist since mirroring of the data is performed in order to achieve redundancy. During that time the user should we aware of where are those data stored. Such a move can introduce unwanted vulnerabilities since CPs may violate regulations during this time. Lack of information jurisdictions: there might be a case where data are stored using high level of user rights. In that case end users should be aware of it in order to take preventing measures. Conclusion In this paper we tried to give a brief overview of cloud computing and discuss what security on Cloud computing means. Furthermore, we made it easy for the reader to understand what the benefits and risks of moving toward Cloud computing are. Vulnerabilities of Cloud computing are listed as those were described in [ENISA, 2009], allowing us to have a full view of what are the considerations that we should keep in mind when moving on Cloud computing. It is also well understood that exhaustive risk and security control is not recommended on all Cloud computing implementations. The level of control should always depend on prior evaluation. There are still lot of open research areas on improving Cloud computing security, some of those are; Forensics and evidence gathering mechanisms, resource isolation mechanisms and interoperability between cloud providers. References [ENISA, 2009] ENISA editors. (2009). Cloud Computing Benefits, risks and recommendations for information security. . [Accessed 25 March 2010] [Brunette, 2009] Glenn Brunette and Rich Mogull (2009). Security Guidance for Critical Areas of Focus in Cloud Computing, Version 2.1 [Accessed 25 March 2010] [Mell, 2009] Peter Mell and Tim Grance (2009). The NIST Definition of Cloud Computing, Version 15. [Accessed 26 March 2010]
Monday, January 20, 2020
F. Scott Fitzgeralds The Great Gatsby :: essays research papers
The Great Gatsby The Great Gatsby was a very compelling and well-written novel. This book has a very intriguing plot, from the mysterious Jay Gatsby to the gruesome murder at the climatic ending. There is a multitude of deep characters you will run into through out this novel like Nick Carraway and his presumed love Miss Jordan Baker, along with Gatsby's lost love Daisy Buchanan. Then there is Gatsby's house, one of the mysteries of the story, with all of it's illustrious parties. Finally it will tell you a little about the human nature. The story begins with the book being told as the memory of one Nick Carraway and his encounters with Jay Gatsby (aka James Gatz). Gatsby is a enigmatic character that no one really knows much about who holds immense get togethers at his home for hundred of guests at a time until he runs into his lost love, who sense has been married, who's husband dispenses false information to a man named George Wilson who intern kills Mr. Gatsby. The ending of this novel is kind of sorrowful in a touching way. This is due to the in depth creation of characters the author portrayed. The most in depth character of all is Mr. Jay Gatsby in this novel. He is left a very obscure individual and much is not known about him until he reveals it to Nick. One thing Tom Buchanan finds out about Gatsby is the he is a swindler and that is how he has amassed his fortune. The main character is Nick Carraway a man who objectively stays the same through out the whole book, keeping his friendship with Gatsby to the very end. This book wouldn't be the same if not for the Giant house that Gatsby lived in. Most of the novel takes place at Mr. Gatsby's grand mansion in East Egg, New York. This mansion just adds to the mystery about Gatsby and were he got all of his money from. This huge home was perfect for holding giant parties every weekend for hundreds of guests, and soon became the "in" place to go.
Sunday, January 12, 2020
CVS case study
EGG: no changes +2 edema bilateral ankles Medications: meteorology 20 MGM per day, aspirin 325 MGM per day Answer the questions and submit via Dropped Questions: 1 . What other questions should the nurse ask about the fatigue? Is the fatigue constant or intermittent- to determine what cause could be acute vs.. Chronic Is there a simple reason for the fatigue-such as boredom, extra activity, no sleep, etcâ⬠¦. What is the quality of your sleep? Have you had any recent illnesses or change in medications ETC or prescribed? Any new stress in your life?Such as family/health [financial/emotional/physical etc.. What does your diet consist of on a daily basis, Is this new? ââ¬â Also does it Include alcohol/caffeine/smoking If so how much? 2. What other assessments would be for this patient? Maybe some tests such as; EGG, EEK, stress test, sleep test/observation, etcâ⬠¦. Lab tests such as CB w/ dif, TTS, LAP, cholesterol, IAC, serum glucose, fasting glucose, U/ A, CPM, 812, ACTâ⠬ ¦ Review of medications, past medical history, vaccination records, environmental factors, family history Assessment of other current problems or homonyms.Weight 3. What are some causes of fatigue? Thermodynamic, anemia, thyroid dysfunctions, auto-immune, DIM, formability, osteoporosis, medications, stress, disturbed sleep patterns, excessive physical activity, obesity, excessive alcohol/smoking/caffeine, imbalanced diet- too much or to less, imbalance in fluid volume, CHEF, COOP, bowel disturbances, fluid and electrolyte imbalances, recent illness viral/infection, and many more. 4. Develop a problem list from objective and subjective data. Problem list:Pain, TN, Hyperglycemia, edema of lower extremities, elevated HER, decreased BP, fatigue, bill lung adventitious sounds 5. What should be included in the plan of care? Teaching ââ¬â diet/meds/exercise/when to seek medical attention/ reduce risk factors Monitor- Strict 1&0, Free. Vs., monitor cardiac rhythm, edema-TED/SCUD/eleva te, lung sounds, 02 saturation, skin integrity, neuron checks, pain, pulses, lab values, sale of current medication, daily weight. Encourage- compliance with diet, medication regimen, exercise program, and overall health maintenance. Based on the readings, what is the most likely cause of fatigue for this patient? CHEF HER- 112 ââ¬â Heart pumps harder in attempt to get more blood to the body. Fatigue- Due to less blood and oxygen to vital organs. Edema- Due to the weakness of the heart pumping less fluid to the kidneys. Kidneys release rennin, negotiations, and lodestone which holds on to sodium and attracts fluid into the vascular system. Lung crackles: The weak heart contractions cause fluid to build up in lungs. HEX of MI, TN, and hyperglycemia are all precipitating factors.
Friday, January 3, 2020
The Public Eye Has Become Of Privacy Essay - 1756 Words
In todayââ¬â¢s society we are surrounded by events that can spark global debates and conversations of everything that is wrong with the world, in last decade we have witnessed an astonishing amount of things like movements, protests, major uprisings, natural disasters, and even mass murder and it has awoken everyoneââ¬â¢s minds and making the people of earth more aware and active in the dealings of society. And while within this time period one of the most controversial topics to hit the public eye has become of privacy. Although we are globally interconnected we feel we have control over what is shared and what isn t, what things we feel comfortable sharing with the world and what we want to keep to ourselves or within our inner circle. From apps to social media we feel that we all have the right to privacy, and unfortunately this right was violated. Back in 2013 Edward Snowden Leaked secret documents revealing a undisclosed surveillance program run by the NSA that had record s of all digital exchanges including calls, messages, and etcetera. This is one most the historic events of it s nature to a point that once he exposed this injustice he fled persecution and remains in exile. This is what has lead to where we stand now and this is why Anthony Romero is now calling out for Snowdenââ¬â¢s pardon, Romero uses multiple appeals to try and convince his readers that Snowden is nothing less than a hero who was protecting the best interest of the citizens of earth. As the argumentShow MoreRelatedEssay about Privacy and Ethical issues with Google Glass1732 Words à |à 7 PagesIntroduction Google Glass is wearable computer, looks like a pair of glass which has high resuloution optical head-mounted display (OHMD). As its name suggests it has been developer by Google in one of their research and development project called ââ¬Å"Project Glassâ⬠[1]. The product has been designed to be a ubiquitous computer displays information, communicate via Internet and interact with the user by natural language voice commands that starts with ââ¬Å"ok glassâ⬠. Google glass use Android operatingRead MoreI See You Watching On Privacy1380 Words à |à 6 Pages I See You Watching Privacy throughout the ages has been something people have valued and expected to have. Everyone has the right to their little own secrets and live life the constant watching of others. As technology advances throughout each decade, the world has become more and more accessible through a computer screen. Everyday activities have integrated with technology, from shopping online to requesting transportation through a phone app. Although technology makes everyday life convenientRead MorePrivacy And The Public Eye1193 Words à |à 5 Pages Imagine a world where everyoneââ¬â¢s privacy was honored, there would be absolutely no screenshots sent out regarding another personââ¬â¢s private information, no celebrity hacks or stealing their information for the latest magazine article, and no identity theft of any kind. Now think about how people could gain all of this freedom? We would have to stop letting ourselves fall victim to something much bigger than what we think and how badly th ings could go if some of our information ends up in the wrongRead MoreThe West Bengal National University Of Juridical Sciences1621 Words à |à 7 Pagesoneââ¬â¢s reputation in the eyes and minds of the right thinking and reasonable members of the society. Privacy can be understood as ââ¬Å"The right to be let aloneâ⬠Invasion of privacy means the ââ¬Å"unauthorized interference with a personââ¬â¢s seclusion of himself from the publicâ⬠Invasion of privacy and publication of such private information may result in the defamation, and as such, a cause of action for defamation arises. This essay concerns questions regarding invasion of privacy, and publication of suchRead MoreAn Unmanned Aircraft System ( Uas )1691 Words à |à 7 Pagessatellite parking lots farther from the stadium (K-State Athletics). Game day at K-State is busy for local law enforcement members. Police must remain on high alert for any kind of suspicious activity in order to keep the public safe. With so many people in such a large area, it can become difficult to for officers monitor everything. One possible answer to the human problem of not being able to be everywhere at once includes an inhuman object. An unmanned aircraft system (UAS) or a ââ¬Å"droneâ⬠equippedRead MoreThe, Big Brother Is Watching1274 Words à |à 6 Pageseducated adults and teens, but as Iââ¬â¢ve become more aware of the joke, more and more people treat the phrase as less of a joke and more of a common unspoken rule. The NSA was discovered in 2013 to be tapping into private phone calls and emails from citizens. Social media sites update their privacy policies regularly, granting themselves more and more rights to the information I presume to be be personal or obsolete to the website. With every camera lens being a direct eye to the government, a window forRead MorePublic Figures and Private Lives838 Words à |à 4 PagesPublic Figures and Private Lives Publicity; it is umently a big deal. Everyone wants to be a celebrity. They want to be a famous actor, singer, etc. However, the real idea people need to be thinking about is, are you willing to give up your privacy and freedom? Once one becomes known to the public so does their entire life, whether one likes it or not. Take a look at Britney Spears; there is nothing about her life that is not public. Should this be a bad thing? Or should these public figure haveRead MoreSocial Media And Its Effect On Individual Privacy944 Words à |à 4 Pageslives, the collection and analysis of personal information by online social networking sites has been controversial due to its potential to weaken individual privacy. The online platforms are owned by businesses that have the goal to optimize performance for users but also can turn the masses of users into monetary value by data mining. Global multimedia networks and the advertising industry have become interested in the information about the ir online consumers due to the fact that people use theRead MoreInternet Privacy.1148 Words à |à 5 PagesSolutions for Violations of Internet Privacy. In the past thirty years computer technology has been developing very rapidly. Internet in last decade has revolutionized the way how we conduct our lives and businesses. Internet has become a daily necessity we cannot live without. Development of Internet and wireless technologies together with advancement in miniature technology has made it possible for us to have access the internet on the go. Every year we expect new and more advance modelsRead MoreRise of the Drones1518 Words à |à 7 Pages The Rise of Drones; The Civil and Social Use of Drones The transformation of drones in the military to the civilian world is becoming a controversial topic throughout the U.S. Many Americanââ¬â¢s worry it will interfere on our privacy and freedom we are promised in the Constitution and 4th amendment because drones pose a threat and danger to our safety. The engineers of drones are increasing their intelligence and enabling drones to think on their own. This is a heated debate and I disagree with the
Subscribe to:
Posts (Atom)