Architecture & Cybersecurity – Module 3 ELO-100Identify the features of virtualization. (Figure 3) ELO-060Identify the different components of a cloud.

Slides:



Advertisements
Similar presentations
Distributed Data Processing
Advertisements

Chapter 22: Cloud Computing and Related Security Issues Guide to Computer Network Security.
By Adam Balla & Wachiu Siu
An Approach to Secure Cloud Computing Architectures By Y. Serge Joseph FAU security Group February 24th, 2011.
Tunis, Tunisia, 28 April 2014 Business Values of Virtualization Mounir Ferjani, Senior Product Manager, Huawei Technologies 2.
FI-WARE – Future Internet Core Platform FI-WARE Cloud Hosting July 2011 High-level description.
What is Cloud Computing? o Cloud computing:- is a style of computing in which dynamically scalable and often virtualized resources are provided as a service.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6.
Virtualization and the Cloud
INTRODUCTION TO CLOUD COMPUTING CS 595 LECTURE 4.
Presented by Sujit Tilak. Evolution of Client/Server Architecture Clients & Server on different computer systems Local Area Network for Server and Client.
M.A.Doman Model for enabling the delivery of computing as a SERVICE.
Does "The Cloud" Fit Into Your Organization? Tom Horan Meridian IT Inc. VP, Strategic Markets (847)
Welcome Course 20410B Module 0: Introduction Audience
Virtual Network Servers. What is a Server? 1. A software application that provides a specific one or more services to other computers  Example: Apache.
Cloud computing Tahani aljehani.
INTRODUCTION TO CLOUD COMPUTING Cs 595 Lecture 5 2/11/2015.
Plan Introduction What is Cloud Computing?
Introduction to Cloud Computing
Cloud Computing Cloud Computing Class-1. Introduction to Cloud Computing In cloud computing, the word cloud (also phrased as "the cloud") is used as a.
For more notes and topics visit:
3 Cloud Computing.
1 Introduction to Cloud Computing Jian Tang 01/19/2012.
Deploying and Managing Windows Server 2012
Cloud Computing Saneel Bidaye uni-slb2181. What is Cloud Computing? Cloud Computing refers to both the applications delivered as services over the Internet.
Cloud Computing. What is Cloud Computing? Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable.
+ CS 325: CS Hardware and Software Organization and Architecture Cloud Architectures.
IT Infrastructure Chap 1: Definition
Software Architecture
Introduction to Cloud Computing
In the name of God :).
M.A.Doman Short video intro Model for enabling the delivery of computing as a SERVICE.
Section 2 Section 2.1 Identify hardware Describe processing components Compare and contrast input and output devices Compare and contrast storage devices.
608D CloudStack 3.0 Omer Palo Readiness Specialist, WW Tech Support Readiness May 8, 2012.
Presented by: Mostafa Magdi. Contents Introduction. Cloud Computing Definition. Cloud Computing Characteristics. Cloud Computing Key features. Cost Virtualization.
Plan  Introduction  What is Cloud Computing?  Why is it called ‘’Cloud Computing’’?  Characteristics of Cloud Computing  Advantages of Cloud Computing.
What is the cloud ? IT as a service Cloud allows access to services without user technical knowledge or control of supporting infrastructure Best described.
Virtual Infrastructure By: Andy Chau Farzana Mohsini Anya Mojiri Virginia Nguyen Bobby Phimmasane.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
Cloud Computing Computation as Utility. Computer utilities Leonard Kleinrock, ARPANET, 1969: ”We will probably see the spread of computer utilities, which.
CLOUD COMPUTING. What is cloud computing ??? What is cloud computing ??? Cloud computing is a general term for anything that involves delivering hosted.
Architecture & Cybersecurity - Module 4 ELO-075Identify cybersecurity concerns associated with a Cloud service offering at the Infrastructure, Network.
CLOUD COMPUTING RICH SANGPROM. What is cloud computing? “Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a.
Software Acquisition Management. Cloud Computing 2.
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
Architecture & Cybersecurity - Module 4 ELO 4.1Identify cybersecurity concerns associated with a Cloud service offering at the Infrastructure, Network.
Web Technologies Lecture 13 Introduction to cloud computing.
Cloud Computing – UNIT - II. VIRTUALIZATION Virtualization Hiding the reality The mantra of smart computing is to intelligently hide the reality Binary->
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6 - Essentials of Design an the Design Activities.
Table of Contents – Module 0 Overview of files associated with the Cloud CLM CLE - Module 0 - CLM Table of Contents1.
PRESENTED BY– IRAM KHAN ISHITA TRIPATHI GAURAV AGRAWAL GAURAV SINGH HIMANSHU AWASTHI JAISWAR VIJAY KUMAR JITENDRA KUMAR VERMA JITENDRA SINGH KAMAL KUMAR.
Windows Certification Paths OR MCSA Windows Server 2012 Installing and Configuring Windows Server 2012 Exam (20410) Administering Windows Server.
Architecture & Cybersecurity – Module 3 ELO 3.1Identify the different components of a cloud architecture. (Service Offering View and Network View) Figure.
© 2012 Eucalyptus Systems, Inc. Cloud Computing Introduction Eucalyptus Education Services 2.
Cloud Computing 3. TECHNOLOGY GUIDE 3: Cloud Computing 2 Copyright John Wiley & Sons Canada.
Page 1 Cloud Computing JYOTI GARG CSE 3 RD YEAR UIET KUK.
Prof. Jong-Moon Chung’s Lecture Notes at Yonsei University
Unit 3 Virtualization.
Instructor Materials Chapter 7: Network Evolution
Chapter 6: Securing the Cloud
Prepared by: Assistant prof. Aslamzai
The Future? Or the Past and Present?
Chapter 21: Cloud Computing and Related Security Issues
Chapter 22: Cloud Computing Technology and Security
3 Cloud Computing.
Cloud computing mechanisms
* Introduction to Cloud computing * Introduction to OpenStack * OpenStack Design & Architecture * Demonstration of OpenStack Cloud.
Cloud-Enabling Technology
Done by:Thikra abdullah
06 | SQL Server and the Cloud
Presentation transcript:

Architecture & Cybersecurity – Module 3 ELO-100Identify the features of virtualization. (Figure 3) ELO-060Identify the different components of a cloud architecture. (Service Offering View and Network View) Figure 2 (Architectural View) ELO-070Identify a difference between virtual and physical infrastructure. ELO-074Identify the 6 steps of Internet service interaction between a user on the DoDIN and a service provided over the Internet. (Figure 2 - High Level Steps of a Generic Service Interaction) ELO-080Recall the difference between virtually and physically separated infrastructure, and concerns with multi-tenancy. ELO-110Match key architectural terms from the section to appropriate definitions. CLE - Module 3 - Arch & Cybersecurity (a)1

TopicsYou should be able to: Module Introduction Recapitulation Cloud Architecture Components Physical and Virtual Infrastructure 6 Steps of Internet Service Interaction Virtually and physically separated infrastructure, and concerns with multi-tenancy Features of Virtualization Key Architectural Terms Summary Module Review Module Summary Questions Identify the different components of a cloud architecture. Identify a difference between virtual and physical infrastructure. Identify the 6 steps of Internet service interaction between a user on the DoDIN and a service provided over the Internet. Recall the difference between virtually and physically separated infrastructure, and concerns with multi-tenancy. Identify the features of virtualization. Match key architectural terms from the section to appropriate definitions. Module – 3: Architecture CLE - Module 3 - Arch & Cybersecurity (a)2

Topic You should be able to: Content Questions Review Previous Content Recapitulation of Modules – 1, 2 Overview of Cloud Computing – Characteristics – Service Models – Deployment Models Risks to using Cloud Information Impact Levels CLE - Module 3 - Arch & Cybersecurity (a)3

Topic You should be able to: Content Questions CLE - Module 3 - Arch & Cybersecurity (a)4 Cloud Architecture Introduction Introduce cloud model diagram Provide foundation for definitions in module Figure 1 (Next Slide) presents the NIST cloud computing reference architecture, which identifies the major actors, their activities, and their functions in cloud computing. The diagram depicts a generic high-level architecture and is intended to facilitate the understanding of the requirements, uses, characteristics, and standards of cloud computing.

Private Cloud (IaaS) CLE - Module 3 - Arch & Cybersecurity (a)5 Virtual Network Cloud Access Point Infrastructure as a Service Virtual Machine Hypervisor Physical Server Virtual Machine Hypervisor Security Boundary users Figure 1 Internet

Topic You should be able to: Content Questions Cloud Architecture Components 1.MT : Identify the differences between physical and virtual servers. 2.MT : Identify the role of the Hypervisor. Cloud Architecture Components Overview graphic (NIST Reference Model graphic) including views of physical and virtual layers Physical Resources include both physical and facilities CLE - Module 3 - Arch & Cybersecurity (a)6

Topic You should be able to: Content Questions Cloud Architecture Components -1 1.MT : Identify the differences between physical and virtual servers. 2.MT : Identify the role of the Hypervisor. Cloud Architecture Components -1 Overview graphic (NIST Reference Model graphic) including views of physical and virtual layers Physical servers are traditional machines, often mounted in racks in data centers (graphic). Physical servers include CPUs, memory, storage, power supplies and related equipment. Typical physical servers are managed individually as parts of an overall system implementation. Virtual servers act like physical servers but have networks, CPUs, storage and related items which are scalable (up or down) easily. (graphic) Hypervisors create hosts for virtual servers within physical servers so that one physical machine can host many virtual servers. CLE - Module 3 - Arch & Cybersecurity (a)7

Topic You should be able to: Content Questions CLE - Module 3 - Arch & Cybersecurity (a)8 Cloud Architecture Components -2 1.MT : Identify the role of the OS. 2.MT : Identify the role of software development tools Cloud Architecture Components -2 The operating system provides servers (virtual or physical) instructions on what to do. Software development tools provide humans with an interface and way to create programs that access computing resources. These instructions are translated by the operating system to machine instructions for the hardware.

Topic You should be able to: Content Questions Review Previous Content -3 1.MT : Identify common software applications that are provided to users 2.MT : Identify the role of storage devices and the types that are typically available through cloud services. Cloud Architecture Components -3 Common software applications include desktop tools like word processors, spreadsheets and other business applications. Storage devices provide a place to put and keep information, often in the form of files. Storage devices may be physical hard drives on a server or virtualized storage distributed across a number of resources. Examples include distributed storage using Hadoop. Software applications provided on cloud platforms include Software as a Service (SaaS). Cloud storage is an example of Infrastructure as a Service (IaaS) CLE - Module 3 - Arch & Cybersecurity (a)9

Topic You should be able to: Content Questions Review Previous Content -4 1.MT : Identify the role of storage devices and the types that are typically available through cloud services. Cloud Architecture Components -4 Cloud storage is an example of Infrastructure as a Service (IaaS) Common physical storage devices include hard drives, DVDs, CDs, disk arrays. Common cloud storage examples include personal file storage, shared file storage, distributed high performance storage, data base storage CLE - Module 3 - Arch & Cybersecurity (a)10

Topic You should be able to: Content Questions Physical and Virtual Infrastructure 1.MT : Identify infrastructure components that can be virtualized 2.MT : Identify the benefits of virtualizing infrastructure components Physical and Virtual Infrastructure Virtualized components often include storage, RAM, CPUs, Networks, Interfaces and servers. The benefits of virtualization include cost reduction, scale (up or down), transfer of risk (Govt to cloud provider), rapid implementation and decommissioning of IT resources. CLE - Module 3 - Arch & Cybersecurity (a)11

Topic You should be able to: Content Questions Features of Virtualization 1.MT : Identify the concerns with sharing servers 2.MT : Identify the concerns with sharing storage media 3.MT : Identify the concerns with sharing networks components Features of Virtualization Shared servers may create cybersecurity risks because they operate on shared resources. While this can be mitigated risks of cross talk are higher than with physically separated and properly configured components. Shared storage, like servers, also have higher risks of data leakage and breach than physically separated storage. Shared network components also have higher cybersecurity risk than separated networks. In each of these cases the benefits of shared resources (cost, scale etc.) should be balanced with the risks associated with the implementation. Add graphics showing the concerns graphically. Cloud design patterns for each of these risks and alternatives will demonstrate risk areas. CLE - Module 3 - Arch & Cybersecurity (a)12

Topic You should be able to: Content Questions 6 Steps of Internet Service Interaction 1.Identify the 6 steps of Internet service interaction between a user on the DoDIN and a service provided over the Internet. 6 Steps of Internet Service Interaction Figure 2 - High Level Steps of a Generic Service Interaction On the left are the *aaS. SaaS - Application. PaaS - Middleware and OS. IaaS - Hypervisor, Databases, Rades, Switches, Devices At the bottom is the DoDIN, a box with a CSO line coming out to the right and a line from the bottom to the letters BODI? At the very bottom are some lollipops, a stack -> SOA -> CLOUD. CLE - Module 3 - Arch & Cybersecurity (a)13

Topic You should be able to: Content Questions CLE - Module 3 - Arch & Cybersecurity (a)14 Virtually and physically separated infrastructure, and concerns with multi-tenancy 1.ELO-080Recall the difference between virtually and physically separated infrastructure, and concerns with multi-tenancy. Virtually and physically separated infrastructure, and concerns with multi-tenancy Virtually separated infrastructure use hypervisors or other management software to operate separate instances of IaaS on common hardware. Physically separated infrastructure operates on equipment in different locations. The location can be a few feet or thousands of miles apart. Clouds that house multiple software instances, virtual machines or customers leverage common equipment. This can result in reduced performance because of the shared nature of cloud systems. This is sometimes referred to as the “noisy neighbor” problem. Add graphic showing images of servers that are separated and virtualized.

Topic You should be able to: Content Questions Key Architectural Terms Include definitions for: – Server – CPU – Memory – Storage – Hypervisor – Operating System (OS) – Virtualization – Network adaptor – Routers – Switch – Application – VPN – Include listing of references for the section CLE - Module 3 - Arch & Cybersecurity (a)15

Topic You should be able to: Content Questions Review Module 3 - Review CLE - Module 3 - Arch & Cybersecurity (a)16

Topic You should be able to: Content Questions Summary Module 3 – Summary Questions CLE - Module 3 - Arch & Cybersecurity (a)17