Whispers at the Door

The night is still, yet something feels amiss,
As children come for treats and playful bliss.
I smile and drop the candy in their bags,
But shadows stretch, and time begins to lag.

Each face I see, a mask, but not quite right,
Their hollow eyes reflect the fading light.
They shuffle close with whispers soft and cold,
My hands grow numb, the candy turns to mold.

They’re not the ones I thought I'd see tonight—
Too late I shut the door against the night.

BSIT400 - Week 8 Posting - Cloud Security Practices

Cloud security is a growing concern, and effective troubleshooting methods are essential for keeping systems safe. One popular methodology is Root Cause Analysis (RCA). This approach involves identifying the underlying cause of an issue to prevent it from happening again. For example, if a cloud server experiences unauthorized access, you must investigate how it occurred and address the vulnerabilities that allowed it. Penetration testing is another valuable strategy. By simulating attacks, organizations can discover weaknesses in their cloud infrastructure before malicious actors do.


The
Six-Step Troubleshooting Process is widely used for resolving cloud security issues. This process involves identifying the problem, gathering data, forming a hypothesis, testing the hypothesis, implementing a solution, and monitoring results. This method ensures that all angles are covered when addressing security incidents. Another essential tip is to monitor logs and alerts constantly. Cloud environments provide rich logging data, which can help administrators detect suspicious activity early. Regular audits of user permissions, data encryption methods, and security protocols also play a vital role in maintaining cloud security.

Maintaining cloud security requires a combination of proactive and reactive strategies. Troubleshooting security issues effectively involves thorough investigation, regular testing, and constant vigilance.

For further reading on cloud security strategies, check out the IBM Cloud Security webpage (IBM, What is cloud security? 2024), which provides an overview of cloud security best practices, including methods for identifying and mitigating risks and tips on maintaining security in cloud environments.

 

Reference:

IBM. (2024, October 1). What is cloud security? https://www.ibm.com/topics/cloud-security




 

 

BSIT400 - Week 7 Blog Posting - Article Review

For this weeks blog entry, I have decided to provide a review of an interesting article titled "What's the difference between cloud computing and colocation?", written by Alex Carroll and published on the Lifeline Data Centers website at https://lifelinedatacenters.com/colocation/whats-the-difference-between-cloud-computing-and-colocation/. 

The article offers a clear comparison between cloud computing and colocation, two approaches businesses can use for data storage and computing power. Cloud computing provides access to virtualized resources over the internet, making it ideal for companies looking for scalability without investing in physical infrastructure. Conversely, colocation allows businesses to rent space within a data center to house their own servers, providing more control over their hardware but requiring higher upfront investments.

The article makes a strong case for cloud computing's flexibility, especially for startups and smaller businesses that need scalable solutions without the overhead of managing physical servers. By offering virtualized environments, cloud computing reduces the cost of entry and ongoing maintenance. It also simplifies scaling up or down based on the business's needs, a significant advantage in a rapidly evolving market.

In contrast, the article highlights the advantages of colocation for larger companies with more specific requirements. These companies often choose colocation because it allows them to maintain greater control over their hardware and network configurations. Businesses that have invested in physical servers may find colocation a better option, as it helps ensure they meet compliance requirements while keeping their data secure in a professional data center environment.

The article provides valuable insights into how cloud computing and colocation serve different needs. While cloud computing is often favored for its ease of use and scalability, colocation remains a strong option for businesses seeking more control over their physical infrastructure. The choice ultimately depends on each business's specific needs, budget, and long-term goals.

Reference:

Carroll, A. (2017, June 12). What’s the difference between cloud computing and colocation? Lifeline Data Centers. https://lifelinedatacenters.com/colocation/whats-the-difference-between-cloud-computing-and-colocation/




BSIT400 Week 6 Posting - What is a Virtual Private Cloud?

A Virtual Private Cloud (VPC) in Amazon Web Services (AWS) allows you to create a logically isolated network within the AWS cloud, giving you control over your virtual environment. Think of it as your private data center in the cloud, where you define everything from the IP address range to how your network routes traffic.

When you create a VPC, you start by defining the IP address range for the network using CIDR (Classless Inter-Domain Routing) notation. You then divide this network into smaller sections called subnets, which can be either public or private. Public subnets can directly communicate with the internet, while private subnets stay isolated unless you specifically allow access. For example, a web server can be placed in a public subnet, and a database server can be placed in a private subnet to protect sensitive data.

Each VPC automatically comes with a default route table, which controls traffic flow within your network. You can also create custom route tables to define more specific rules. AWS provides a virtual internet gateway for public subnets to access the internet. For secure connections between your on-premises network and your VPC, AWS offers a Virtual Private Gateway, allowing you to extend your private data center to the cloud securely.

Security in a VPC is handled through Network Access Control Lists (ACLs) and Security Groups. These allow you to define which IP addresses or ranges can access specific resources in your VPC, providing a layered approach to securing your cloud infrastructure. A VPC gives you complete control over your network environment, from designing subnets to managing traffic routing, ensuring you can securely run applications in the AWS cloud.

Reference: 

Amazon. (2024). What is Amazon VPC? - amazon virtual private cloud. Amazon Web Services. https://docs.aws.amazon.com/vpc/latest/userguide/what-is-amazon-vpc.html