Home / Cloud Computing

Cloud Computing

Secure Data Transport in the Cloud

Secure Data Transport in the Cloud

On the Internet, the primary protection mechanism is encryption. Cloud providers use encryption such as Advanced Encryption Standards (AES) and Triple Data Encryption Standards (3DES) to ensure a standard of security in their environments. Encryption is often used with identity management. To avoid exposure to a user’s identity and to …

Read More »

Key Technical Considerations for Cloud Deployments

INTRODUCTION In this lesson, different cloud types will be compared to identify which type is best suited to meet an organization’s business needs. Technical details of new and/or previously discussed cloud components and features will also be explained.  Cloud service providers will often adopt technical standards to ensure its customer …

Read More »

Cloud Computing Security: Issues and Challenges

Cloud Issues

Cloud Computing Security Issues Just as many companies and organizations are attentive and responsive to security concerns within their private networks, there are also security concerns when moving to a cloud environment. One of the biggest security issues that cloud service providers must address is access. The question facing service …

Read More »

7 Layers of OSI Model and Their Functions

osi model

OSI Model The structure of the Internet is modeled on the Open Systems Interconnection (OSI) model. The OSI model is a framework used for all communications in the cloud. The OSI model represents the interfaces and protocols used to communicate between devices. Every network device must adhere to the rules …

Read More »

Virtualization in Cloud Computing | Virtualization Types

Introduction Virtualization provides the bridge between how information technology services are delivered in the current data center environment to how those same services and applications are delivered in a cloud environment. Understanding virtualization is critical to understanding cloud computing. Cloud computing is the model for enabling on-demand network access to …

Read More »