Search for question
Question

Total 2600 words and the details as below

** it is technical report, please using report format!!

Part A ( 1300 words) ** 6 reference within 5 years google scholar) ** need intext reference

Scenario:

In your class, the teaching about Firewall and its working procedures. Now, assume that you have joined the

industry as a network security expert after completing this unit. You need to expand your knowledge by

upskilling and researching related content/materials from online and other relevant sources.

TaskA.1:(Critical Analysis) ** please draft or draw a diagram to answer part of your answer

In that role, your manager asked you to develop a plan for implementing and configuring "a

virtual firewall for the public cloud". As a part of this plan, you need to write a report where you will explore

the benefits of adopting virtual firewall for cloud computing, virtual firewall types, horizon scanning of this

technology considering industry standard tools and present a case study describing the merits and/or

weaknesses, other aspects (if you want to add any).

TaskA.2: (Knowledge Reflection)

In that role, you have also heard that your business is interested about implementing the

emerging "zero trust (ZTA) security architecture (https://www.microsoft.com/en-au/security/business/zero-

trust)". While you are giving a plan on virtual firewall implementation for your business, some people think

that ZTA and Firewalls cannot work together whereas others think that they are complementary! How you will

put your logic/argument and explanation from a security expert's point of view to provide "critical" insights

with proper reasoning and logics and address this issue.

Part B (1300 words)** 6 reference within 5 years(google scholar)** need intext reference

Scenario:

In your class, the teaching you about IDS and loT Networks, Protocols, etc., assume that you have joined a

consultancy firm as a security architect after completing this unit. You need to expand your knowledge by

upskilling and researching related content/materials from online and other relevant sources.

Task B.1: (Critical Analysis) **please draft or draw a diagram to answer part of your answer

In that role, your manager asked you to develop a white paper explaining the concept "Intrusion Detection

System for Industrial Internet of Things (IoT) within Smart Grid". The white paper will inform readers concisely

about your proposed concept and present your philosophy on the matter. The report will include:

A proposed architecture for IDS considering an IoT environment within smart grid. Illustrate the architecture

and its different component, how the data flow will occur, what features are used for IDS, How IDS will

safeguard the network, other security aspects.

Task B.2: (Knowledge Reflection)

Suppose as a security architect, you are heavily dealing with IDS for Internet networks. However, the concept

of the convergence of information technology (IT) and operation technology (OT) is new to you (and of course

to many of your colleagues). However, your manager wants you to cover why IDS for Smart Grid-IoT systems

is different compared to typical network/nand possible solu

Hints

Part A1

Section 1 (Introduction)

Explain the importance of cloud security and the need for virtual firewalls

• Briefly outline what the report will cover

Section 2 (Benefits of Adopting Virtual Firewall for Cloud Computing)

• Discuss the advantages of using virtual firewalls in a cloud computing environment

• Highlight how virtual firewalls enhance security, scalability, and flexibility

Section 3( Virtual Firewall Types)

• Describe different types of virtual firewalls available for cloud environments

Differentiate between host-based, network-based, and cloud-native virtual firewalls

Section 4(Industry Standard Tools)

• Discuss industry-standard tools and solutions for implementing virtual firewalls

• Provide insights into emerging technologies and best practices

Section 5 (Case Study)

• Present a real-world case study of an organization that implementing virtual firewalls in their public

cloud infrastructure

• Discuss any additional aspects that were considered during the implementation

Part A2

Section 1 (Introduction)

• Provide an overview of the report's purpose and scope

• Explain the relevance and importance of discussing the integration of ZTA and firewalls

Section 2( Understanding Zero Trust(ZTA) Security Architecture)

Define and explain the core principled and concepts of Zero Trust security

Discuss the objectives and benefits of implementing ZTA in your context

Section 3 (the role Firewalls in Security)

• Describe the traditional role of firewalls in network security in your case

• Highlight the strengths and limitations of firewalls in a dynamic threat environment relevant to

your case

Fig: 1

Fig: 2


Most Viewed Questions Of Cloud Computing

You are negotiating the SLA with a Cloud Service Provider (CSP). Which of the following high availability guarantees is likely to cost you the most? 99.9 99.99 99.999


Which of the following enables an organization to maintain its strategic flexibility when implementing a SaaS solution? Implementing SaaS before the competitors Customizing the solution by placing logos Monitoring and enforcing SLÀ Planning an exit strategy


You work for a Cloud Service Provider, you are called into a capacity planning meeting as one the key Cloud Engineers. The Data Center and Service are in heavy demand. You need to have a plan for this growth. What is the best option if you must contract another Cloud Provider. What is our best choice? You recommend working with aSaas provide. You recommend working with anlaaS provider You recommend working with a PaaS


Virtualization has been around since the beginning of computing. The software was limited to residing on and being coupled withstatic hardware. We had always had virtualization in DataCenter We could only use products like parallels and Virtual Box.


Which of the following organizations might NOT benefit from using cloud computing dueto security and confidentiality concerns of their data? Public Libraries Food Stores Hospitals Post Offices


2. What is electronic mail (email)? Briefly explain its origin and list at least 10 features of any one the popular email service (e.g., gmail, rediffmail, yahoo, mail, hotmail, outlook etc.).


Part 1 First, implement a function that computes the summand (w x - y)x,, and test this function on two examples. Use (Vectors (https://spark.apache.org/docs/latest/api/scala/org/apache/spark/millib/linalg/Vectors$. to create dense vectors w and use (Labeled Point (https://spark.apache.org/docs/latest/api/scala/org/apache/spark/mllib/regression/Labe to create training dataset with 3 features. You can also use (Breeze (https://github.com/scalanlp/breeze)) to do the dot product.


Description The purpose of this project is to develop a graph analysis program using Map-Reduce. This project must be done individually. No copying is permitted. Note: We will use a system for detecting software plagiarism, called Moss (http://theory.stanford.edu/-aiken/moss/), which is an automatic system for determining the similarity of programs. That is, your program will be compared with the programs of the other students in class as well as with the programs submitted in previous years. This program will find similarities even if you rename variables, move code, change code structure, etc.


Part 4 Implement a gradient descent function for linear regression: Wat was (w/x-Mix) The function will take trainData (RDD of LabeledPoint) as an argument and return a tuple of weights and training errors. Reuse the code that you have written in Part 1 and 2. Initialize the elements of vector w = 0 and a = 1. Update the value of a in th iteration using the formula: Test the function on and example RDD. Run it for 5 iterations and print the results.


Your CTO wants to ensure that company users in Asia, Europe, and South America have access to cloudresources. Which cloud characteristic should be considered to meet the business need? Self-service ( Service Technology) Broad network access (Broadband Networks and Internet Architecture)LIT (D Scalability (Data Center Technology)