Lovely Professional University Academic Task N0-3 Cyber Security Essentials
Lovely Professional University Academic Task N0-3 Cyber Security Essentials
Q1) Just like other assets, the VMs that you have started building are subject to various
risks, both intentional and accidental, including the destruction of data. In order to recover
from such incidents quickly and to ensure that your VMs remain available and functional,
you want to take advantage of ability to create snapshots. It will enable you to quickly revert
your VMs to a baseline configuration, essentially resetting the machines to a known, secure
state. Why is elasticity such an important component of cloud services? How does it differ
from scalability? Discuss in detail.
Ans:
Virtualization has made a dramatic impact in a very short time on IT and networking and has
already delivered huge cost savings and return on investment to enterprise data centres and
cloud service providers. Typically, the drivers for machine virtualization, including multi-
tenancy, are better server utilization, data centre consolidation, and relative ease and speed of
provisioning. Cloud service providers can achieve higher density, which translates into better
margins. Enterprises can use virtualization to shrink capital expenditures on server hardware
as well as to increase operational efficiency. Some think that virtualized environments are
more secure than traditional ones for the following reasons:
Isolation between virtual machines (VMs) provided by the hypervisor
No known successful attacks on hypervisors1save for theoretical ones, which require access
to the hypervisor source code and ability to implement it
Ability to deliver core infrastructure and security technologies as virtual appliances such as
network switches and firewalls
Ability to quarantine and recover quickly from incidents. Others think that the new
virtualized environment requires the same type of security as traditional physical
environments. As a result, it is not uncommon to selegacy security solutions, processes, and
strategies applied to the virtual environment. The bottom line, though, is that the new
environment is more complex and requires a new approach to security.
Cloud Elasticity:
Scalability:
Ability of a software system to process higher amount of workload on its current hardware
resources or on current and additional hardware resources without application service
interruption;
Difference:
Q2) Explain in how network security programming works in iPhone platforms. Support
your answer with the help of a code or a demonstration.
Ans:
As more business moves to the cloud, security data is frequently spread across different tools,
clouds and IT environments. This requires teams to spend more time integrating tools and
information –and maintaining those integrations –and less time securing their organizations.
IBM Cloud Pak for Security helps teams address these issues with an open, secure platform.
Network security:
Network security is a broad term that covers a multitude of technologies, devices and
processes. In its simplest term, it is a set of rules and configurations designed to protect the
integrity, confidentiality and accessibility of computer networks and data using both software
and hardware technologies. Every organization, regardless of size, industry or infrastructure,
requires a degree of network security solutions in place to protect it from the ever-growing
landscape of cyber threats in the wild today.
Network security combines multiple layers of defenses at the edge and in the network. Each
network security layer implements policies and controls. Authorized users gain access to
network resources, but malicious actors are blocked from carrying out exploits and threats.
Q3) IBM recognizes the need for official policies that clearly state how employees should
and should not use company’s property at work. Consult some free policy templates provided
by SANS institute. Which of the policies do you think are the most relevant to IBM’s security
concerns as noted in the scenario? Discuss in detail.
Ans:
IBM is committed to principles of business ethics and lawful conduct. It is IBM's policy to
conduct itself ethically and lawfully in all matters and to maintain IBM's high standards of
business integrity.
Work Diversity:
The employees of IBM represent a talented and diverse workforce. Achieving the full
potential of this diversity is a business priority that is fundamental to our competitive success.
A key element in our workforce diversity programs is IBM's long-standing commitment to
equal opportunity and an inclusive workplace.
IBM has more than 100 years of work on diversity, inclusion and equality in the workplace.
That legacy, and our continued commitment to advance equity in a global society, has made
us leaders in diversity and inclusion. Guided by our values and beliefs, we’re proud to foster
an environment where every IBMer is able to thrive because of their differences, not in spite
of them. IBM has taken and will continue to take a bold stand in favour of equal opportunity
for all.
Employees Participation:
SANS:
SANS is the most trusted and by far the largest source of cyber security training in the world.
It offer training through several delivery methods including OnDemand and instructor-led
both Live Online (virtual) and In-Person. Our cybersecurity courses are developed by
industry leaders in numerous fields including network security, digital forensics, offensive
operations, cybersecurity leadership, industrial control systems, and cloud security.
SANS OnDemand was designed to offer you convenient and flexible online cybersecurity
training, on your terms. Students who use OnDemand are able to avoid travel, learn from the
best in the business and study at their own pace.
Policies:
IBM has a strong tradition and commitment of exemplary corporate citizenship. We feel a
deep sense of responsibility both inside and outside the company -- a focused determination
to enhance the communities in which we do business.
IBM has selected strategic areas that focus initiatives and investment for higher impact. They
are: