Public Cloud

Home/Tag: Public Cloud

NIST SP 800-145 (Cloud Computing Definitions)

2020-09-02T05:39:50+00:00Categories: Network Administration, Network Security, Standards and Agreements|Tags: , , , , , , , , , , , , , , , |

Recent our posts were about NIST SP 800-137 and NIST SP 800-53A. In this post, we are going to review NIST SP 800-145. The title of this article is: Evaluation of Cloud Computing Services. This publication published in 2010. The PDF file of this publication consists of 32 pages and 7 chapters. These chapters are: Chapter [...]

Amazon VPC

2020-09-02T05:40:25+00:00Categories: Computer & Network Concepts|Tags: , , , , , , , , , |

Amazon Virtual Private Cloud (VPC) is a commercial cloud computing service that provides a virtual private cloud, by provisioning a logically isolated section of Amazon Web Services (AWS) Cloud. This service enables customer to launches AWS resources into a virtual network that he/she/it has defined. So, a customer has complete control over his/her/its virtual networking [...]

All Things About Public Cloud Services

2020-09-02T05:32:39+00:00Categories: Computer & Network Concepts, Network Security|Tags: , , , , , , , , , , , , |

First of all, we need to know a little bit about the concept of "public cloud services" or "as s service". The term "cloud services" refers to a wide range of services delivered on demand to companies and customers over the internet and in fact, it refers to a broad category that encompasses the myriad IT [...]

Integrate Identity-as-a-Service

2020-07-16T08:12:21+00:00Tags: , , , , , , , |

Integrate Identity-as-a-Service Where Microsoft servers are used, organizations can integrate their systems and applications with Microsoft Active Directory. In organizations without Microsoft servers, open source tools that use LDAP (lightweight directory access protocol) are a preferred choice. Identity as a third party and Identity as a Service are best example of identity management tools. [...]

Vulnerability Assessment & Mitigating Vulnerabilities of Security Architectures- Part II

2020-07-15T14:09:37+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Assessing & Mitigating Vulnerabilities of Security Architectures- Part II (IoT) Cloud-based systems Cloud Computing eliminates the need for on-premises devices by renting a virtual machine hosted by a trusted third-party. This remote computing enhances the efficiency, performance, scalability, and security. There are three different models for cloud computing: Iaas (Infrastructure as a service): Instead [...]

Go to Top