Assignment No. 01 Semester: Fall 2018 CS435: Cloud Computing Solution

Discuss CS Assignments in this section .
Forum rules
Discuss Following Subjects Assignments:
Post Reply
User avatar
Posts: 177
Joined: Fri Dec 22, 2017 8:10 am
Location: Lahore
Has thanked: 6 times
Been thanked: 7 times
Status: Offline

Assignment No. 01 Semester: Fall 2018 CS435: Cloud Computing Solution

Post by ALI RAZA » Thu Dec 13, 2018 7:07 am

Question # 1: Let’s suppose you are an administrator in an organization and your boss give you a task to meet delegation of multiple government universities. These universities want to create a group of networks and share their resources for a very huge application but in the meanwhile they are not in position to buy high-level resources for this application. Every university has different type of technology in its network. They also hesitate in involving another party in this group due to security reasons. Your task is to provide the most appropriate and cost-effective technology which can be used in the current scenario.

Question # 2: XYZ is an agriculture company which is seeking for a secure network to share information among its different offices. The head office of this organization is in Islamabad while its sub offices are in Lahore, Karachi and Peshawar. Each field officer and worker of the company collects data and shares it with its local offices which are further shared with head office. As the company have many competitors so it wants to keep the data as much secure as possible, hence the main requirement is to keep its data secure. The company also wants to keep the cost as low as possible.

According to this scenario you are required to answer the following questions.
1. Identify which type of network is more suitable for the above scenario.
2. Explain how this network works.

Question # 3: As we know there are many security threats to network cloud such as you sent a message to the network cloud, but the network cloud receives an edited/changed message. In view of security perspective, you are required to answer the following questions.

1. Identify the type of the security attack describe above.
2. How the identified attack works? Briefly explain.

Post Reply

Last 10 Members Who Visited This Topic

User avatar ALI RAZA (2)

  • Similar Topics
    Last post

Who is online

Users browsing this forum: No registered users and 1 guest