THANGLNGCS18608 Unit 16. Assignment 02

Download as pdf or txt
Download as pdf or txt
You are on page 1of 45

ASSIGNMENT 2 BRIEF

Qualification BTEC Level 5 HND Diploma in Computing

Unit number Unit 9: Cloud Computing

Assignment title Cloud’s implementation and security threats

Academic Year 2018 – 2019

Unit Tutor DO Quoc Binh

Issue date Submission date 11/6/2020

IV name and date

Submission Format:

Format: A presentation in Power Point format(about 25 pages)


A security manual(in PDF format)
You must use font Calibri size 12, set number of the pages and use multiple line spacing at
1.3. Margins must be: left: 1.25 cm; right: 1 cm; top: 1 cm and bottom: 1 cm. The reference
follows Harvard referencing system.
Submission Students are compulsory to submit the assignment in due date and in a way requested by
the Tutors. The form of submission will be a soft copy posted on
http://cms.greenwich.edu.vn/
Note: The Assignment must be your own work, and not copied by or from another student or from
books etc. If you use ideas, quotes or data (such as diagrams) from books, journals or other sources, you
must reference your sources, using the Harvard style. Make sure that you know how to reference
properly, and that understand the guidelines on plagiarism. If you do not, you definitely get failed

Unit Learning Outcomes:


LO3 Develop Cloud Computing solutions using service provider’s frameworks and open source tools.

LO4 Analyse the technical challenges for cloud applications and assess their risks

Assignment Brief and Guidance:

Task 1

Base on the scenario and architecture design in the first assignment provide the implementation. Because
of the time constraint of the assignment, the implementation just provides some demo functions of the
scenario. The implementation includes two parts:

 A presentation (about 25 pages)


o which shows which functions are implemented
o How to config, deploy and test the services (Web application, Database Server, Source
code management, server logs..) using service provider’s frameworks and open source
tools.
o Images for the built functions
 The source code for the built application

Task 2

The table of contents in your security manual (which should be 500–700 words) should be as follows:

1. Analysis of the most common problems of a cloud computing platform.


2. Possible solutions to these problems.
3. Analysis of the most common security issues in the cloud environment.
4. Discussion on how to overcome these issues.
5. Summary.
Learning Outcomes and Assessment Criteria

Pass Merit Distinction

LO3 Develop Cloud Computing solutions using service provider’s


frameworks and open source tools
D2 Critically discuss how one can
P5 Configure a Cloud Computing M3 Discuss the issues and overcome these issues and
platform with a cloud service constraints one can face during the constraints.
provider’s framework. development process.

P6 Implement a cloud platform


using open source tools.

LO4 Analyse the technical challenges for cloud applications and assess their
risks

P7 Analyse the most common M4 Discuss how to overcome these D3 Critically discuss how an
problems which arise in a Cloud security issues when building a organisation should protect their
Computing platform and discuss secure cloud platform. data when they migrate to a cloud
appropriate solutions to these solution.
problems.
P8 Assess the most common
security issues in cloud
environments.
ASSIGNMENT 2 FRONT SHEET

Qualification BTEC Level 5 HND Diploma in Computing

Unit number and title Unit 16: Cloud Computing

Submission date 11/6/2020 Date Received 1st submission

Re-submission Date Date Received 2nd submission

Student Name Le Ngoc Thang Student ID THANGLNGCS18608

GCS0706PPT – Cloud
Class Assessor name Ho Nguyen Phu Bao
Computing

Student declaration

I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that
making a false declaration is a form of malpractice.

Student’s signature

Grading grid

P5 P6 P7 P8 M3 M4 D2 D3
❒ Summative Feedback: ❒ Resubmission Feedback:

Grade: Assessor Signature: Date:


Signature & Date:
Table of Contents
LO3 Develop Cloud Computing solutions using service provider’s frameworks and open source tools......................................................................8

P5 Configure a Cloud Computing platform with a cloud service provider’s framework. & P6 Implement a cloud platform using open source tools. 8

P7 Analyse the most common problems which arise in a Cloud Computing platform and discuss appropriate solutions to these problems..........25

Problems with CSP (cloud service provider)...............................................................................................................................................................25

The lack of experience, distrust of transition and abilities Shortfall..........................................................................................................................25

In cloud billing, the lack of automation...................................................................................................................................................................... 26

Inability to comply with legal obligations................................................................................................................................................................... 27

Inability to deliver and maintain a cloud solution under one umbrella with various brands.....................................................................................27

Inability to stand out from the rivalry........................................................................................................................................................................ 29

Problems with CSC (cloud service consumer)............................................................................................................................................................29

Downtime.................................................................................................................................................................................................................. 29

Security and privacy................................................................................................................................................................................................... 30

Attack threat.............................................................................................................................................................................................................. 31

Broad oversight and versatility.................................................................................................................................................................................. 31

Lock-in Vendor........................................................................................................................................................................................................... 31

Concerns on expense................................................................................................................................................................................................. 32

The lack of experience, distrust of transition and abilities Shortfall..........................................................................................................................32

The lack of cloud billing automation.......................................................................................................................................................................... 33

Power to comply with regulatory enforcement.........................................................................................................................................................33


Inability to deliver and maintain a cloud solution under one umbrella with various brands.....................................................................................34

Inability to stand out from the rivalry........................................................................................................................................................................ 34

Problems with CSC (cloud service consumer)............................................................................................................................................................34

Best practices for minimizing planned downtime in a cloud environment................................................................................................................35

Good practices for reducing risks to protection and privacy......................................................................................................................................35

Best practices to reduce cloud attacks to benefit you...............................................................................................................................................36

P8 Assess the most common security issues in cloud environments.........................................................................................................................38

Multiple cloud computing service models................................................................................................................................................................. 39

Some opportunities and hurdles when implementing cloud services........................................................................................................................39

Advantages:............................................................................................................................................................................................................... 39

Obstacles:.................................................................................................................................................................................................................. 40

Classification in cloud computing:.............................................................................................................................................................................. 41

Safety, Cloud Storage Data Safety:............................................................................................................................................................................. 41

Development trend of cloud computing:................................................................................................................................................................... 43

Completion................................................................................................................................................................................................................ 44

References................................................................................................................................................................................................................. 45
LO3 Develop Cloud Computing solutions using service provider’s
frameworks and open source tools
P5 Configure a Cloud Computing platform with a cloud service provider’s framework.
& P6 Implement a cloud platform using open source tools.
- First I’m create a folder to contain my project.
I’m using git to get my code that I was post on github.

After downloaded, all files are ready to go.


- I was downloaded composer code for the project

It will helping me to control my code.


Copy .env.example to a new .env file that I will configuring env file to connect Heroku Cloud Services.
Create a key for my database. That key is require for configuring on Heroku.
I created an app on heroku.
Create Heroku database, define that postgres is database add-on for my application.
Configure .env file, using information form Heroku database.
Add Variables for Configuration Database.
Create database.
Define that code is merged.
I was commit it so nothing happened.
I push code to Heroku services.
I used command “open heroku” to open my project on heroku, you can see that my app crashed because Database is not configure
yet.
The last variable is “DB_CONNECTION” “pgsql” helping Heroku know that my app run on postgresql database.
I reset it and now it runing.

My app available in: https://morning-cove-15678.herokuapp.com/


P7 Analyse the most common problems which arise in a Cloud
Computing platform and discuss appropriate solutions to these
problems.

Problems with CSP (cloud service provider)

The lack of experience, distrust of transition and abilities Shortfall

There are also internal processes and workflows involved with a cloud sector.

Everything so many suppliers of services get their minds around. They have

They know that they have immense infrastructure at their hands in the cloud, but not everyone knows what to sell or how to

advertise and sell a cloud service. Because of this, they are grappling with problems such as is there any automated cloud-based

technology available that lets organizations simplify their distribution processes or what is the best marketing automation platform

for small and medium-sized companies?

In other examples, they do not have the requisite workforce skills or the staff are unable to adjust to the techno-commercial

mentality that any cloud organization requires. Some still struggle with automation. They don't understand how their overheads are

raised by manual operations.


In cloud billing, the lack of automation

Cloud infrastructure is a subscription model, allowing its consumers the option to scale services up or down, ensuring that CSPs need

to charge their end consumers on a pay-per-use basis. There are also different ways to purchase on-demand, prepaid, dedicated

space, and corporate arrangements for cloud services every month, and this trend is apparently going to intensify over time.

The price of the cloud is very complicated, because unlike the billing process used in the conventional buy-sell model, it's billing.

Often, pricing models for SaaS, IaaS or PaaS differ greatly. The need for an integrated invoicing tool for CSPs has spawned this

uncertainty. There are, however, many third-party tools currently on the market to support service providers, but finding the best

one can be challenging.


Inability to comply with legal obligations

The Cloud is a thriving business, no wonder. Cloud applications are now in demand with benefits such as scalability, accessibility, and

convenience, and demand will certainly spiral in the future. This has and would contribute to accelerated migration of and analysis

of more sensitive data. It is also the sole duty of the CSP to safeguard consumer records.

Security is also regarded as the shared responsibility of both the cloud for several occasions

The provider and the consumer. The management of servers, infrastructure and networking is definitely the responsibility of the

cloud service, but security is our responsibility.

The user is definitely responsible for software , operating systems, identity and access control, and network traffic security. So,

cloud service, providers need to focus as feverishly on their security requirements as they are working to improve their technical

capabilities.

The blurred lines find it difficult to solve security concerns and issues in cloud computing, but identifying role-based user control and

granting permissions at the ground level will definitely benefit both sides.

Inability to deliver and maintain a cloud solution under one umbrella with various brands

This is one of the greatest problems of cloud computing. The client now is an a deal in the driver's seat. They are seeking to step
away from yesterday's architecture to move to quickly configurable structures that are the solution to the problems they face in

industry. Customers are still searching for such CSPs who will provide them with a completely application-aware 'business-ready' IT

service management cloud network and help them clear a stable road to sustained innovation. Ironically, while an advantage, it is

another obstacle for CSPs to develop the ability to construct and deliver the sort of multi-cloud services that their clients want.

Today, CSPs still fall short of effectively combining multiple cloud technologies from different vendors and offering bundled solutions

according to the needs of customers.


Inability to stand out from the rivalry

There are numerous cloud applications available today in the cloud industry , providing consumers simple choices while creating a

challenge for a cloud hosting provider.

In this crowd, provider to distinguish and stand out. CSPs need to present their goods in a special way, to market them, with the

competition getting fierce.

As per the figures below, the total amount of years a consumer spends with the main supplier is 3.2. So, you need to create a long-

term value-based relationship with the customer to keep the customer.

Problems with CSC (cloud service consumer)

Downtime

Downtime is often cited as one of cloud computing 's greatest drawbacks. Service outages are still an unpleasant probability and can

arise for any cause, because cloud storage networks are internet-based. Will your organization bear the consequences of an outage

or a slowdown? In 2017, an outage on Amazon Web Sites cost up to $ 150 million dollars for publicly traded firms. Unfortunately, no

organization, particularly when vital business processes do not afford to be disturbed, is safe. A wide number of industries and

networks is struck by outages in June and July of 2019, including Cloudflare (a major supplier of online services), Google , Amazon,
Shopify, Reddit, Verizon, and Spectrum.

Security and privacy

Although cloud service providers adopt the latest security practices and industry certifications, the storage of data and essential

external service files

It still brings up risks for suppliers. Security and privacy, particularly when it comes to handling confidential data, must be discussed

in any discourse concerning data. We do not ignore what happened at Code Space and the hacking of their AWS EC2 console,

leading to the deletion of data and the company's eventual shutdown. Their dependency on cloud-based remote computing meant

taking on the risks of outsourcing it all.

Of necessity, maintaining and safeguarding the underlying hardware architecture of a deployment is required for every cloud service

provider. Your duties, though, lie in the area of user access control, and it is up to you to consider all the risk scenarios carefully.

While recent credit card data attacks and user login passwords are still fresh on the public's minds, measures have been taken to

ensure data protection. The General Data Protection Rule (GDPR), which was recently implemented in the European Union to allow

consumers greater power of their data, is one such example. Nevertheless, you always have to be mindful of your tasks and obey

best standards.
Attack threat

Any part is online in cloud computing, which shows potential vulnerabilities. From time to time, even the strongest teams experience

extreme threats and data violations. Since cloud infrastructure is designed as a public utility, before you learn to walk, it's simple to

run. After all, before issuing you an account, no one at a cloud provider tests your administration skills: all it takes to get started is

normally a legitimate credit card.

Broad oversight and versatility

As the service provider fully controls, operates and tracks the cloud assets, it passes limited power to the user. Cloud users can find

that they have less control over the functioning and execution of services within a cloud-hosted infrastructure to varying degrees

(depending on the individual service). End-user licensing deal by a cloud provider

(EULA) and management policies can place limitations to what their implementations may do for clients. Customers maintain

ownership of their software, records, and facilities, but their backend infrastructure may not have the same degree of control.

Lock-in Vendor

A further potential downside in cloud storage is vendor lock-in. Fast switching between cloud providers is a service that has not

matured entirely yet, and it can be difficult for companies to move their services from one provider to another. Differences between

provider systems will cause problems in switching from one cloud platform to another, which may be equal to added costs and
nuances of setup. Gaps or compromises made during migration may also expose the data to additional flaws in security and privacy.

Concerns on expense

It can be viewed as costly to implement cloud solutions on a small scale only for short-term initiatives. In terms of IT cost savings,

however, the most critical cloud computing advantage is. More simplicity and lower hardware costs can be offered by pay-as-you-go

cloud providers, but the average price tag could end up being higher than you anticipated. If you are confident of what would fit well

for you, playing with a range of offerings is a smart idea. Cost calculators made available by providers such as Amazon Web Services

and the Google Cloud Portal can also be included.

Possible answers to those questions.

Problems with CSP (cloud service provider)

The lack of experience, distrust of transition and abilities Shortfall

Recognize the different interests, expectations and desires of all workers and take an educated approach to the transition of

employees' mindsets. Build a

Appropriate self-planning as well as team transformation-discuss whether the transition is

Required and how it can be generated along with the consequences it can offer. Have good contact beforehand, gather the best

skills and competencies, outline how both business success and individual departments will benefit from technologically trained
workers. CXOs must now wholeheartedly embrace digitalization and experiment using powerful new instruments and cloud

technologies. They need to take time to think about them and the impact they can have on corporate operations and the quality of

services. The key thing of interest in order to exploit the cloud is that cloud computing service providers should first consider the

best technologies they should have in place to ease enterprise cloud management.

The lack of cloud billing automation

CSPs should figure out who has the right cloud billing approach that suits their expectations in order to solve cloud billing problems.

They should follow a versatile cloud subscription billing management framework after considering the pros and cons of a cloud

billing software that can help them handle ongoing cloud billing and also assist them with minimal hassles in upselling and cross-

selling to their clients.

Create a framework that gives the visibility of your billing staff and your clients into service billing from a central location. This will

allow you to handle your billing efficiently, while accountability and self-sufficiency will be appreciated by clients. Ultimately, you can

tackle those cloud computing problems.

Power to comply with regulatory enforcement

To maintain protection, enforcement is important. In their offerings, CSPs can design security. They should be more specific on what

is permitted to go where, and under what kind of protection. A CSP wants a cloud storage system that satisfies regulatory
compliance for best consumer data security and enables CSPs to set permissions and stringent access controls for this purpose. CSPs

should ensure that, regardless of where it exists and with whom it is communicated, they have access and influence over the data.

Inability to deliver and maintain a cloud solution under one umbrella with various brands

CSPs need an overarching architecture built to operate seamlessly from hardware to software in the multi-cloud world to meet this

current collection of specifications. CSPs can use an extensible architecture for the distribution of cloud applications that enables

them to easily install new services with much fewer operating restrictions and efficiently interact with various systems and

technologies.

Inability to stand out from the rivalry

Second, create a basic and transparent product portfolio based on your customers' desires and then learn about branch-specific

product portfolios in order to become more unique in the industry. Pick a marketplace and product presentation site that helps you,

under every price model, to sell anything and anything to your clients.

Problems with CSC (cloud service consumer)


Best practices for minimizing planned downtime in a cloud environment

- High-availability design services and emergency management in mind.

Use the multi-availability zones that cloud vendors include in your

From utilities.

- If the services have a poor failure threshold, recommend multi-region implementations with automatic failover to ensure the best

possible business continuity.

- Developing and executing a disaster recovery strategy that includes the lowest possible recovery time (RTO ) and recovery point

targets (RPO) in compliance with the business goals.

- Expect the implementation of dedicated connections such as AWS Direct Link, Azure ExpressRoute or Dedicated Interconnect or

Partner from Google Cloud Interconnect. Link. Such networks provide a dedicated network connection between you and the point of

presence of the cloud provider. This will decrease sensitivity to the possibility of public internet market disruption.

- On your Service Level Agreement ( SLA), read the fine print. Will you have 99.9 percent uptime promised or even better? That 0.1%

downtime is about 45 minutes a month, or about 8 hours a year.

Good practices for reducing risks to protection and privacy

- Important: Understand the mutual model of accountability of your


Provider of clouds. For what happens inside your network and in your product, you will always be accountable.

- Enforce security at all stages of the implementation.

- Know who should have access to each resource and facility and restrict access to the minimal right. You will like their effect to be as

limited as possible if an employee goes wild and gets access to the deployment.

- Ensure that the talents of the staff are up to the challenge. A brilliant report to learn how to minimize security and privacy issues in

the cloud is the Top 10 Stuff Cybersecurity experts Need to Read.

- Take a risk-based approach to protecting cloud-based infrastructure and applying security to computers.

- Enforce multi-factor authentication on all confidential data or device control accounts.

- Encryption, cryptography, encryption. Wherever you can comfortably win, turn on encryption on object storage such as Amazon S3

or Azure Blob Storage where consumer data mostly remains. In July 2019, the simple act of turning on encryption on S3 may have

stopped the Capital One data breach that leaked the knowledge of 100 million people.

Best practices to reduce cloud attacks to benefit you

- Making defense a central component of all IT activities.

-Keeping ALL of the staff up to date on best practices in cloud protection.

- Ensuring that security protocols and practices are tested and revised periodically.

- Define information proactively and apply access management.


- Simplify regulatory controls by using cloud utilities such as AWS Inspector, AWS CloudWatch, AWS CloudTrail, and AWS Config.

- Avoid ex-filtration of results.

- Incorporate methods of detection and response into defense activities.

- Through audits, find rogue ventures.

- Delete keys to passwords from accounts that do not have to log on to services.

- Check and rotate the keys and passwords for entry.

- In order to be aware of known threats, monitor security blogs and announcements.

- Use best practices and compliance for any open source program that you are

Of. Used.

- Again, wherever and whenever possible, use encryption.

These activities will help the company track sensitive data disclosure and movement, secure critical networks from attack and

compromise, and authenticate access to resources and data to safeguard against additional threats.
P8 Assess the most common security issues in cloud
environments.
The business community is really involved in cloud computing. This article offers some basic background on security and security, as

well as the deployment of enterprises and businesses using cloud computing technologies. General presentation on cloud computing

Only in recent years has the term Cloud Computing emerged. Amazon fostered Cloud Computing research and implementation in

mid-2007. Shortly thereafter, cloud computing was forced to expand stronger and stronger with the inclusion of major corporations

such as Microsoft , Google, IBM or Amazon …

More and more enterprises are interested in creating software for cloud computing, such as Microsoft , Google, Intel, IBM, etc. That

has generated a huge application market. Cloud networking, allowing people and companies who want to "cloud" their software and

data more options. In the future, cloud infrastructure growth will concentrate on three key issues, according to experts, including:

interoperability (federated), automation (automated) and terminal identity client (aware ware). There are also new approaches to

the automation of information technology that enable users to respond in a faster, more reliable and cost-effective way to user

requests. Related clouds will allow resources to be organized more easily, while endpoint-aware clouds will optimally take advantage

of each device's specific features.


Multiple cloud computing service models

In cloud infrastructure, all information technology-related possibilities are offered in the form of 'Services,' where consumers access

technology services from a given provider. "In the cloud," without being worried with the technology's server resources. Software as

a Service (SaaS), Infrastructure as a Service (IaaS) and Application as a Service ( PaaS) are the three most basic frameworks widely

found in cloud computing.

Some opportunities and hurdles when implementing cloud services

Advantages:

- Low investment costs: users require time and capital to develop plans, invest in facilities, spend equipment and management

according to the conventional model to acquire facilities, machinery and human capital .... In the cloud computing model with the

slogan "Pay as you use" (users only have to pay for what they have used), these problems can be addressed in the cloud computing

model with the slogan "Pay as you use" (users only have to pay for what they have used). This expense is not minimal and it is often

not used properly, for example, does not satisfy the demand or does not use maximum power during use.
- High processing speed, no longer reliant on the platform and geographical location: enables users to access and use the system

anywhere and on any device (such as a PC or mobile device ...) via web browser.

- Easy to extend and update: Customers only need to send a request to the service provider instead of needing to spend in new or

revamped infrastructure , applications, management staff ... to expand or upgrade the system with cloud storage.

Obstacles:

- Privacy: data about users and data stored on the cloud is not guaranteed to be confidential and can be used for other uses as well.

- Availability: cloud storage centers or network networks can have difficulties, causing cloud servers to "hang" suddenly, meaning

that at some time periods, customers can not access their services and data.

- Data failure capability: some cloud online data storage systems suddenly stop operating or stop delivering services, including, for

some reason, information in some situations. The customer is missing and is unable to be recovered

- Protection ability: the issue of concentrating data on the cloud is an affected wat to increase security, but on the other hand it is

the concern of cloud computing services customers that all data can be taken over if the cloud is attacked or compromised.
Classification in cloud computing:
Cloud computing can essentially be categorized as follows:

- Public Cloud: public cloud software, computing and other services are made open to the public by an open service provider. Those

facilities are free of charge or paid for (pay-per-usage) by use. User data in the public cloud will typically be maintained in the cloud

and approved for maintenance by the service provider.

- Private Cloud: a cloud storage infrastructure that only exists with a single person, whether managed, stored internally (internal) or

by an external third party. Users will be assured of better data protection with the private cloud, which is ideal for users who have

confidential data and need high privacy.

- Hybrid Cloud: a part of two or more clouds (private and public cloud) that remain the only organizations but unite them, offering

the advantages of several models of implementation. Companies and individuals can manage mistakes by using the "Hybrid cloud"

architecture, paired with instant on-site usability without relying on an internet connection.

Safety, Cloud Storage Data Safety:


In practice, protection is essential for the growth of cloud computing. Many organisations and corporations have studied and
provided many stable cloud computing applications at present. A short description of some of the most recently released security

models and cryptographic algorithms is given below.

Three-layer cloud infrastructure data security architecture

Layer 1: A single-time password (OTP) authentication layer is a widely deployed method for users using cloud storage. Highly secure

networks can need both user and vendor authentication, but only one-way authentication for free cloud services (Figure 3).

Layer 2: By an encryption algorithm, this layer guarantees data security (Data Encryption), data integrity (Data Integrity) and user

privacy security (Private User Protection).


Layer 3: User data layer for fast data recovery according to the speed of decryption.

The data security model uses VPN Cloud to ensure that the data on the channel is protected, to encrypt the path between private

clouds with each other and between users, people use VPN cloud (VPN Cloud). The Cloud. For organisations with high data

protection requirements, the enterprise cloud computing model (Private Cloud Computing) is often preferred when implemented.

The communication between users and the cloud as well as the connection between private clouds would be secured and protected

through the IPS specification by VPN Cloud.

Development trend of cloud computing:

Recently, in addition to supplying companies with cloud infrastructure models and services, providers are seeking to bring their

cloud technologies and services to developed countries' state administrative agencies. Famous cloud providers such as Amazon EC2,

Microsoft Azure, IBM have Smart Cloud Business, Google offers App Engine, Redhat offers Redhat's Openshift, VMware has Cloud

Foundry, Vietnam's Information and Digital Content Industry Institute has iDragon Clouds ... Google Cloud, Redhat's Openshift,

VMware Cloud Foundry, and NISCI iDragon Clouds are PaaS open source, allowing deployment on a lo lo lo lo According to several

analysts, by 2020 , the number of public cloud users would reach 1 billion. It is estimated that about 1 billion users typically use

Microsoft Office, OpenOffice or LibreOffice, Microsoft Exchange or Sharepoint, IBM Lotus Notes in the world in 2012, and that

everyone will migrate to the public cloud by 2020.


Completion
Cloud computing is increasingly evolving and expanding, and existing architectures will be steadily replaced in the near future by this

technology. The introduction of cloud computing has not only been applied for small to medium-sized businesses or sole customers,

but for major enterprises and state agencies. The concern is whether the use of cloud storage is always secure for the safety of

users, honesty of records, confidentiality.... This is still a problem that in the future needs to be explored.
References.
[1]. Jadoun, M., 2020. Biggest Cloud Computing Challenges For Service Providers In 2020. [online] RackNap Blog - A Guide to
Automate Web Hosting and Cloud Business. Available at: [Accessed 24 October 2020].

[2]. Cloud Academy. 2020. Disadvantages Of Cloud Computing - Cloud Academy Blog. [online] [Accessed 24 October 2020].

[3]. Cyberleninka.org. 2020. [online][Accessed 24 October 2020].

[4]. Golden, B., 2020. 3 Key Issues For Secure Virtualization. [online] CSO Online. [Accessed 24 October 2020].

[5]. Default. 2020. Network Security Basics - Definition, Threats And Solutions | Computer Network | Comptia. [online] [Accessed 24
October 2020].

[6]. Ijceronline.com. 2020. [online] [Accessed 24 October 2020].

[7] Book – Cloud Computing Concepts, Technology & Architecture – Cloud Computing 2020, University of Greenwich (Alliance
with Vietnam FPT Education), United Kingdom.

[8] Heroku.com. (2020). Platform as a Service | Heroku. [online] Available at: https://www.heroku.com/platform [Accessed 24
October. 2020].

[9] Jaysonmicronet.weebly.com. (2020). [online] Available at:


http://jaysonmicronet.weebly.com/uploads/4/3/2/4/43244245/task_guidelines_cloud_computing.pdf [Accessed 24 October. 2020].

[10] SearchCloudComputing. (2020). Five open source tools for building and managing clouds. [online] Available at:
https://searchcloudcomputing.techtarget.com/tip/Five-open-source-tools-for-building-and-managing-clouds [Accessed 24 October.
2020].

You might also like