Professional Documents
Culture Documents
Assignment 2 BN200 Subash
Assignment 2 BN200 Subash
Cloud service models explain the extent to which your resources are handled by you or your
cloud service providers. [2]
4.
AWS Azure
It is Amazon's On-Demand Cloud It is Microsoft's Public Cloud Infrastructure.
Computing Service [6] [6]
AWS is continually improving its Organizations can link their on-premises
hybrid cloud solution. [6] servers to cloud instances. This is useful in
hybrid cloud spaces. [6]
You can monitor a specific machine. [6] The cloud service consists of machines that
respond to different ports with the same
domain name. [6]
Allows for long-term data storage There are no alternatives for brief
and retrieval. data retention and recovery.
There is safeguards in place Ensures safety. by providing authorizations
through predefined references with for the entire account.
privilege control capabilities.
Task 2
1. A protocol analyzer is a hardware and software system that captures and analyses
network or communication channel data, with the software part displaying the collected
output in an understandable format for the end-user. The protocol analyzer shows how
data moves over a communication link using various network protocols such as USB, I2C,
and CAN. Throughout the creation of a software or hardware product, the protocol
analyzer assists engineers in debugging faults, monitoring product performance, and
data link traffic in embedded systems. [8]
Its importance as an enterprise point of view as below:
One of the most common applications is to analyze network performance and
safeguard the network from malicious activities within an enterprise. This is
accomplished by collecting and recording data packets as they transit through
the network. [8]
It can be applied to a single device or a group of devices on the same network at
the same time. [8]
It pinpoints the sections of the network that are clogging up the network's traffic
flow. [8]
We can use a packet sniffer and see which sites the end-user is visiting the most
on the Internet. We may also keep track of the types of files that the end-user
downloads. This feature allows businesses to keep track of their employees'
surfing habits and enhance their security features as needed. [8]
It detects unusual packet characteristics in the network and over the Internet.
[8]
4. Wireshark has a wealth of features that allow you to assess a variety of network issues,
including misconfigurations, device failures, and issues caused by a variety of external
and internal issues. We encourage network administrators to recognize the importance
of using this type of tool. This is a valuable tool for identifying the causes of some
problems that take a long time to find using other methods and have availability
consequences. Information confidentiality takes precedence over other services.
Use Wireshark filters to clean up and perform more thorough traffic analysis as
well as other Wireshark features (tcpstream follow, expert information, etc.). Finally,
you learned how to use charts in Wireshark to analyze the usefulness and efficiency of
your network. Wireshark is a great knowledge base for networking and communications
enthusiasts and one of the best protocol analyzers available today.
References
References
[3] M. Cancila, D. Toombs and A. &. K. E. Waite, "Gartner;2017 Planning Guide for cloud computing,"
october 2016. [Online]. Available: https://www.gartner.com/en/documents/3471551. [Accessed
26 may 2022].
[4] T. MORROW, "SEI Blog;12 Risks, Threats, & Vulnerabilities in Moving to the Cloud," 2018.
[Online]. Available: https://insights.sei.cmu.edu/blog/12-risks-threats-vulnerabilities-in-moving-
to-the-cloud/. [Accessed 26 may 2022].
[8] software Testing Help, "software Testing Help," software Testing Help, 2 may 2022. [Online].
Available: https://www.softwaretestinghelp.com/best-network-protocol-analyzer/. [Accessed 30
may 2022].