You are on page 1of 4

EXAMINATION OFFICE

IU.ORG

PROJECT REPORT
Tasks for Course: DLMCSEPCCCS01_E – Project: Current
Challenges of Cyber Security
CONTENT
1. Tasks ......................................................................................................................................... 2
1.1 Task 1: Define the Hardening security procedures for using AWS cloud computing and define the needed
requirements/procedures to move your AWS cloud environment to a Chinese provider .......................... 2
1.2 Task 2: Define the Hardening security procedures for using Azure cloud computing and define the
needed requirements/procedures to move your Azure cloud environment to a Chinese provider ........... 3
1.3 Task 3: Define the Hardening security procedures for using GCP cloud computing and define the needed
requirements/procedures to move your GCP cloud environment to a Chinese provider ........................... 3
1.4 Literature .................................................................................................................................................... 4
2. Additional information for the evaluation of the Project REport ..................................................... 4
3. Tutorial Support ......................................................................................................................... 4

page 1 of 4
EXAMINATION OFFICE
IU.ORG

1. TASKS
You can choose from the following tasks for your project report. Please select one of them to work on in your
project report.

Note on copyright and plagiarism:


Please note that IU Internationale Hochschule GmbH holds the copyright to the examination tasks. We expressly
object to the publication of tasks on third-party platforms. In the event of a violation, IU Internationale
Hochschule is entitled to injunctive relief. We would like to point out that every submitted written assignment is
checked using plagiarism software. We, therefore, suggest not sharing solutions under any circumstances, as this
may give rise to the suspicion of plagiarism.

Background: Cloud computing allows large enterprises to scale their infrastructure on demand and size it
according to their business needs. Furthermore, cloud computing enables end-users to access their data anytime,
from anywhere, and from any device connected to the internet. Moreover, cloud computing enables integrating
new features or additional resources to the existing systems as additional capacity.
Although there are numerous advantages to cloud computing, there are also drawbacks. The relative lack of
security, trust, and privacy still hinders the adoption of cloud solutions. The lack of control over data and
processes and the usage of virtualization technologies has led to new threats that were once irrelevant. For
example, cloud-hosted applications can access confidential information, posing a security threat.
Cloud security refers to measures undertaken to protect digital assets and data stored in the cloud. Efforts to
preserve this data include data encryption, data hash, virtual private networks (VPNs) usage, access control,
security tokens, multi-factor authentication and authorization, and intrusion detection and prevention systems.

1.1 Task 1: Define the Hardening security procedures for using AWS cloud computing and define the needed
requirements/procedures to move your AWS cloud environment to a Chinese provider
Assume that you are the CEO of one of the Telecommunication companies in Germany and you are planning to
move to the AWS cloud provider. Furthermore, you would like to be ISO 27001, PCI DSS, and GDPR compliant.
However, security is your main concern, and you are looking forward to hiring a security architect who can set
security hardening procedures to secure your cloud environment.
Requirement 1: Provide these hardening procedures and specify which of these procedures (or additional
methods) are needed for each of the following standards
ISO 27001
PCI DSS
GDPR
Furthermore, you are opening a new branch of your company in Chine. Due to privacy regulations in China,
personal data can't be moved outside the country. Thus, you decided to explore your options either (a) using AWS
in China (if possible) or (b) using the Alibaba Cloud provider.
Requirement 2: Explore the two options and specify if additional requirements/procedures are needed to achieve
the two options.

page 2 of 4
EXAMINATION OFFICE
IU.ORG

1.2 Task 2: Define the Hardening security procedures for using Azure cloud computing and define the
needed requirements/procedures to move your Azure cloud environment to a Chinese provider
Assume that you are the CEO of one of the Telecommunication companies in Germany and you are planning to
move to the Microsoft Azure cloud provider. Furthermore, you would like to be ISO 27001, PCI DSS, and GDPR
compliant. However, security is your main concern, and you are looking forward to hiring a security architect who
can set security hardening procedures to secure your cloud environment.
Requirement 1: Provide these hardening procedures and specify which of these procedures (or additional
methods) are needed for each of the following standards
ISO 27001
PCI DSS
GDPR
Furthermore, you are opening a new branch of your company in Chine. Due to privacy regulations in China,
personal data can't be moved outside the country. Thus, you decided to explore your options either (a) using
Azure in China (if possible) or (b) using the Alibaba Cloud provider.
Requirement 2: Explore the two options and specify if additional requirements/procedures are needed to achieve
the two options.

1.3 Task 3: Define the Hardening security procedures for using GCP cloud computing and define the needed
requirements/procedures to move your GCP cloud environment to a Chinese provider
Assume that you are the CEO of one of the Telecommunication companies in Germany and you are planning to
move to the Google Cloud Computing (GCP) cloud provider. Furthermore, you would like to be ISO 27001, PCI DSS,
and GDPR compliant. However, security is your main concern, and you are looking forward to hiring a security
architect who can set security hardening procedures to secure your cloud environment.
Requirement 1: Provide these hardening procedures and specify which of these procedures (or additional
methods) are needed for each of the following standards
ISO 27001
PCI DSS
GDPR
Furthermore, you are opening a new branch of your company in Chine. Due to privacy regulations in China,
personal data can't be moved outside the country. Thus, you decided to explore your options either (a) using GCP
in China (if possible) or (b) using the Alibaba Cloud provider.
Requirement 2: Explore the two options and specify if additional requirements/procedures are needed to achieve
the two options.

page 3 of 4
EXAMINATION OFFICE
IU.ORG

1.4 Literature
Guptha, Ashwin, Harshaan Murali, and T. Subbulakshmi. "A Comparative Analysis of Security Services in Major
Cloud Service Providers." 2021 5th International Conference on Intelligent Computing and Control Systems
(ICICCS). IEEE, 2021.
Singh, Ashish, and Kakali Chatterjee. "Cloud security issues and challenges: A survey." Journal of Network and
Computer Applications 79 (2017): 88-115.
Ryoo, Jungwoo, et al. "Cloud security auditing: challenges and emerging approaches." IEEE Security & Privacy
12.6 (2013): 68-74.

2. ADDITIONAL INFORMATION FOR THE EVALUATION OF THE PROJECT REPORT


Explain each hardening procedure and requirement in detail and reflect on it continuously, at the latest in the
final chapter. When conceptualizing and writing the written assignment, the evaluation criteria and explanations
given in the writing guidelines should be considered.

3. TUTORIAL SUPPORT
In this Project Report task, several support channels are open; as the student, it is your responsibility to select
your preferred support channel. The tutor is available for technical consultations and for general questions
regarding the procedure for processing the Project Report. However, the tutor is not required to approve outlines
or parts of texts and drafts. Independent preparation is part of the examination work and is included in the overall
evaluation. However, general editing tips and instructions are given to help you get started with the Project
Report.

page 4 of 4

You might also like