You are on page 1of 6

Analytical Questions

1. A reputed technical university uses virtual server concept for different application like mail, web
application, and database etc., but the APIs itself are still proprietary. Thus, customers cannot easily
extract their data and programs from one site to run on another. Justify and suggest some solutions
to the above problem based on security

Ans:

The use of virtual servers for different applications can provide several benefits, such as
increased flexibility, scalability, and cost savings. However, the issue of proprietary APIs
preventing easy data and program extraction can create problems for customers who wish to
migrate to another site or vendor. In this scenario, there are some justifications for maintaining
proprietary APIs, such as protecting intellectual property, ensuring security, and preventing data
breaches. However, there are some potential solutions to the problem based on security:

Use standard APIs: The technical university can consider using standard APIs that are widely
used and accepted in the industry. This will enable customers to easily extract their data and
programs from one site to run on another without facing any compatibility issues.

Secure data encryption: The university can implement secure data encryption mechanisms to
ensure that customer data is protected while being transferred from one site to another. This
can be achieved by using SSL encryption or other secure encryption mechanisms.

Multi-factor authentication: The university can implement multi-factor authentication


mechanisms to ensure that only authorized users have access to the data and programs. This
can prevent unauthorized access to customer data and prevent data breaches.

Audit trails: The university can maintain audit trails that log all user activities to ensure that
customer data is not being misused or tampered with. This can provide customers with greater
visibility and control over their data.

Customer education: The university can provide customers with education and training on how
to extract their data and programs from one site to another. This can help customers to better
understand the process and ensure that they can do it securely.

In summary, the use of virtual servers for different applications can provide several benefits, but
the issue of proprietary APIs can create problems for customers who wish to migrate to another
site or vendor. The above solutions based on security can help to address these problems and
ensure that customer data is protected while being transferred from one site to another.
2. Consider the implementation of any smart city projects across the country each department
requires computing services, application Services, network components, etc. Give your
recommendations on using virtualization techniques that support the entire city and share
the resources. Deduce your answer based on CPU Virtualization, Memory Virtualization,
Network Virtualization and Storage Virtualization

Ans: Smart city projects require a significant amount of computing services, application services,
network components, and storage systems to operate efficiently. Virtualization technologies can
support the entire city and allow departments to share resources effectively. Here are some
recommendations on using virtualization techniques to support smart city projects:

CPU Virtualization: Smart city projects require a significant amount of computing power to
operate efficiently. CPU virtualization can help in optimizing the use of computing resources by
allowing multiple virtual machines to run on a single physical machine. This technology can help
in reducing hardware costs, power consumption, and maintenance efforts. Using CPU
virtualization also enables the quick provisioning of new virtual machines, which is beneficial for
new projects or sudden surges in demand.

Memory Virtualization: Memory is a vital resource for smart city projects that involve data-
intensive applications. Memory virtualization can help in optimizing the use of physical memory
by allowing multiple virtual machines to share the same physical memory. This technology can
help in reducing the amount of physical memory required, which can be useful for cost-saving
purposes. Memory virtualization also enables the dynamic allocation of memory to virtual
machines, which can be beneficial for handling varying workloads.

Network Virtualization: Smart city projects involve the integration of various networks, including
public networks, private networks, and IoT networks. Network virtualization can help in
optimizing the use of network resources by allowing the creation of multiple virtual networks on
a single physical network. This technology can help in reducing the number of physical networks
required, which can be useful for cost-saving purposes. Network virtualization also enables the
creation of isolated virtual networks, which can be beneficial for security purposes.

Storage Virtualization: Smart city projects require large-scale storage systems to store and
manage data. Storage virtualization can help in optimizing the use of physical storage by
allowing the creation of multiple virtual storage systems on a single physical storage system.
This technology can help in reducing the amount of physical storage required, which can be
useful for cost-saving purposes. Storage virtualization also enables the dynamic allocation of
storage to virtual machines, which can be beneficial for handling varying workloads.

In conclusion, virtualization technologies can support smart city projects by optimizing the use
of computing resources, memory, network, and storage systems. The use of virtualization
techniques can help in reducing hardware costs, power consumption, and maintenance efforts,
and provide scalability and flexibility for the changing needs of smart city projects.
3. Study the cloud architecture for Medical Record maintenance and sharing through internet /
cloud platform. In health care sector is acquiring lot of data and maintaining its in-house
premises. The data growth is high and wish to share the same to other specialist physician is
possible only through cloud. How to migrate the data from on-premise data to private
cloud. Discuss the design 10issues and possible security issues.

Ans:

The architecture for maintaining and sharing medical records through a cloud platform typically
involves the following components:

Data Storage: Medical records can be stored in the cloud using a variety of storage options,
including block storage, object storage, and file storage. The data can be stored in a private cloud,
public cloud, or a hybrid cloud depending on the security and compliance requirements.

Data Processing: Medical records can be processed using various cloud-based services, such as
machine learning, analytics, and image processing. These services can be used to extract insights
from the data, make predictions, and identify patterns that can be used to improve patient care.

Data Transfer: Data can be transferred to and from the cloud using secure protocols such as HTTPS,
FTPS, and SFTP. The transfer can be performed using either a direct connection or a VPN connection.

Authentication and Authorization: Authentication and authorization are essential components of


cloud security. Access to medical records should be restricted to authorized users only, and users
should be authenticated using strong passwords, two-factor authentication, or biometric
authentication.

Data Encryption: Medical records should be encrypted both in transit and at rest to prevent
unauthorized access. Encryption should be implemented using industry-standard encryption
algorithms, such as AES or RSA.

Data Backup and Recovery: Medical records should be backed up regularly to prevent data loss in
case of hardware failure or other disasters. Backup copies of data should be stored in a separate
location to ensure that data can be recovered in case of a disaster.

Compliance: Medical records are subject to various regulations, such as HIPAA, GDPR, and PCI-DSS.
Cloud architecture for medical record maintenance and sharing should comply with these
regulations to avoid penalties and legal issues.

Monitoring and Logging: Cloud architecture for medical record maintenance and sharing should
include monitoring and logging features to detect and prevent security breaches. Logs should be
analyzed regularly to identify potential security threats.

Disaster Recovery: Disaster recovery plans should be in place to ensure that medical records can be
recovered in case of a disaster. Disaster recovery plans should include backup and recovery
procedures, redundant systems, and failover mechanisms.
Training and Awareness: Employees should be trained on cloud security best practices to ensure
that they are aware of the risks and threats associated with cloud computing. Training should
include how to handle sensitive data, how to use cloud-based services, and how to report security
incidents.

As for migrating data from on-premise to a private cloud, there are several steps involved, including:

• Analyzing the existing infrastructure and data to be migrated.


• Identifying the most appropriate cloud platform and services to use.
• Developing a migration plan that includes a timeline, milestones, and contingency plans.
• Testing the migration process on a small scale before proceeding with the full migration.
• Migrating the data and applications to the cloud platform.
• Validating that the migrated data is working correctly and that the security and compliance
requirements are met.

Finally, there are several security issues that need to be considered when designing a cloud
architecture for medical record maintenance and sharing. Some of the most critical security issues
are:

• Unauthorized access to medical records.


• Data breaches and data theft.
• Insider threats and employee negligence.
• Compliance violations.
• Denial of service attacks.
• Malware and virus attacks.
• Cloud provider security risks.
• Vulnerabilities in cloud-based services.
• Lack of data encryption.
• Inadequate disaster recovery and backup procedures.

Addressing these issues requires a holistic approach to security that includes both technical controls
and organizational policies and procedures. It is crucial to engage with experienced professionals
and consult with regulatory and compliance experts to ensure that the cloud architecture complies
with all relevant regulations and best practices.
4. Dropbox is file hosting service was founded in 2007 by MIT students Drew Houston and
Arash Ferdowsi. In simplest term Dropbox is like folder on your computer desktop that lets
you easily store files on the Internet, send them to others, and synchronize them across
your laptop, phone, and tablet. Dropbox who store the billions and billions of file on the
behalf millions of user, used run their business over AWS. However over the last two-and-a-
half years ago, Dropbox built its own vast computer network and shifted its service onto a
new breed of machines designed by its own engineers.

Ans:

That's correct! Dropbox was initially using Amazon Web Services (AWS) to run their business,
but eventually decided to build their own computer network and shift their service onto a new
breed of machines designed by their own engineers. This move was aimed at gaining more
control over their infrastructure and reducing their dependence on third-party providers. By
building their own network, Dropbox was able to customize their hardware and software to
meet their specific needs, as well as optimize their performance and efficiency. It also allowed
them to have greater control over their data and security, as well as provide a more seamless
and reliable service to their millions of users.
5. Cloud Computing Architecture Design for Banking Industry. Banking sectors are providing
their services through core banking systems and doing all types of transactions by 24x7.
How cloud computing plays vital role in banking industry and explain with architecture.

Ans:

Cloud computing can play a vital role in the banking industry by providing a scalable and
cost-effective infrastructure for managing large volumes of data and processing transactions
24x7. The architecture design for a cloud computing system for the banking industry must
consider several factors, including security, compliance, and performance.

Security: Security is a top priority for the banking industry, and a cloud computing architecture
must be designed to ensure the highest level of security. This can be achieved by using a multi-
layered security approach, including firewalls, intrusion detection systems, encryption, and
access controls. In addition, the cloud provider should be certified for compliance with industry-
standard security regulations, such as PCI DSS and ISO 27001.

Compliance: The banking industry is heavily regulated, and cloud computing architecture must
meet all regulatory requirements. This includes data privacy laws, security regulations, and
compliance standards such as SOX and HIPAA. The cloud provider should have a compliance
program in place that meets all relevant regulations and industry standards.

Performance: The cloud computing architecture must be designed to ensure high performance
and availability. This can be achieved by using a distributed architecture that is geographically
distributed across multiple data centers. This provides redundancy and ensures that the system
can continue to operate even if one data center fails.

Core Banking Systems: The cloud computing architecture must support core banking systems
that manage all types of transactions 24x7. This includes systems for managing deposits,
withdrawals, transfers, and other banking services. These systems must be designed to handle
large volumes of data and provide high performance and reliability.

Data Management: The cloud computing architecture must be designed to manage large
volumes of data, including customer data, transaction data, and other types of data. This can be
achieved by using a data management platform that provides scalable storage and processing
capabilities.

Disaster Recovery: The cloud computing architecture must include a disaster recovery plan that
ensures business continuity in the event of a disaster. This can be achieved by using a multi-data
center architecture that provides redundancy and failover capabilities.

In summary, a cloud computing architecture for the banking industry must be designed to
ensure high security, compliance, performance, and reliability. It must support core banking
systems and provide scalable data management and disaster recovery capabilities.

You might also like