Computer Science Homework Help

MSCS 615 ECPI University Digital Forensics in the Cloud Discussion Paper

 

Week 1 Assignment Cloud Computing Services and Models

Building a home is a huge investment that takes commitment and is time-consuming. There are a lot of significant factors to take into account, such as choosing a builder, income, credit rating, current monthly expenses, down payment, and the interest rate. Some people choose a home based on geographical locations, schools, neighborhoods, etc., whereas others may buy based on what they can afford. Additionally, property taxes, insurance, home, and termite inspections, closing costs, home security systems, and maintenance can drive up the cost of ownership, but the house is yours. You’ve got the control, but it comes with a hassle.

On the other hand, you can rent a home or apartment. Renting simplifies your decision-making. Renting eliminates maintenance fees, property taxes, and homeowners insurance since they are normally included in the rental fee. You can rent based on availability and can move when your lease is up. The disadvantage with renting is your selection is limited to availability, you may not be allowed to customize the home to your liking (i.e., painting, installing a home security system), and there are no guarantees that your lease will be renewed.

What does this analogy have to do with cloud computing and security?

Building a home is similar to setting up an on-site data center. Owning your on-site data centers creates flexibility and customizability in areas, such as physical infrastructure, security, hardware, software, etc. However, like building a home, building an on-site data center is a major investment that requires continuous upkeep and management.

Instead of building your own on-site data center, you can rent computation power and storage from the cloud provider; this gives you the flexibility to expand or reduce when necessary. There are no commitments. You pay for what you use when you use it. You can start and stop anytime.

There are several cloud deployment models, each targeting a specific set of customers. Using a credible source or a journal article found in the ECPI Online Library, research and compare and contrast key cloud deployment models.

In a minimum of two full pages, not including title and reference pages, in a Microsoft Word document, be sure to:

  • Identify at least four key cloud deployment models.
  • Locate and reference three or four (3 – 4) articles for the models you identified.
  • Summarize your findings, addressing the following:
    • Identify the security risks associated with each deployment model.
    • Describe the differences between each deployment model in terms of hosting/infrastructure.
    • Compare the cost of each deployment model.
    • Examine each deployment model and identify which type of organization would benefit from each type of cloud.
  • From an organizational security standpoint, justify why you would select one cloud model over another.

References

Chen, L., Takabi, H., & Le‐Khac, N.‐A. (2019). Security, privacy, and digital forensics in the cloud. Higher Education Press.