University of Technology Cloud Intrusion Detection and Intrusion Prevention Security Policy and I

Topics: Computer security, Security, Access control Pages: 13 (3219 words) Published: March 7, 2011
Security Policy
The University of Technology Jamaica

Case Study

Intrusion Detection (IDS) and Intrusion Protection (IPS) systems are two areas that are becoming popular in securing cloud computing environments. You have been hired to setup a UTECH Cloud IDS and IPS security policy within the University of Technology where all system resources will be managed as a part of an open public and private cloud. To maintain the ubiquity of all these resources within UTECH , you are hired as the new security personnel within the IS and Audit department with responsibility for UTECH’s Intrusion Detection and Protection System especially with respect to it’s compute cloud resources. Highlight all the salient issues of a security policy that you would have to develop in managing all these resources.


Computer security is the process of preventing and detecting unauthorized use of a computer. Prevention measures helps to stop unauthorized users from accessing any part of the computer system. Detection helps to determine whether or not someone attempted to break into the system, if they were successful, and what they may have done

It also entails the protection of information and information systems against unauthorized access or modification of information, whether in storage, processing, or transit, and against denial of service to authorized users. Information security includes those measures necessary to detect, document, and counter such threats.

Software application which provide firewall information security and virus scanners are not enough on their own to protect information. A set of procedures and system needs to be applied to effectively deter access to information (Crystal, G. 2010). Hence a combination of security policies, products and procedures must be employed.

• Cloud Computing
Cloud computing describes computation, software, data access, and storage services that do not require end-user knowledge of the physical location and configuration of the system that delivers the services. This is a computing concept that can be compared to an Electricity Grid where end-users consume power resources without any necessary understanding of the component devices in the grid required to provide the service.

This technology allows for much more efficient computing by centralizing storage, memory, processing and bandwidth. It utilizes the internet and central remote servers to maintain data and applications. Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access.

As a result, cloud computing gives organizations the opportunity to increase their service

delivery efficiencies, streamline IT management, and better align IT services with dynamic business requirements. In many ways, cloud computing offers the best of both worlds, providing solid support for core business functions along with the capacity to develop new and innovative services. (IBM 2009)

Both public and private cloud models are now in use. Available to anyone with Internet

access, public models include Software as a Service (SaaS) clouds, such as IBM LotusLive, Platform as a Service (PaaS) clouds, such as Amazon Web Services, and Security and Data Protection as a Service (SDPaaS) clouds, such as IBM Security Event and Log Management Services. (IBM 2009)

Private clouds are owned and used by a single organization. They offer many of the same benefits as public clouds, and they give the owner organization greater flexibility and control. Furthermore, private clouds can provide lower latency than public clouds during peak traffic periods. (IBM 2009)

Many organizations embrace both public and private cloud computing by integrating the two models into hybrid clouds. These hybrids are designed to meet specific business and technology...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Intrusion Detection and Prevention Systems Essay
  • Intrusion Prevention System Research Paper
  • Intrusion Detection Systems Research Paper
  • Essay about Security Risks in Cloud Computing
  • Wireless Intrusion Prevention Systems Essay
  • Intrusion Detection Systems Essay
  • Essay on Xray (an Intrusion Detection System)
  • Intrusion Detection Systems Essay

Become a StudyMode Member

Sign Up - It's Free