Network address translation (NAT) is a method to remap one IP address space into another space by
Question:
Question 2: (5 Marks)
Cloud computing means storing and accessing data and programs over the Internet instead of on your computer's hard drive. In general terms, security controls in cloud computing are similar to the security controls in any IT environment. However, because of the operational models and technologies used to enable cloud service, cloud computing may present threats that are specific to the cloud environment. Please explain three cloud specific security threats, together with suggested countermeasures.
Question 3:(5 Marks)
Information security is used to describe the tasks of protecting information in a digital form.
(1). List and explain three key objectives of information security.
(2) Also list and explain at least two additional protections (concepts) to present a complete view of information security.
QUESTION 5
- Describe one attack that can be carried out by hackers using Botclouds.
- Describe two advantages of Botclouds for hackers over traditional Botnets.
Computer Networks A Systems Approach
ISBN: 9780128182000
6th Edition
Authors: Larry L. Peterson, Bruce S. Davie