Posts Tagged ‘LAN Security’

LAN Security In A Cloud Server Environment

Thursday, August 19th, 2010

Cloud computing architecture has more or less the same structure with that of the traditional systems: it has this Front End section and a Back End section. The Front End is anything that uses the cloud services – it may be end users, clients, or applications. And, the Back End section is a network of servers with computer programs or applications and the data storage or database. (Dave, 2009)

The cloud server environment must set-up its authentication in the correct way. Authentication procedures separate the genuine clients and viruses, worms or attackers.  This could be done by authenticating any users who wants to gain access in the cloud services. Giving certificates or certifications to client’s account can strengthen the security of the cloud environment at its access/entry points.  Cloud server security must also be layered around the servers and the network as a whole and not individually.  Strict policies must be set up in the host’s networks to elevate the networks’ security. Continuous checking, monitoring and auditing on compliance on the policies must be conducted. Network policies include no response on certain websites. Using authorization procedure on certain objects in the network can increase the security level too.

Another layer for network security to manage is to deploy applications that can bring out malicious programs and attackers lurking around the network and kill them.  Strong anti-virus, spywares and other malicious item detectors must be set-up in the network.

Physical security is also a must over the application/job servers and the database servers. Cameras over the vicinity of servers or the data centers should be in place. Security controls for admin and staff in the environment is also a must. And finally, regular back-up must be done to ensure availability of data should worst events happen.
The cloud’s host and environment has so many stakeholders. The cloud’s host is built upon a network of servers and databases. The integrity of data and the quality of service the cloud provides, fairly stating, can be founded on the security the cloud’s host provides. Critical data are stored in the environment so it would be fair to at least deploy the necessary security over it.

Reference

1. Dave, P. (2009, June 31). SQL SERVER – Introduction to Cloud Computing. Retrieved July 4, 2010, from SQL Authority: http://blog.sqlauthority.com/2009/07/31/sql-server-introduction-to-cloud-computing/

VN:F [1.9.22_1171]
Rating: 0.0/10 (0 votes cast)
VN:F [1.9.22_1171]
Rating: 0 (from 0 votes)

Call us at 801.384.0032