For
The University of Technology Jamaica
[pic]
Case Study
Intrusion Detection (IDS) and Intrusion Protection (IPS) systems are two areas that are becoming popular in securing cloud computing environments. You have been hired to setup a UTECH Cloud IDS and IPS security policy within the University of Technology where all system resources will be managed as a part of an open public and private cloud. To maintain the ubiquity of all these resources within UTECH , you are hired as the new security personnel within the IS and Audit department with responsibility for UTECH’s Intrusion Detection and Protection System especially with respect to it’s compute cloud resources. Highlight all the salient issues of a security policy that you would have to develop in managing all these resources.
Introduction
Computer security is the process of preventing and detecting unauthorized use of a computer. Prevention measures helps to stop unauthorized users from accessing any part of the computer system. Detection helps to determine whether or not someone attempted to break into the system, if they were successful, and what they may have done
It also entails the protection of information and information systems against unauthorized access or modification of information, whether in storage, processing, or transit, and against denial of service to authorized users. Information security includes those measures necessary to detect, document, and counter such threats.
Software application which provide firewall information security and virus scanners are not enough on their own to protect information. A set of procedures and system needs to be applied to effectively deter access to information (Crystal, G. 2010). Hence a combination of security policies, products and procedures must be employed.
• Cloud Computing
Cloud computing describes computation, software, data access,
References: SECURITY IMPLICATIONS OF CLOUD COMPUTING Narendran Calluru Rajasekar November 30th, 2009 http://www.focus.com/fyi/it-security/ids-vs-ips/ http://netsecurity.about.com/cs/hackertools/a/aa030504_2.htm http://www.net.isc.upenn.edu/policy/approved/20100308-computersecurity.html Wikipedia, the free encyclopedia Cloud Security Guidance IBM Recommendations for the Implementation of Cloud Security file:///C:/Users/Nicola/Downloads/UTech%20Security%20Policy%20February2010.webarchive