Tuesday, March 11, 2014

CYBER SECURITY


     Cyber security also known as computer security is a term that refers to information security of computers and networks. Computer security is a critical aspect in any industry, which operates on computer systems. With the computer virus alone contributing to losses of about $67 Billion a year, the demand for better computer security has risen immensely.




     There are as many as 28 types of threats currently in the computer world. While some are only mildly annoying some pose a serious threat to information and its security. Some of them are virus, Trojans, Spyware, Scare ware, Wabbits, Botnet,etc. 

     There are various mechanisms that provide security against such threats, they are:


FIREWALL


     A firewall has a predefined rule set, based on the rule set they control the incoming and
outgoing traffic by analyzing the data packets. Most of the personal computer have a software- based firewall, which protects them from threats of the public Internet. A firewall performs its functions in the network layer of the OSI model. The basic working of a firewall can be best illustrated using the diagram below: 

                           
                                                             
                                                               ANTIVIRUS
   
     Antivirus is a piece of software that performs 3 major functions of prevention, detection and
removal of malicious computer programs. Although the name Antivirus can be misleading, they also offer protection against malware such as worms, rootkits, backdoors,etc.


There are primarily three ways that antivirus performs its functions: 

     Signature based detection is the most common of them, the antivirus software has a predefined database of known virus signatures, it compares the contents of a file to its database, if a match is found it prompts that the program or file is malicious.
     More sophisticated antivirus use the heuristic analysis to identify new kinds of malware or slight modifications of existing malware. This kind of approach involves wildcards that allow the scanner to detect viruses even if they are padded with extra,meaningless code .
     The 3rd approach is a slightly modified version of the heuristic approach, It follows the principle of file emulation. It involves the execution of a program in virtual environment and then logging the actions of the program. Based on the logged actions the antivirus seamlessly carries on the appropriate disinfecting action, if the file is infected.

     There are also various other security software like Anti Spyware and a combination package of a firewall, antivirus and an Anti Spyware manufactured by big-name antivirus software companies that provide protection against malware.All the security software though provide good protection,also consume lots of system resources which can affect the overall system performance

All these kind of software along with monitoring of the web by government agencies,would provide protection for private and public information so that they cannot be mis used  and thereby aid in preserving data integrity.


                                                                  References: 

Retrieved March 7th from http://www.dhs.gov/topic/cybersecurity 
Retrieved March 7th from http://en.wikipedia.org/wiki/Computer_security 
Retrieved March 7th from http://www.zen.co.uk/blog/cyber-security/ 




Tuesday, March 4, 2014

OpenStack-an open source cloud project


     Openstack is predominantly an open source cross platform cloud-computing project.It acts as an Infrastructure as a Service platform (IaaS), it is currently licensed under the terms of Apache License. OpenStack is completely managed and maintained by the Open Stack foundation. Open Stack serves like a tool kit that helps in building clouds, both private and public. There are currently about 200 Big- name Companies like NASA, Dell, Cisco, AMD, Oracle, Red hat, Yahoo, IBM, etc. involved with this project.



    The software consists of a collaboration of interrelated projects, where each of them controls various issues such as network resources, storage and processing of data that exist in a data center and perform various operations on them through an internet based dash board, command line tools or Representational State Transfer API.
There are various components of OpenStack that are commonly referred to in code names. The primary components of an OpenStack are:

Nova
    
     NOVA or more formally known as Compute s primary functionality is to automate computing Resources and work with all the available virtualization Technologies even with the likes of High-Performance computing configurations. The architecture of “Compute” is designed in such a way that, it provides Scalability and integrates with third party software and hardware platforms without any issues.
 Swift
    
     Stack's Swift or Object Storage is a scalable redundant storage system. Storage clusters scale horizontally simply by adding new servers. Incase a server or hard drive fail, OpenStack transmits its content from other active nodes to new locations in the cluster. OpenStack uses software logic to ensure data replication and distribution across different devices, this is the reason why the most inexpensive hard drives and a variety of commodity servers can be used.
Cinder

     Open Stack Block Storage (Cinder) provides block-level storage devices for use with instances of OpenStack compute. The block storage system or cinder is responsible for managing the creation, attaching and detaching off block devices to servers


Neutron
    OpenStack Networking code named Neutron is a system for managing networks and IP addresses.

Dashboard
    OpenStack Dashboard code named Horizon provides administrators and users a graphical interface to access, provision and automate cloud-based resources.

Advantages
      
      There are various advantages associated with using OpenStack, they are

  •  Since OpenStack is an open source software, it guarantees it a non-commitment to a proprietary vendor, that also means a modular design and ability to integrate with the various third party and legacy technologies.
  • OpenStack is an industry standard when coming to cloud technologies, with over 200 companies from about 60 countries participating in the project 
  • It's already proven software, running services on open stack means running on one of the world largest private and public cloud.
  • OpenStack APIs are compatible with various Amazon services like Ec2 and S3 and thus client applications that have been written for Amazon Web Services can be used with OpenStack, without using much of an effort for porting. 




References

Retrieved March 4, 2014 from http://en.wikipedia.org/wiki/OpenStack.

Retrieved March 4,2014 from https://www.openstack.org/

Dan Sullivan (2014,Jan 9) Retrieved March 4,2014 from http://www.tomsitpro.com/articles/openstack-costs-benefits,2-684-2.html.