With the advent of Web 2.0 and onward, the rise of the terminology and
concept we call Cloud Computing, coupled with an increase in the manner
technologies are being used, not only by corporations but by individuals as
well, comes an increased drive to ensure that risk is managed, effective
security measures to protect identities are implemented, and efforts are
expended to ensure privacy is maintained.
A few years ago, in their quest to implement and maximize on the benefits of
Service-Oriented Architecture (SOA), researchers at Microsoft separated SOA
into four areas (1) viz.
Identity and Access Management Service Management Entity Aggregation and
Accordingly the claim was that although these segments were technically
challenging, navigating the challenges to a successful resolution would allow
the groundwork required for critical IT foundation... (more)
Digital Forensics is not an elephant, it is a process and not just one
process, but a group of tasks and processes in investigation. Examiners now
perform targeted examinations using forensic tools and databases of known
files, selecting specific files and data types for review while ignoring
files of irrelevant type and content. Despite the application of
sophisticated tools, the forensic process still relies on the examiner's
knowledge of the technical aspects of the specimen and understanding of the
case and the law - Mark Pollitt.
As has been established from articles by var... (more)
[Adopted from my BLOG December 2009]
Lately in the IT community all the hype is on Cloud Computing. We have small
start-ups offering several variations of Cloud services as well as some of
the established big players (Google, Amazon, IBM, Novell (aimed at cloud
service providers),Sun) stepping up their offerings of cloud services.
But what exactly is Cloud Computing? Is it Virtualization? Is it services
that we accessed via a web browser over the years, something totally new, or
is it all of these,but just rebranded?
The term Cloud Computing started gaining traction when Google a... (more)
Web-services research and protocol applications have been around and in use
for quite some time now. With the potential Capex and Opex savings
enterprises can potentially realise from utilizing a cloud computing service
model, there should also be added focus on ensuring that security is properly
implemented either in authentication or authorization.
Cloud Computing, with its foundation in the world of virtualization, can take
advantage of key aspects of web service implementations and security
practice; but only to a point. Web service policies are based on a static
model that ... (more)
What is SOA? One can say that the synthesis of Enterprise Application
Integration (EAI) platforms with middleware tools and concepts evolved into
what we know today as Service Oriented Architecture.
SOA then represents a standards based architectural blueprint with an
emphasis on business centric services and transactions rather than that of
technology oriented objectives: In other words an architectural style which
businesses can use to execute and align services with their business model to
achieve their business strategy, goals and objectives.
For instance, an end-user reques... (more)