What is SOA? One can say that the synthesis of Enterprise Application
Integration (EAI) platforms with middleware tools and concepts evolved into
what we know today as Service Oriented Architecture.
SOA then represents a standards based architectural blueprint with an
emphasis on business centric services and transactions rather than that of
technology oriented objectives: In other words an architectural style which
businesses can use to execute and align services with their business model to
achieve their business strategy, goals and objectives.
For instance, an end-user request a particular IT service per specified
requirements defining capacity and quality levels, in response to this, the
requirements will then be delivered when specified in a service based
delivery methodology which is process aware and which allows auditing.
According to Thomas Erl, we can def... (more)
Within the realms of digital forensics analysts traditionally performed
analysis on static data, either from a core dump, bit to bit imaging etc.
Recently we have seen an increased focus directed at the live forensics
environment. As users rely more on mobile and other remote devices to access
data on demand; data possibly held in some manner of cloud environment,
investigators will have to adapt their mode of investigations to suit.
I recall reading a marketing pitch a while aback where some vendor claimed
that an advantage of Cloud Computing is, an ability to conduct live forens... (more)
One major concern with the adoption of cloud computing is the lack of a
defined standard or standards that are specific to operations impacting
security, interoperability & mobility within the Cloud ecosystem.
As most managers of security departments will attest to, there is a fine line
between security and operations. While we as business managers want to
ensure that we maximize the ROI on our operational investments and ensure
that availability is paramount for our users, we do not want to do so at
the expense of our security measures, policies and protocols.
On the other hand... (more)
As stated in Part 1 my focus on this article will be more on the backscatter
technology as this seems to be where traveler scanning is heading and it
involves ionizing radiation. Currently we have varied opinions on this
technology with a major concern for the routine use of ionizing X-rays being
that of health issues.
Also mentioned was the fact that our skin being our largest organ, it may be
affected from backscatter skin surface scans in the long term. Continuing on
as stated earlier, per Wikipedia , there are three companies manufacturing
commercial backscatter X-ray dev... (more)
As the cacophony of cloud evangelism expands into several areas of industry,
one much talked about aspect is that of the private cloud.
But what really is a private cloud, and once within an organization's
security perimeter is such a system a pure cloud computing ecosystem? (Of
course within the security perimeter - IT Security teams again have the
advantage of control in lieu of that in a public cloud.) Bear in mind though
once you start thinking of access from outside your "private cloud" the whole
security dynamic will change. At this point your cloud security
perimeter beco... (more)