Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1. Describe the challenge of Increased Security Vulnerabilities and explain how

ID: 3749200 • Letter: 1

Question

1. Describe the challenge of Increased Security Vulnerabilities and explain how this challenge relates to overlapping trust boundaries and security technology compatibility issues
between cloud consumers and cloud providers.

2. Discuss the different types of distributed systems, and categorize cluster computing and sensor networks into these types. Explain how for cluster computing and sensor networks are similar and different in terms of their goals, requirements, and architectures.

3. A centralized service is modeled as the simple queueing system shown in the figure below.

A: If the service receives 20 requests per second, but the processing capacity is 25 requests per second, what are the utilization, the average number of requests in the system, and the response time?

B: Scalability issues emerge when utilization approaches 1 and response-to-server time quickly increases to very high values. Discuss some practical ways in which the service time may be decreased.

Explanation / Answer

Answer)

1) As the digital era is evolving the security vulnerability has started to increase more and also the cyber-crime has increased and resulted in many such security challenges like the ransomware evolution, Virus, trojan etc.

AI Expansion might help to prevent from such activities of cyber attacks.

Also, as the cloud has started expanding hence, the interconnection of devices, as well as data's, would result in highly susceptible to attacks/cyber-attacks.

The cyber-attacks results in losing the trust and integrity of the organization as a whole which is between the cloud consumers and producers.

2) The different types of distributed systems are as follows:

1) Clustering computing system

2) Grid computing system

3) Distributed information systems

4) Distributed pervasive systems

The similarity between the cluster computing and sensor network is as follows:

Both can solve the computing problem by connecting the computers together.

The difference is as follows:

The cluster is a homogenous network whereas the sensor is a heterogeneous network.

As per Chegg Policy, a minimum of 1 question is to be answered. We did 2.

Hit like if you find the answer useful. :)

Hope this answer helps. Thanks