Module -7 discussion | Computer Science homework help


Include at least 250 words in your posting and at least 250 words in your reply.  Indicate at least one source or reference in your original post. Please see syllabus for details on submission requirements.

Don't use plagiarized sources. Get Your Custom Essay on
Need an answer from similar question? You have just landed to the most confidential, trustful essay writing service to order the paper from.
Just from $11/Page
Order Now

Module 7 Discussion Question

Search “” or your textbook. Discuss how organizations have faced the challenges that incident handlers are challenged with in identifying incidents when resources have been moved to a cloud environment.



Cloud computing provides people the way to share distributed resources and services that belong to different organizations or sites. As cloud computing allocate the divided possessions by means of the systems in the released surroundings. That’s why it creates the safety issues for us to expand the cloud computing application. Cloud computing is explained by NIST as the representation for allow suitable, on demand arrangements for right to entry to a collective pool of settings the calculative. Possessions. All these like networks, servers, storage, application and services is continuously planned and free with less supervisory activities or cloud supplier communication. Cloud computing is taken as a innovative calculating concept up to now. It permitted the use of calculating communication with more than one stage of thoughts. The spot requirement of these services is offered online at fewer prices. Reason is that the insinuation for the high elasticity and accessibility. Cloud computing is the main topic which will be getting the good manner of concentration recently. Cloud computing services gives advantages from financial systems of all range accomplished. With this the flexible utilization of possessions, occupation and others work competency. However, cloud computing is an emerging forming of distributed computing that is still in its infancy. The concept uses of its own all the levels of explanations and analysis. Most of the concepts has been written regarding cloud computing, its explanation. Its main aim is to search the major paradigm of the utilization and given that common classification for

Concepts and significant details of the services:

A public cloud is the major one which has the communication and other calculative possessions. This consists of making obtainable to the common people online. This is known by all the cloud servicer who is doing the marketing. It’s by giving explanation of the outsider industries. On the other hand of the range is the confidential cloud. The confidential cloud is the one in which the calculating surroundings is generated completely for the industry. This can handled by industry or by the third party. This can be hosted under the industries information centre which is within or outside of it. The private cloud provides the industry a good control on the communication and calculative sources as compared to public cloud. There is other operational models which lies between the private and public cloud. These are community cloud and hybrid cloud. The community cloud is mainly related to private cloud. On the other hand the communication and calculative sources will be mutual by various industries that are having a similar confidentiality and regulatory thoughts. Instead they are exclusively checking the one industry. The hybrid cloud is mainly the blend of two or more than two clouds i.e. (private, community, or public) this Become the uncommon bodies which are stringed to each other by harmonized or proprietary technology which allows interoperability. Same as the various operational models which impacts to the industrial range and organized surroundings. That’s why this model gives assistance to the cloud which impacts it.


Dave Shackle ford is the founder and principal consultant with Voodoo Security, as well as a SANS analyst, instructor, and course author and GIAC technical director. He has consulted with hundreds of organizations in the areas of security, regulatory compliance, and network architecture and engineering. 



Due, to the virtual environments that are ever-changing, the disaster recovery has become tougher. With the help of disaster recovery monitoring tools, it is ensured that the testing of the disaster recovery plan runs smoothly. The IT managers top priority is the consistent ability in recovering from disaster. The different ways of protecting many applications with a reduced amount of downtime economically are looked for. The first step in disaster recovery plan is the creation of plan by IT professionals. While, developing a disaster recovery plan the change in control process also to be implemented adheres strictly so that if any changes take place in the environment these can also be reflected in the plan (K. Wong, 1994). The failure in recovery occurs if any small misstep takes place even the control of change has adhered.

While monitoring the disaster recovery the important things to have been as follows:

•           Awareness of environment: Beyond the awareness of application the awareness of the environment is essential so that the specific environment of the application can be reported and detected by the monitoring tools.

•           Independence of hardware and software: The inconsistencies in hardware stores are analyzed and across a variety of applications with the monitoring tools.

•           Only monitoring: The transferring of data is not done with the monitoring tools a separate hardware and software products are available for transfer. The complement to the solutions is provided by the monitors of disaster recovery.

•           A knowledge base work: The information collected from devices is not depended by the monitoring tools. The practices of their own should be developed.

The root of the problem is the configuration drift (W. Toigo, 2003): By installing the application the volumes configured and created are identified by the application replication which can be protected. The new volumes are added with the evolution of application so that support is provided to more host servers or to improve the performance the volumes are shifted to the different storage system. These changes are left out in process of protection and are not reported to the disaster recovery in charge. This is a configuration drift condition.   

The disaster recovery planning is a constant process not a one-time event with the evolving environment changes and agreements of service-level. The disaster recovery processes and setup are analyzed by considering the monitoring tools of disaster recovery. In case of disaster, the SAN primary data center and reciprocal data center are included.


K. Wong (1994), Disaster Recovery Plan Strategies and Processes. Business continuity planning and disaster recovery planning. DR Test and Maintenance. Disaster Recovery Planning: For Computers and Communication Resources

W. Toigo (2003), Disaster recovery planning: Strategies for protecting critical information assets. Disaster recovery planning: Suggestions to top management and information systems managers. Journal of System Management.

Note: No plaigarisam, No copy paste , Writing should be unique, 3 references, APA format.