MCY 612 Cloud Security Assignment 4

MCY 612 Cloud Security Assignment 4

Module 4: Assignment 4 — Storage and Data Protection

In this week’s module, you have learned storage and data protection. You have learned different storages, such as EC2 instance store, EBS, S3, and EFS, in MCY 611 and MCY 612.  In this assignment, you will study documents on storage and data protection and then write a paper about storage and data protection.  The following are some recommended documents. You can use other references for your paper.

  • Protecting Data at Rest

https://docs.aws.amazon.com/wellarchitected/latest/security-pillar/protecting-data-at-rest.html

  • Protecting Data in Transit

https://docs.aws.amazon.com/wellarchitected/latest/security-pillar/protecting-data-in-transit.html

https://docs.aws.amazon.com/aws-backup/latest/devguide/data-protection.html

  • Storage (EC2 instance store, EFS, S3 and EBS)

https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/Storage.html

  • EBS data security

https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/data-protection.html#ebs-data-security

  • Data encryption in Amazon EFS

https://docs.aws.amazon.com/efs/latest/ug/encryption.html

  • Data protection in Amazon S3

https://docs.aws.amazon.com/AmazonS3/latest/userguide/DataDurability.html

https://www.linkedin.com/pulse/how-sustain-from-ransomware-attacks-using-aws-backup-technics-nair/

Paper Requirements

  • You need to read the references carefully and then write the paper in your own words. You can NOT copy entire phrases, sentences, or paragraphs from a source. Direct copy and pasting from source is a form of plagiarism.   
  • It must be a 5-full-page paper in word format using the single-spaced two column IEEE Conference Microsoft Word Template ( https://www.ieee.org/content/dam/ieee-org/ieee/web/org/conferences/conference-template-letter.docx ).
  • Your paper must include all the sections and their contents listed below.
  1. Title
  2. Abstract (under 80 words)
  3. Introduction
    1. Describe the importance and significance of the topic.
  1. Protecting Data at Rest
    1. What is Data at Rest?
    2. Why does Data at Rest need to be protected?
    3. Give an example to show Data at Rest needs to be protected.
    4. How does AWS protect data at Rest?
  1. Protecting Data in Transit
    1. What is Data in Transit?
    2. Why does Data in Transit need to be protected?
    3. Give an example to show Data in Transit needs to be protected.
    4. How does AWS protect Data in Transit?
  1. Cryptography and AWS Key Management Service
    1. What is symmetric encryption? Use an example to explain how symmetric encryption works.
    2. What is asymmetric encryption? Use an example to explain how symmetric encryption works.
    3. We have used EC2 keypairs to SSH into EC2 Linux instances. Please use an example to show how the EC2 keypair works.
    4. What is AWS Key Management Service?
    5. How does AWS envelope encryption work?
  1. Protecting Storage
    1. Explain differences among Instance Store, EBS, S3, and EFS.
    2. How does AWS protect EBS?
    3. How does AWS protect S3?
    4. How does AWS protect EFS?
  2. Protecting Data with Backup
    1. What is a data backup?
    2. How does AWS back up data?
    3. What is ransomware attack?
    4. Explain how backup can mitigate ransomware attack.
  3. Conclusions
    1. Summarize data protection concepts and techniques.
  4. References
    1. List all the citations referenced in your paper.