SlideShare a Scribd company logo
1 of 14
Sheet1Country ACountry BProduct 110 Reds9 GreensProduct
22 Reds2.2 GreensProduct 37 Red4 GreenProduct 45 Red5
GreenProduct 54 Red4.5 Green
8/2/2019 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport/ultra?course_id=_109247_
1&includeDeleted=true&attem… 1/2
SafeAssign Originality Report
Summer 2019 - Cloud Computing (ITS-532-06) - Second Bi-
Term • Week 5 - Assignment • Submitted on Fri, Aug 02, 2019,
8:55 AM
Sai Kumar Baruri View Report Summary
View Originality Report - Old Design
INCLUDED SOURCES
Sources
Institutional database (8) %92
Student paper
Student paper
Student paper
Student paper
Student paper
Student paper
Student paper
Student paper
Top sources
Attachment 1
Week_5_Assignment_Microseg…
%92
4
8
1
5
7
6
2
3
Running head: MICROSEGMENTATION AND ZERO TRUST
SECURITY 1
MICROSEGMENTATION AND ZERO TRUST SECURITY 2
Microsegmentation and Zero Trust Security
Week 5 - Assignment
by Sai Kumar Baruri
Professor D. Barrett
University of Cumberland’s
ITS 532 - 06
08/02/2019
Microsegmentation and Zero Trust Security
Introduction
The 21st century is much characterized by increased
technology, access to the internet and the adoption of
information systems. Due to the adoption of technologies, there
is an increase in the realization of the
benefits that come with IT value. However, technological
advancements have negatively affected society
and brought about security threats. This has resulted in the
implementation of security mechanisms
that enhance the security of IT assets. Such mechanisms include
physical network segmentation, micro-
segmentation and zero-trust security. Physical network
segmentation
The physical network segmentation in the cloud includes the
segmentation of IT components that are
based on the logic outlines the endpoints to be on each network.
The physical network segmentation seeks
to group some of the logical components into specific groups
according to their functions and in turn,
access, the privileges assigned (Mammela et al., 2016). The
physical network segmentation concerning
cloud computing implies the logical division of the network into
minor segments that share the same
access permissions and characteristics. For instance, the cloud
computing network is physically segmented
as a private cloud computing. Micro-segmentation
The micro-segmentation comprises of security-enhancing
technology that is used in breaking down a given
data Centre which is a cloud-based into logical elements. This
facilitates s the implementation of high-level
information technology security policies on the logical elements
to aid in their control (Baum & Chang,
2014). The micro-segmentation in cloud computing seeks to
break down the applications and the
various network segments into workloads. This implies that the
communication and access of applications
are restricted according to the IT policies definition to build on
security. Moreover, the micro-segmentation
in cloud computing implies narrowing down of control access
and specific workloads which bars
unauthorized access and implements zero-trust policy.
Difference between physical network
segmentation and micro-segmentation
The physical network segmentation is different from micro-
segmentation in that; the physical network
segmentation divides systems according to their defined end-
points. Through this, it implies some form of
network access restriction based on the access rights grouped
into several components. On the other hand,
micro-segmentation implies a division of the organization
systems into workloads which are strictly defined
and high-level policies for security enhancement. Therefore, the
physical network segmentation is a more
generalized security policy that is less secure. However, micro-
segmentation narrows down into specific
workloads that restrict access and integration, thus becoming
more secure. Nonetheless, the micro-
segmentation can be implemented on physical network
segmentation to secure workloads. At the same
time, physical network segmentation has high-level security
mechanism hence being less useful. The
concept of zero security
Massive data breaches in databases have characterized the 21
centuries. Due to this, security has become a
crucial aspect to consider because the use of information
systems in the current world is full of threats. Due
to the increased security threats in the information systems, it
has led to the implementation and initiation
of zero-trust security. The zero-trust security implies a security-
enhancing model for both insider and
outsider access is limited to no-automatic access until verified
before granting access right (Kindervag,
2016). This model treats anything that is either within its
parameter or beyond as a suspect with the
potential of compromising security, which means verification
comes first. Zero security models are
1
2
1
1
3
1
4
4
4
5
4
4
6
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport/ultra?attemptId=552cc250-
2772-453a-9220-
175151e6991d&course_id=_109247_1&includeDeleted=true&pr
int=true
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport/ultra?attemptId=552cc250-
2772-453a-9220-
175151e6991d&course_id=_109247_1&includeDeleted=true&pr
int=true&download=true
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport?attemptId=552cc250-
2772-453a-9220-
175151e6991d&course_id=_109247_1&includeDeleted=true&fo
rce=true
8/2/2019 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport/ultra?course_id=_109247_
1&includeDeleted=true&attem… 2/2
different from conventional security model in that; zero trust
security introduces system latency
where verification is done on anything either inside or outside
trying to gain access. Therefore, the
automatic access grating is disabled until the user is verified.
The conventional security model relies on a
security mitigation procedure implemented to promote security
that verifies the identity of the user.
However, this model supports ubiquitous security, particularly
in a cloud environment by enabling a unified
approach to security where identity must be verified regardless
of the privileges assigned before access
grants. Nonetheless, this reduces the overreliance on security
mitigation techniques such as the use of
SIEM tools, which are at times compromised. Micro-
segmentation for zero-trust security The micro-
segmentation comprises of variable security technology which
builds the security of a given organizations’
information systems. The micro-segmentation topology could
potentially be used to implement zero-
trust security in the following ways.
4
4
Through developing tighter IT security policies and
implementing the same on the system workloads
(logical segments) which disables automatic access granting to
anything both within and without the
facilitate parameter until identity proved and user verified. The
non-tolerance to access the unverified users
tends to implement zero-trust security. Anything seeking access
is treated as a success regardless of the
identified privileges assigned to each. Implementing zero trust
model
Modern organizations should consider the implementation of a
zero-trust security approach. This is
because the zero-trust security approach is the most efficient
and it implements access control capabilities
that secure the systems. The approach is based on the principle
of verification before access grants.
However, the approach tends to be more effective in barring
unauthorized access. Additionally, a zero-trust
security approach declines the over-reliant on implemented
security mitigation procedures like the use of
SIEM tools which have been compromised severally. This
approach treats anything as a suspect and thus
causes effective scrutiny before access grants.
References
Baum, G., & Chang, W. (2014). U.S. Patent No. 8,630,902.
Washington, DC: U.S. Patent and Trademark
Office. Kindervag, J. (2016). No more chewy centers: the zero-
trust model of information security.
Forrester Research, Inc., dated Mar, 23. Mämmelä, O.,
Hiltunen, J., Suomalainen, J., Ahola, K.,
Mannersalo, P., & Vehkaperä, J. (2016, June). Towards micro-
segmentation in 5G network security. In
European Conference on Networks and Communications
(EuCNC 2016) Workshop on Network
Management, Quality of Service and Security for 5G Networks.
4
4
7
8
8
Word Count: Submitted on: Submission UUID: Attachment
UUID:
1,004 08/02/19 19162e98-9286-b696-108e-09c1d120e1eb
1fa458d7-c991-e0d0-0b74-44db2fdb235c
Top of Form
Name: Graduate Course Rubric
Description: All assignments will be graded according to this
rubric.
Bottom of Form
Novice
Competent
Proficient
Focus
Points:
0 (0.00%)
Exhibits a limited understanding of the assignment. Reader is
unable to follow the logic used for the assignment Student’s
writing is weak in the inclusion of supporting facts or
statements.
Points:
10 (10.00%)
Establishes a good comprehension of topic. Student
demonstrates an effective presentation of assignment, with most
support statements helping to support the key focus of
assignment.
Points:
20 (20.00%)
Student exhibits a defined and clear understanding of the
assignment. Student builds upon the assignment with well-
documented and exceptional supporting facts, figures, and/or
statements.
Content/Subject Knowledge
Points:
0 (0.00%)
Student tries to explain some concepts, but overlooks critical
details. Assignment appears vague or incomplete in various
segments. Student does not perceive to have a logical
sequencing of ideas.
Points:
10 (10.00%)
Student exhibits above average usage of subject matter in
assignment. Details and facts presented provide an adequate
presentation of student’s current level of subject matter
knowledge.
Points:
20 (20.00%)
Student demonstrates proficient command of the subject matter
in the assignment.. Student provides comprehensive analysis of
details, facts, and concepts in a logical sequence.
Critical Thinking Skills
Points:
0 (0.00%)
Student demonstrates beginning understanding of key concepts,
but overlooks critical details. Learner is unable to apply
information in a problem-solving fashion. Student presents
confusing statements and facts in assignment. No evidence or
little semblance of critical thinking skills.
Points:
10 (10.00%)
Student exhibits a good command of critical thinking skills in
the presentation of material and supporting statements.
Assignment demonstrates the student’s above average use of
relating concepts by using a variety of factors. Overall, student
provides adequate conclusions, with 2 or fewer errors.
Points:
20 (20.00%)
Student demonstrates a higher-level of critical thinking. Learner
provides a strategic approach in presenting examples of problem
solving or critical thinking, while drawing logical conclusions
which are not immediately obvious. Student presents a genuine
intellectual development of ideas throughout assignment.
Organization of Ideas/Format
Points:
0 (0.00%)
Assignment reveals formatting errors and a lack of organization.
. The lack of appropriate references or source materials
demonstrates the student’s need for additional help or training
in this area. Student needs to review and revise the assignment.
Points:
10 (10.00%)
Student explains the majority of points and concepts in the
assignment. Student presents an above average level of
preparedness, with a few formatting errors. Assignment contains
less than 5 resources.
Points:
20 (20.00%)
Student thoroughly understands and excels in explaining all
major points. An original, unique, and/or imaginative approach
to overall ideas, concepts, and findings is presented. Finished
assignment demonstrates student’s ability to plan and organize
research in a logical sequence. Student uses at least of 5-7
references in assignment.
Grammar and Mechanics
Points:
0 (0.00%)
Topics, concepts, and ideas are not coherently discussed or
expressed in assignments. Student’s writing style is weak and
needs improvement, along with numerous proofreading errors.
Assignment lacks clarity, consistency, and correctness. Student
needs to review and revise assignment.
Points:
10 (10.00%)
Student provides an effective display of good writing and
grammar. Assignment appears to be well written with no more
than 3-5 errors. Student provides a final written product that
covers the above-minimal requirements.
Points:
20 (20.00%)
Student demonstrates an excellent command of grammar, as
well as presents research in a clear and concise writing style.
Student excels in the selection and development of a well-
planned research assignment. Assignment is error-free and
reflects student’s ability to prepare a high-quality academic
assignment.
Top of Form
Bottom of Form
ITS 532 Module Five Essay Guidelines and Rubric Topic:
Microsegmentation and Zero Trust Security
Overview: Explain the difference between physical network
segmentation and microsegmentation. Explain what it means to
implement zero trust security. Explain how microsegmentation
can support a zero trust network.
Guidelines for Submission: Using APA 6th edition style
standards, submit a Word document that is 3-4 pages in length
(excluding title page, references, and appendices) and include at
least three credible scholarly references to support your
findings. The UC Library is a good place to find these sources.
Be sure to cite and reference your work using the APA guides
and essay template that are located in the courseroom.
Include the following critical elements in your essay:
I. Physical Network Segmentation vs. Microsegmentation:
Briefly describe each networking environment. Describe the
difference between these two networking approaches.
II. Zero Trust Security. Explain the concept of Zero Trust
Security. How is this model different from conventional
security models? How does this model support ubiquitous
security in a cloud environment?
III. Microsegmentation for Zero Trust Security: Explain how
microsegmentation topology provides the foundation for
implementing the Zero Trust model. Why do modern
organizations need to consider implementing a Zero Trust
security approach?
Required elements:
· Please ensure your paper complies APA 6th edition style
guidelines. There is a sample paper provided under the Course
Introduction link.· APA basics:
· Your essay should be typed, double-spaced on standard-sized
paper (8.5" x 11")
· Use 1" margins on all sides, first line of all paragraphs is
indented ½” from the margin
· Use 12 pt. Times New Roman font
· Follow the outline provided above and use section headers to
improve the readability of your paper. If I cannot read and
understand it, you will not earn credit for the content.

More Related Content

Similar to Sheet1Country ACountry BProduct 110 Reds9 GreensProduct 22 Reds2.2.docx

EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...IJNSA Journal
 
A systematic mapping study of security, trust and privacy in clouds
A systematic mapping study of security, trust and privacy in cloudsA systematic mapping study of security, trust and privacy in clouds
A systematic mapping study of security, trust and privacy in cloudsjournalBEEI
 
Security Issues in Cloud Computing - A Review
Security Issues in Cloud Computing - A ReviewSecurity Issues in Cloud Computing - A Review
Security Issues in Cloud Computing - A ReviewEswar Publications
 
Security Landscape of a Strong Ecosystem to Protect Sensitive Information in ...
Security Landscape of a Strong Ecosystem to Protect Sensitive Information in ...Security Landscape of a Strong Ecosystem to Protect Sensitive Information in ...
Security Landscape of a Strong Ecosystem to Protect Sensitive Information in ...IRJET Journal
 
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACYTHE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACYIRJET Journal
 
IRJET- Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...
IRJET- 	  Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...IRJET- 	  Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...
IRJET- Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...IRJET Journal
 
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENTEMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENTIJNSA Journal
 
Employee trust based industrial device
Employee trust based industrial deviceEmployee trust based industrial device
Employee trust based industrial deviceIJNSA Journal
 
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENTEMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENTIJNSA Journal
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. IJCERT JOURNAL
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGIJNSA Journal
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGIJNSA Journal
 
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...IJERA Editor
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET Journal
 
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud StorageA Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storageijtsrd
 
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...IJNSA Journal
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...IJNSA Journal
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
 
Comparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingComparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingeSAT Journals
 

Similar to Sheet1Country ACountry BProduct 110 Reds9 GreensProduct 22 Reds2.2.docx (20)

EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
 
A systematic mapping study of security, trust and privacy in clouds
A systematic mapping study of security, trust and privacy in cloudsA systematic mapping study of security, trust and privacy in clouds
A systematic mapping study of security, trust and privacy in clouds
 
Security Issues in Cloud Computing - A Review
Security Issues in Cloud Computing - A ReviewSecurity Issues in Cloud Computing - A Review
Security Issues in Cloud Computing - A Review
 
Security Landscape of a Strong Ecosystem to Protect Sensitive Information in ...
Security Landscape of a Strong Ecosystem to Protect Sensitive Information in ...Security Landscape of a Strong Ecosystem to Protect Sensitive Information in ...
Security Landscape of a Strong Ecosystem to Protect Sensitive Information in ...
 
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACYTHE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 
IRJET- Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...
IRJET- 	  Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...IRJET- 	  Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...
IRJET- Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...
 
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENTEMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
 
Employee trust based industrial device
Employee trust based industrial deviceEmployee trust based industrial device
Employee trust based industrial device
 
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENTEMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
 
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud StorageA Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
 
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
 
Comparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingComparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computing
 

More from edgar6wallace88877

Write a page to a page and half for each topic and read each topic a.docx
Write a page to a page and half for each topic and read each topic a.docxWrite a page to a page and half for each topic and read each topic a.docx
Write a page to a page and half for each topic and read each topic a.docxedgar6wallace88877
 
Write a page discussing why you believe PMI is focusing BA as the fi.docx
Write a page discussing why you believe PMI is focusing BA as the fi.docxWrite a page discussing why you believe PMI is focusing BA as the fi.docx
Write a page discussing why you believe PMI is focusing BA as the fi.docxedgar6wallace88877
 
Write a page of personal reflection of your present leadership compe.docx
Write a page of personal reflection of your present leadership compe.docxWrite a page of personal reflection of your present leadership compe.docx
Write a page of personal reflection of your present leadership compe.docxedgar6wallace88877
 
Write a page of compare and contrast for the Big Five Personalit.docx
Write a page of compare and contrast for the Big Five Personalit.docxWrite a page of compare and contrast for the Big Five Personalit.docx
Write a page of compare and contrast for the Big Five Personalit.docxedgar6wallace88877
 
Write a page of research and discuss an innovation that includes mul.docx
Write a page of research and discuss an innovation that includes mul.docxWrite a page of research and discuss an innovation that includes mul.docx
Write a page of research and discuss an innovation that includes mul.docxedgar6wallace88877
 
Write a page answering the questions below.Sometimes projects .docx
Write a page answering the questions below.Sometimes projects .docxWrite a page answering the questions below.Sometimes projects .docx
Write a page answering the questions below.Sometimes projects .docxedgar6wallace88877
 
Write a one-paragraph summary of one of the reading assignments from.docx
Write a one-paragraph summary of one of the reading assignments from.docxWrite a one-paragraph summary of one of the reading assignments from.docx
Write a one-paragraph summary of one of the reading assignments from.docxedgar6wallace88877
 
Write a one-paragraph summary of this article.Riordan, B. C..docx
Write a one-paragraph summary of this article.Riordan, B. C..docxWrite a one-paragraph summary of this article.Riordan, B. C..docx
Write a one-paragraph summary of this article.Riordan, B. C..docxedgar6wallace88877
 
Write a one-paragraph response to the following topic. Use the MLA f.docx
Write a one-paragraph response to the following topic. Use the MLA f.docxWrite a one-paragraph response to the following topic. Use the MLA f.docx
Write a one-paragraph response to the following topic. Use the MLA f.docxedgar6wallace88877
 
Write a one-page rhetorical analysis in which you analyze the argume.docx
Write a one-page rhetorical analysis in which you analyze the argume.docxWrite a one-page rhetorical analysis in which you analyze the argume.docx
Write a one-page rhetorical analysis in which you analyze the argume.docxedgar6wallace88877
 
Write a one pageliterature review of your figure( FIGURE A.docx
Write a one pageliterature review of your figure( FIGURE A.docxWrite a one pageliterature review of your figure( FIGURE A.docx
Write a one pageliterature review of your figure( FIGURE A.docxedgar6wallace88877
 
Write a one page-paper documenting the problemneed you wish to .docx
Write a one page-paper documenting the problemneed you wish to .docxWrite a one page-paper documenting the problemneed you wish to .docx
Write a one page-paper documenting the problemneed you wish to .docxedgar6wallace88877
 
Write a one page report on Chapter 1 and 2 with the same style of mo.docx
Write a one page report on Chapter 1 and 2 with the same style of mo.docxWrite a one page report on Chapter 1 and 2 with the same style of mo.docx
Write a one page report on Chapter 1 and 2 with the same style of mo.docxedgar6wallace88877
 
Write a one page reflection about the following1) Identify .docx
Write a one page reflection about the following1) Identify .docxWrite a one page reflection about the following1) Identify .docx
Write a one page reflection about the following1) Identify .docxedgar6wallace88877
 
Write a one page paper on the question belowSome of the current.docx
Write a one page paper on the question belowSome of the current.docxWrite a one page paper on the question belowSome of the current.docx
Write a one page paper on the question belowSome of the current.docxedgar6wallace88877
 
Write a one page paper (double spaced) describing and discussing the.docx
Write a one page paper (double spaced) describing and discussing the.docxWrite a one page paper (double spaced) describing and discussing the.docx
Write a one page paper (double spaced) describing and discussing the.docxedgar6wallace88877
 
write a one page about this topic and provide a reference.Will.docx
write a one page about this topic and provide a reference.Will.docxwrite a one page about this topic and provide a reference.Will.docx
write a one page about this topic and provide a reference.Will.docxedgar6wallace88877
 
Write a one or more paragraph on the following question below.docx
Write a one or more paragraph on the following question below.docxWrite a one or more paragraph on the following question below.docx
Write a one or more paragraph on the following question below.docxedgar6wallace88877
 
Write a one or more page paper on the following belowWhy are .docx
Write a one or more page paper on the following belowWhy are .docxWrite a one or more page paper on the following belowWhy are .docx
Write a one or more page paper on the following belowWhy are .docxedgar6wallace88877
 
Write a one page dialogue in which two characters are arguing but .docx
Write a one page dialogue in which two characters are arguing but .docxWrite a one page dialogue in which two characters are arguing but .docx
Write a one page dialogue in which two characters are arguing but .docxedgar6wallace88877
 

More from edgar6wallace88877 (20)

Write a page to a page and half for each topic and read each topic a.docx
Write a page to a page and half for each topic and read each topic a.docxWrite a page to a page and half for each topic and read each topic a.docx
Write a page to a page and half for each topic and read each topic a.docx
 
Write a page discussing why you believe PMI is focusing BA as the fi.docx
Write a page discussing why you believe PMI is focusing BA as the fi.docxWrite a page discussing why you believe PMI is focusing BA as the fi.docx
Write a page discussing why you believe PMI is focusing BA as the fi.docx
 
Write a page of personal reflection of your present leadership compe.docx
Write a page of personal reflection of your present leadership compe.docxWrite a page of personal reflection of your present leadership compe.docx
Write a page of personal reflection of your present leadership compe.docx
 
Write a page of compare and contrast for the Big Five Personalit.docx
Write a page of compare and contrast for the Big Five Personalit.docxWrite a page of compare and contrast for the Big Five Personalit.docx
Write a page of compare and contrast for the Big Five Personalit.docx
 
Write a page of research and discuss an innovation that includes mul.docx
Write a page of research and discuss an innovation that includes mul.docxWrite a page of research and discuss an innovation that includes mul.docx
Write a page of research and discuss an innovation that includes mul.docx
 
Write a page answering the questions below.Sometimes projects .docx
Write a page answering the questions below.Sometimes projects .docxWrite a page answering the questions below.Sometimes projects .docx
Write a page answering the questions below.Sometimes projects .docx
 
Write a one-paragraph summary of one of the reading assignments from.docx
Write a one-paragraph summary of one of the reading assignments from.docxWrite a one-paragraph summary of one of the reading assignments from.docx
Write a one-paragraph summary of one of the reading assignments from.docx
 
Write a one-paragraph summary of this article.Riordan, B. C..docx
Write a one-paragraph summary of this article.Riordan, B. C..docxWrite a one-paragraph summary of this article.Riordan, B. C..docx
Write a one-paragraph summary of this article.Riordan, B. C..docx
 
Write a one-paragraph response to the following topic. Use the MLA f.docx
Write a one-paragraph response to the following topic. Use the MLA f.docxWrite a one-paragraph response to the following topic. Use the MLA f.docx
Write a one-paragraph response to the following topic. Use the MLA f.docx
 
Write a one-page rhetorical analysis in which you analyze the argume.docx
Write a one-page rhetorical analysis in which you analyze the argume.docxWrite a one-page rhetorical analysis in which you analyze the argume.docx
Write a one-page rhetorical analysis in which you analyze the argume.docx
 
Write a one pageliterature review of your figure( FIGURE A.docx
Write a one pageliterature review of your figure( FIGURE A.docxWrite a one pageliterature review of your figure( FIGURE A.docx
Write a one pageliterature review of your figure( FIGURE A.docx
 
Write a one page-paper documenting the problemneed you wish to .docx
Write a one page-paper documenting the problemneed you wish to .docxWrite a one page-paper documenting the problemneed you wish to .docx
Write a one page-paper documenting the problemneed you wish to .docx
 
Write a one page report on Chapter 1 and 2 with the same style of mo.docx
Write a one page report on Chapter 1 and 2 with the same style of mo.docxWrite a one page report on Chapter 1 and 2 with the same style of mo.docx
Write a one page report on Chapter 1 and 2 with the same style of mo.docx
 
Write a one page reflection about the following1) Identify .docx
Write a one page reflection about the following1) Identify .docxWrite a one page reflection about the following1) Identify .docx
Write a one page reflection about the following1) Identify .docx
 
Write a one page paper on the question belowSome of the current.docx
Write a one page paper on the question belowSome of the current.docxWrite a one page paper on the question belowSome of the current.docx
Write a one page paper on the question belowSome of the current.docx
 
Write a one page paper (double spaced) describing and discussing the.docx
Write a one page paper (double spaced) describing and discussing the.docxWrite a one page paper (double spaced) describing and discussing the.docx
Write a one page paper (double spaced) describing and discussing the.docx
 
write a one page about this topic and provide a reference.Will.docx
write a one page about this topic and provide a reference.Will.docxwrite a one page about this topic and provide a reference.Will.docx
write a one page about this topic and provide a reference.Will.docx
 
Write a one or more paragraph on the following question below.docx
Write a one or more paragraph on the following question below.docxWrite a one or more paragraph on the following question below.docx
Write a one or more paragraph on the following question below.docx
 
Write a one or more page paper on the following belowWhy are .docx
Write a one or more page paper on the following belowWhy are .docxWrite a one or more page paper on the following belowWhy are .docx
Write a one or more page paper on the following belowWhy are .docx
 
Write a one page dialogue in which two characters are arguing but .docx
Write a one page dialogue in which two characters are arguing but .docxWrite a one page dialogue in which two characters are arguing but .docx
Write a one page dialogue in which two characters are arguing but .docx
 

Recently uploaded

Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 

Recently uploaded (20)

Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 

Sheet1Country ACountry BProduct 110 Reds9 GreensProduct 22 Reds2.2.docx

  • 1. Sheet1Country ACountry BProduct 110 Reds9 GreensProduct 22 Reds2.2 GreensProduct 37 Red4 GreenProduct 45 Red5 GreenProduct 54 Red4.5 Green 8/2/2019 Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa- BB5a31b16bb2c48/originalityReport/ultra?course_id=_109247_ 1&includeDeleted=true&attem… 1/2 SafeAssign Originality Report Summer 2019 - Cloud Computing (ITS-532-06) - Second Bi- Term • Week 5 - Assignment • Submitted on Fri, Aug 02, 2019, 8:55 AM Sai Kumar Baruri View Report Summary View Originality Report - Old Design INCLUDED SOURCES Sources Institutional database (8) %92 Student paper Student paper Student paper Student paper
  • 2. Student paper Student paper Student paper Student paper Top sources Attachment 1 Week_5_Assignment_Microseg… %92 4 8 1 5 7 6 2 3 Running head: MICROSEGMENTATION AND ZERO TRUST SECURITY 1 MICROSEGMENTATION AND ZERO TRUST SECURITY 2
  • 3. Microsegmentation and Zero Trust Security Week 5 - Assignment by Sai Kumar Baruri Professor D. Barrett University of Cumberland’s ITS 532 - 06 08/02/2019 Microsegmentation and Zero Trust Security Introduction The 21st century is much characterized by increased technology, access to the internet and the adoption of information systems. Due to the adoption of technologies, there is an increase in the realization of the benefits that come with IT value. However, technological advancements have negatively affected society and brought about security threats. This has resulted in the implementation of security mechanisms that enhance the security of IT assets. Such mechanisms include physical network segmentation, micro- segmentation and zero-trust security. Physical network segmentation The physical network segmentation in the cloud includes the segmentation of IT components that are
  • 4. based on the logic outlines the endpoints to be on each network. The physical network segmentation seeks to group some of the logical components into specific groups according to their functions and in turn, access, the privileges assigned (Mammela et al., 2016). The physical network segmentation concerning cloud computing implies the logical division of the network into minor segments that share the same access permissions and characteristics. For instance, the cloud computing network is physically segmented as a private cloud computing. Micro-segmentation The micro-segmentation comprises of security-enhancing technology that is used in breaking down a given data Centre which is a cloud-based into logical elements. This facilitates s the implementation of high-level information technology security policies on the logical elements to aid in their control (Baum & Chang, 2014). The micro-segmentation in cloud computing seeks to break down the applications and the various network segments into workloads. This implies that the communication and access of applications are restricted according to the IT policies definition to build on security. Moreover, the micro-segmentation in cloud computing implies narrowing down of control access and specific workloads which bars unauthorized access and implements zero-trust policy. Difference between physical network segmentation and micro-segmentation The physical network segmentation is different from micro- segmentation in that; the physical network segmentation divides systems according to their defined end-
  • 5. points. Through this, it implies some form of network access restriction based on the access rights grouped into several components. On the other hand, micro-segmentation implies a division of the organization systems into workloads which are strictly defined and high-level policies for security enhancement. Therefore, the physical network segmentation is a more generalized security policy that is less secure. However, micro- segmentation narrows down into specific workloads that restrict access and integration, thus becoming more secure. Nonetheless, the micro- segmentation can be implemented on physical network segmentation to secure workloads. At the same time, physical network segmentation has high-level security mechanism hence being less useful. The concept of zero security Massive data breaches in databases have characterized the 21 centuries. Due to this, security has become a crucial aspect to consider because the use of information systems in the current world is full of threats. Due to the increased security threats in the information systems, it has led to the implementation and initiation of zero-trust security. The zero-trust security implies a security- enhancing model for both insider and outsider access is limited to no-automatic access until verified before granting access right (Kindervag, 2016). This model treats anything that is either within its parameter or beyond as a suspect with the potential of compromising security, which means verification comes first. Zero security models are 1 2
  • 7. 175151e6991d&course_id=_109247_1&includeDeleted=true&fo rce=true 8/2/2019 Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa- BB5a31b16bb2c48/originalityReport/ultra?course_id=_109247_ 1&includeDeleted=true&attem… 2/2 different from conventional security model in that; zero trust security introduces system latency where verification is done on anything either inside or outside trying to gain access. Therefore, the automatic access grating is disabled until the user is verified. The conventional security model relies on a security mitigation procedure implemented to promote security that verifies the identity of the user. However, this model supports ubiquitous security, particularly in a cloud environment by enabling a unified approach to security where identity must be verified regardless of the privileges assigned before access grants. Nonetheless, this reduces the overreliance on security mitigation techniques such as the use of SIEM tools, which are at times compromised. Micro- segmentation for zero-trust security The micro- segmentation comprises of variable security technology which builds the security of a given organizations’ information systems. The micro-segmentation topology could potentially be used to implement zero- trust security in the following ways. 4
  • 8. 4 Through developing tighter IT security policies and implementing the same on the system workloads (logical segments) which disables automatic access granting to anything both within and without the facilitate parameter until identity proved and user verified. The non-tolerance to access the unverified users tends to implement zero-trust security. Anything seeking access is treated as a success regardless of the identified privileges assigned to each. Implementing zero trust model Modern organizations should consider the implementation of a zero-trust security approach. This is because the zero-trust security approach is the most efficient and it implements access control capabilities that secure the systems. The approach is based on the principle of verification before access grants. However, the approach tends to be more effective in barring unauthorized access. Additionally, a zero-trust security approach declines the over-reliant on implemented security mitigation procedures like the use of SIEM tools which have been compromised severally. This approach treats anything as a suspect and thus causes effective scrutiny before access grants. References Baum, G., & Chang, W. (2014). U.S. Patent No. 8,630,902. Washington, DC: U.S. Patent and Trademark Office. Kindervag, J. (2016). No more chewy centers: the zero- trust model of information security.
  • 9. Forrester Research, Inc., dated Mar, 23. Mämmelä, O., Hiltunen, J., Suomalainen, J., Ahola, K., Mannersalo, P., & Vehkaperä, J. (2016, June). Towards micro- segmentation in 5G network security. In European Conference on Networks and Communications (EuCNC 2016) Workshop on Network Management, Quality of Service and Security for 5G Networks. 4 4 7 8 8 Word Count: Submitted on: Submission UUID: Attachment UUID: 1,004 08/02/19 19162e98-9286-b696-108e-09c1d120e1eb 1fa458d7-c991-e0d0-0b74-44db2fdb235c Top of Form Name: Graduate Course Rubric Description: All assignments will be graded according to this rubric. Bottom of Form Novice Competent Proficient Focus
  • 10. Points: 0 (0.00%) Exhibits a limited understanding of the assignment. Reader is unable to follow the logic used for the assignment Student’s writing is weak in the inclusion of supporting facts or statements. Points: 10 (10.00%) Establishes a good comprehension of topic. Student demonstrates an effective presentation of assignment, with most support statements helping to support the key focus of assignment. Points: 20 (20.00%) Student exhibits a defined and clear understanding of the assignment. Student builds upon the assignment with well- documented and exceptional supporting facts, figures, and/or statements. Content/Subject Knowledge Points: 0 (0.00%) Student tries to explain some concepts, but overlooks critical details. Assignment appears vague or incomplete in various segments. Student does not perceive to have a logical sequencing of ideas. Points: 10 (10.00%) Student exhibits above average usage of subject matter in assignment. Details and facts presented provide an adequate presentation of student’s current level of subject matter knowledge. Points: 20 (20.00%) Student demonstrates proficient command of the subject matter in the assignment.. Student provides comprehensive analysis of details, facts, and concepts in a logical sequence.
  • 11. Critical Thinking Skills Points: 0 (0.00%) Student demonstrates beginning understanding of key concepts, but overlooks critical details. Learner is unable to apply information in a problem-solving fashion. Student presents confusing statements and facts in assignment. No evidence or little semblance of critical thinking skills. Points: 10 (10.00%) Student exhibits a good command of critical thinking skills in the presentation of material and supporting statements. Assignment demonstrates the student’s above average use of relating concepts by using a variety of factors. Overall, student provides adequate conclusions, with 2 or fewer errors. Points: 20 (20.00%) Student demonstrates a higher-level of critical thinking. Learner provides a strategic approach in presenting examples of problem solving or critical thinking, while drawing logical conclusions which are not immediately obvious. Student presents a genuine intellectual development of ideas throughout assignment. Organization of Ideas/Format Points: 0 (0.00%) Assignment reveals formatting errors and a lack of organization. . The lack of appropriate references or source materials demonstrates the student’s need for additional help or training in this area. Student needs to review and revise the assignment. Points: 10 (10.00%) Student explains the majority of points and concepts in the assignment. Student presents an above average level of preparedness, with a few formatting errors. Assignment contains less than 5 resources. Points:
  • 12. 20 (20.00%) Student thoroughly understands and excels in explaining all major points. An original, unique, and/or imaginative approach to overall ideas, concepts, and findings is presented. Finished assignment demonstrates student’s ability to plan and organize research in a logical sequence. Student uses at least of 5-7 references in assignment. Grammar and Mechanics Points: 0 (0.00%) Topics, concepts, and ideas are not coherently discussed or expressed in assignments. Student’s writing style is weak and needs improvement, along with numerous proofreading errors. Assignment lacks clarity, consistency, and correctness. Student needs to review and revise assignment. Points: 10 (10.00%) Student provides an effective display of good writing and grammar. Assignment appears to be well written with no more than 3-5 errors. Student provides a final written product that covers the above-minimal requirements. Points: 20 (20.00%) Student demonstrates an excellent command of grammar, as well as presents research in a clear and concise writing style. Student excels in the selection and development of a well- planned research assignment. Assignment is error-free and reflects student’s ability to prepare a high-quality academic assignment. Top of Form Bottom of Form
  • 13. ITS 532 Module Five Essay Guidelines and Rubric Topic: Microsegmentation and Zero Trust Security Overview: Explain the difference between physical network segmentation and microsegmentation. Explain what it means to implement zero trust security. Explain how microsegmentation can support a zero trust network. Guidelines for Submission: Using APA 6th edition style standards, submit a Word document that is 3-4 pages in length (excluding title page, references, and appendices) and include at least three credible scholarly references to support your findings. The UC Library is a good place to find these sources. Be sure to cite and reference your work using the APA guides and essay template that are located in the courseroom. Include the following critical elements in your essay: I. Physical Network Segmentation vs. Microsegmentation: Briefly describe each networking environment. Describe the difference between these two networking approaches. II. Zero Trust Security. Explain the concept of Zero Trust Security. How is this model different from conventional security models? How does this model support ubiquitous security in a cloud environment? III. Microsegmentation for Zero Trust Security: Explain how microsegmentation topology provides the foundation for implementing the Zero Trust model. Why do modern organizations need to consider implementing a Zero Trust security approach? Required elements: · Please ensure your paper complies APA 6th edition style guidelines. There is a sample paper provided under the Course Introduction link.· APA basics: · Your essay should be typed, double-spaced on standard-sized paper (8.5" x 11") · Use 1" margins on all sides, first line of all paragraphs is indented ½” from the margin
  • 14. · Use 12 pt. Times New Roman font · Follow the outline provided above and use section headers to improve the readability of your paper. If I cannot read and understand it, you will not earn credit for the content.