SlideShare a Scribd company logo
1 of 2
Virtual Computing Question.. Answer the following question that listed below.. also
provide one Reference
This scenario involves the integrity portion of the CIA Triad. The integrity portion of the triad
deals with maintaining the accuracy and trustworthiness of data over its life cycle. Jim, the
virtual server manager, wants to send three separate documents to users on his virtual server; one
document for each person. Therefore, each document has to travel from the server to a client
machine on the network. The virtual machine manager is Oracle VirtualBox and each client has a
different operating system on their system: one has Fedora Linux, one has Microsoft XP, and one
is running Mac OS X. What will ensure these documents travel to their recipients without being
changed en route? What precautions should Jim take before sending them? Also, will one client
operating system be more at risk of their packet being sniffed or changed?
Solution
The docs will be reached on client site without being changed which is ensured by Data
Encapsulation provided by TCP/IP Protocol and by resilient and scalable networks, Encryption
also plays an important role in this
Jim has to take the following steps
First use the VPN
Second use security concerns like Encryption, password protection
It depends upon the schema which a OS applies for data decryption because the data
transmission doesnt care about the OS of the Recipient, so the risk always lies on the client side
not on the medium
Virtual Computing Question-- Answer the following question that listed.docx

More Related Content

Similar to Virtual Computing Question-- Answer the following question that listed.docx

EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...IJNSA Journal
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsKamal Spring
 
The enterprise differentiator of mq on zos
The enterprise differentiator of mq on zosThe enterprise differentiator of mq on zos
The enterprise differentiator of mq on zosMatt Leming
 
Dependable Cloud Comuting
Dependable Cloud ComutingDependable Cloud Comuting
Dependable Cloud ComutingKazuhiko Kato
 
Providing user security guarantees
Providing user security guaranteesProviding user security guarantees
Providing user security guaranteesKamal Spring
 
Providing user security guarantees
Providing user security guaranteesProviding user security guarantees
Providing user security guaranteesKamal Spring
 
Cloud computing security and privacy
Cloud computing security and privacyCloud computing security and privacy
Cloud computing security and privacyAdeel Javaid
 
Cloud Security
Cloud SecurityCloud Security
Cloud SecurityAli Habeeb
 
Security as a Service Model for Cloud Environment
Security as   a Service Model   for   Cloud   EnvironmentSecurity as   a Service Model   for   Cloud   Environment
Security as a Service Model for Cloud EnvironmentKaashivInfoTech Company
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET Journal
 
New Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud DataNew Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud DataEMC
 
Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...
Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...
Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...csandit
 
SECURITY AND PRIVACY OF SENSITIVE DATA IN CLOUD COMPUTING: A SURVEY OF RECENT...
SECURITY AND PRIVACY OF SENSITIVE DATA IN CLOUD COMPUTING: A SURVEY OF RECENT...SECURITY AND PRIVACY OF SENSITIVE DATA IN CLOUD COMPUTING: A SURVEY OF RECENT...
SECURITY AND PRIVACY OF SENSITIVE DATA IN CLOUD COMPUTING: A SURVEY OF RECENT...cscpconf
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperShakas Technologies
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperShakas Technologies
 
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...Bharath Nair
 

Similar to Virtual Computing Question-- Answer the following question that listed.docx (20)

EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
 
Cloud security test
Cloud security testCloud security test
Cloud security test
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
 
The enterprise differentiator of mq on zos
The enterprise differentiator of mq on zosThe enterprise differentiator of mq on zos
The enterprise differentiator of mq on zos
 
Dependable Cloud Comuting
Dependable Cloud ComutingDependable Cloud Comuting
Dependable Cloud Comuting
 
Providing user security guarantees
Providing user security guaranteesProviding user security guarantees
Providing user security guarantees
 
Providing user security guarantees
Providing user security guaranteesProviding user security guarantees
Providing user security guarantees
 
Cloud computing security and privacy
Cloud computing security and privacyCloud computing security and privacy
Cloud computing security and privacy
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Security as a Service Model for Cloud Environment
Security as   a Service Model   for   Cloud   EnvironmentSecurity as   a Service Model   for   Cloud   Environment
Security as a Service Model for Cloud Environment
 
Fs2510501055
Fs2510501055Fs2510501055
Fs2510501055
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
 
New Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud DataNew Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud Data
 
Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...
Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...
Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...
 
SECURITY AND PRIVACY OF SENSITIVE DATA IN CLOUD COMPUTING: A SURVEY OF RECENT...
SECURITY AND PRIVACY OF SENSITIVE DATA IN CLOUD COMPUTING: A SURVEY OF RECENT...SECURITY AND PRIVACY OF SENSITIVE DATA IN CLOUD COMPUTING: A SURVEY OF RECENT...
SECURITY AND PRIVACY OF SENSITIVE DATA IN CLOUD COMPUTING: A SURVEY OF RECENT...
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
 

More from mtruman1

Wages and salaries incurred in March amounted to $10-000- of which $4-.docx
Wages and salaries incurred in March amounted to $10-000- of which $4-.docxWages and salaries incurred in March amounted to $10-000- of which $4-.docx
Wages and salaries incurred in March amounted to $10-000- of which $4-.docxmtruman1
 
Visual Studio Short Answer- 1- What is the name of the tool that lets.docx
Visual Studio Short Answer- 1- What is the name of the tool that lets.docxVisual Studio Short Answer- 1- What is the name of the tool that lets.docx
Visual Studio Short Answer- 1- What is the name of the tool that lets.docxmtruman1
 
Visit two or more social media sites and review information that peopl.docx
Visit two or more social media sites and review information that peopl.docxVisit two or more social media sites and review information that peopl.docx
Visit two or more social media sites and review information that peopl.docxmtruman1
 
Visual Basic Short Answer- 1- What is the primary advantage to definin.docx
Visual Basic Short Answer- 1- What is the primary advantage to definin.docxVisual Basic Short Answer- 1- What is the primary advantage to definin.docx
Visual Basic Short Answer- 1- What is the primary advantage to definin.docxmtruman1
 
Vanadium is a transition metal that can be found in the four consecuti.docx
Vanadium is a transition metal that can be found in the four consecuti.docxVanadium is a transition metal that can be found in the four consecuti.docx
Vanadium is a transition metal that can be found in the four consecuti.docxmtruman1
 
Virtual Computing Questions-- Answer both questions in 500-600 words W.docx
Virtual Computing Questions-- Answer both questions in 500-600 words W.docxVirtual Computing Questions-- Answer both questions in 500-600 words W.docx
Virtual Computing Questions-- Answer both questions in 500-600 words W.docxmtruman1
 
VB Create a Class named file that contains the following properties- I.docx
VB Create a Class named file that contains the following properties- I.docxVB Create a Class named file that contains the following properties- I.docx
VB Create a Class named file that contains the following properties- I.docxmtruman1
 
Ventura Capital is a financier who specializes in capitalizing start-u (1).docx
Ventura Capital is a financier who specializes in capitalizing start-u (1).docxVentura Capital is a financier who specializes in capitalizing start-u (1).docx
Ventura Capital is a financier who specializes in capitalizing start-u (1).docxmtruman1
 
VB -What is the primary advantage to defining an interface type in an.docx
VB -What is the primary advantage to defining an interface type in an.docxVB -What is the primary advantage to defining an interface type in an.docx
VB -What is the primary advantage to defining an interface type in an.docxmtruman1
 
Valence electrons are not responsible for A- B- O D- The chemical reac.docx
Valence electrons are not responsible for A- B- O D- The chemical reac.docxValence electrons are not responsible for A- B- O D- The chemical reac.docx
Valence electrons are not responsible for A- B- O D- The chemical reac.docxmtruman1
 
Vertically polarized light that has an intensity of 200 W-m2 is incide.docx
Vertically polarized light that has an intensity of 200 W-m2 is incide.docxVertically polarized light that has an intensity of 200 W-m2 is incide.docx
Vertically polarized light that has an intensity of 200 W-m2 is incide.docxmtruman1
 
Week 4 - HIDS or AntiVirus Systems Research Paper The focus of the res (1).docx
Week 4 - HIDS or AntiVirus Systems Research Paper The focus of the res (1).docxWeek 4 - HIDS or AntiVirus Systems Research Paper The focus of the res (1).docx
Week 4 - HIDS or AntiVirus Systems Research Paper The focus of the res (1).docxmtruman1
 
Week 2 Discussion- I need help understanding the following question- C.docx
Week 2 Discussion- I need help understanding the following question- C.docxWeek 2 Discussion- I need help understanding the following question- C.docx
Week 2 Discussion- I need help understanding the following question- C.docxmtruman1
 
We will assume the universe is expanding at a constant rate- At t - t0.docx
We will assume the universe is expanding at a constant rate- At t - t0.docxWe will assume the universe is expanding at a constant rate- At t - t0.docx
We will assume the universe is expanding at a constant rate- At t - t0.docxmtruman1
 
We normally think of the arts as very different from technologies in s.docx
We normally think of the arts as very different from technologies in s.docxWe normally think of the arts as very different from technologies in s.docx
We normally think of the arts as very different from technologies in s.docxmtruman1
 
We discussed how the processor routes data between internal components.docx
We discussed how the processor routes data between internal components.docxWe discussed how the processor routes data between internal components.docx
We discussed how the processor routes data between internal components.docxmtruman1
 
We normally think of the arts as very different from technologies in s (1).docx
We normally think of the arts as very different from technologies in s (1).docxWe normally think of the arts as very different from technologies in s (1).docx
We normally think of the arts as very different from technologies in s (1).docxmtruman1
 
We reproduce the class Money here- in part- class Money{ public- Mone.docx
We reproduce the class Money here- in part- class Money{ public-  Mone.docxWe reproduce the class Money here- in part- class Money{ public-  Mone.docx
We reproduce the class Money here- in part- class Money{ public- Mone.docxmtruman1
 
We have two oscillators- used to measure time- One is a vertical mass-.docx
We have two oscillators- used to measure time- One is a vertical mass-.docxWe have two oscillators- used to measure time- One is a vertical mass-.docx
We have two oscillators- used to measure time- One is a vertical mass-.docxmtruman1
 
Water of constant density The solution is- Can someone show me how to.docx
Water of constant density The solution is-  Can someone show me how to.docxWater of constant density The solution is-  Can someone show me how to.docx
Water of constant density The solution is- Can someone show me how to.docxmtruman1
 

More from mtruman1 (20)

Wages and salaries incurred in March amounted to $10-000- of which $4-.docx
Wages and salaries incurred in March amounted to $10-000- of which $4-.docxWages and salaries incurred in March amounted to $10-000- of which $4-.docx
Wages and salaries incurred in March amounted to $10-000- of which $4-.docx
 
Visual Studio Short Answer- 1- What is the name of the tool that lets.docx
Visual Studio Short Answer- 1- What is the name of the tool that lets.docxVisual Studio Short Answer- 1- What is the name of the tool that lets.docx
Visual Studio Short Answer- 1- What is the name of the tool that lets.docx
 
Visit two or more social media sites and review information that peopl.docx
Visit two or more social media sites and review information that peopl.docxVisit two or more social media sites and review information that peopl.docx
Visit two or more social media sites and review information that peopl.docx
 
Visual Basic Short Answer- 1- What is the primary advantage to definin.docx
Visual Basic Short Answer- 1- What is the primary advantage to definin.docxVisual Basic Short Answer- 1- What is the primary advantage to definin.docx
Visual Basic Short Answer- 1- What is the primary advantage to definin.docx
 
Vanadium is a transition metal that can be found in the four consecuti.docx
Vanadium is a transition metal that can be found in the four consecuti.docxVanadium is a transition metal that can be found in the four consecuti.docx
Vanadium is a transition metal that can be found in the four consecuti.docx
 
Virtual Computing Questions-- Answer both questions in 500-600 words W.docx
Virtual Computing Questions-- Answer both questions in 500-600 words W.docxVirtual Computing Questions-- Answer both questions in 500-600 words W.docx
Virtual Computing Questions-- Answer both questions in 500-600 words W.docx
 
VB Create a Class named file that contains the following properties- I.docx
VB Create a Class named file that contains the following properties- I.docxVB Create a Class named file that contains the following properties- I.docx
VB Create a Class named file that contains the following properties- I.docx
 
Ventura Capital is a financier who specializes in capitalizing start-u (1).docx
Ventura Capital is a financier who specializes in capitalizing start-u (1).docxVentura Capital is a financier who specializes in capitalizing start-u (1).docx
Ventura Capital is a financier who specializes in capitalizing start-u (1).docx
 
VB -What is the primary advantage to defining an interface type in an.docx
VB -What is the primary advantage to defining an interface type in an.docxVB -What is the primary advantage to defining an interface type in an.docx
VB -What is the primary advantage to defining an interface type in an.docx
 
Valence electrons are not responsible for A- B- O D- The chemical reac.docx
Valence electrons are not responsible for A- B- O D- The chemical reac.docxValence electrons are not responsible for A- B- O D- The chemical reac.docx
Valence electrons are not responsible for A- B- O D- The chemical reac.docx
 
Vertically polarized light that has an intensity of 200 W-m2 is incide.docx
Vertically polarized light that has an intensity of 200 W-m2 is incide.docxVertically polarized light that has an intensity of 200 W-m2 is incide.docx
Vertically polarized light that has an intensity of 200 W-m2 is incide.docx
 
Week 4 - HIDS or AntiVirus Systems Research Paper The focus of the res (1).docx
Week 4 - HIDS or AntiVirus Systems Research Paper The focus of the res (1).docxWeek 4 - HIDS or AntiVirus Systems Research Paper The focus of the res (1).docx
Week 4 - HIDS or AntiVirus Systems Research Paper The focus of the res (1).docx
 
Week 2 Discussion- I need help understanding the following question- C.docx
Week 2 Discussion- I need help understanding the following question- C.docxWeek 2 Discussion- I need help understanding the following question- C.docx
Week 2 Discussion- I need help understanding the following question- C.docx
 
We will assume the universe is expanding at a constant rate- At t - t0.docx
We will assume the universe is expanding at a constant rate- At t - t0.docxWe will assume the universe is expanding at a constant rate- At t - t0.docx
We will assume the universe is expanding at a constant rate- At t - t0.docx
 
We normally think of the arts as very different from technologies in s.docx
We normally think of the arts as very different from technologies in s.docxWe normally think of the arts as very different from technologies in s.docx
We normally think of the arts as very different from technologies in s.docx
 
We discussed how the processor routes data between internal components.docx
We discussed how the processor routes data between internal components.docxWe discussed how the processor routes data between internal components.docx
We discussed how the processor routes data between internal components.docx
 
We normally think of the arts as very different from technologies in s (1).docx
We normally think of the arts as very different from technologies in s (1).docxWe normally think of the arts as very different from technologies in s (1).docx
We normally think of the arts as very different from technologies in s (1).docx
 
We reproduce the class Money here- in part- class Money{ public- Mone.docx
We reproduce the class Money here- in part- class Money{ public-  Mone.docxWe reproduce the class Money here- in part- class Money{ public-  Mone.docx
We reproduce the class Money here- in part- class Money{ public- Mone.docx
 
We have two oscillators- used to measure time- One is a vertical mass-.docx
We have two oscillators- used to measure time- One is a vertical mass-.docxWe have two oscillators- used to measure time- One is a vertical mass-.docx
We have two oscillators- used to measure time- One is a vertical mass-.docx
 
Water of constant density The solution is- Can someone show me how to.docx
Water of constant density The solution is-  Can someone show me how to.docxWater of constant density The solution is-  Can someone show me how to.docx
Water of constant density The solution is- Can someone show me how to.docx
 

Recently uploaded

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 

Recently uploaded (20)

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 

Virtual Computing Question-- Answer the following question that listed.docx

  • 1. Virtual Computing Question.. Answer the following question that listed below.. also provide one Reference This scenario involves the integrity portion of the CIA Triad. The integrity portion of the triad deals with maintaining the accuracy and trustworthiness of data over its life cycle. Jim, the virtual server manager, wants to send three separate documents to users on his virtual server; one document for each person. Therefore, each document has to travel from the server to a client machine on the network. The virtual machine manager is Oracle VirtualBox and each client has a different operating system on their system: one has Fedora Linux, one has Microsoft XP, and one is running Mac OS X. What will ensure these documents travel to their recipients without being changed en route? What precautions should Jim take before sending them? Also, will one client operating system be more at risk of their packet being sniffed or changed? Solution The docs will be reached on client site without being changed which is ensured by Data Encapsulation provided by TCP/IP Protocol and by resilient and scalable networks, Encryption also plays an important role in this Jim has to take the following steps First use the VPN Second use security concerns like Encryption, password protection It depends upon the schema which a OS applies for data decryption because the data transmission doesnt care about the OS of the Recipient, so the risk always lies on the client side not on the medium