SlideShare a Scribd company logo
Virtual Computing Question.. Answer the following question that listed below.. also
provide one Reference
This scenario involves the integrity portion of the CIA Triad. The integrity portion of the triad
deals with maintaining the accuracy and trustworthiness of data over its life cycle. Jim, the
virtual server manager, wants to send three separate documents to users on his virtual server; one
document for each person. Therefore, each document has to travel from the server to a client
machine on the network. The virtual machine manager is Oracle VirtualBox and each client has a
different operating system on their system: one has Fedora Linux, one has Microsoft XP, and one
is running Mac OS X. What will ensure these documents travel to their recipients without being
changed en route? What precautions should Jim take before sending them? Also, will one client
operating system be more at risk of their packet being sniffed or changed?
Solution
The docs will be reached on client site without being changed which is ensured by Data
Encapsulation provided by TCP/IP Protocol and by resilient and scalable networks, Encryption
also plays an important role in this
Jim has to take the following steps
First use the VPN
Second use security concerns like Encryption, password protection
It depends upon the schema which a OS applies for data decryption because the data
transmission doesnt care about the OS of the Recipient, so the risk always lies on the client side
not on the medium
Virtual Computing Question-- Answer the following question that listed.docx

More Related Content

Similar to Virtual Computing Question-- Answer the following question that listed.docx

EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
IJNSA Journal
 
Cloud security test
Cloud security testCloud security test
Cloud security test
Skillahead Navriti
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
Kamal Spring
 
The enterprise differentiator of mq on zos
The enterprise differentiator of mq on zosThe enterprise differentiator of mq on zos
The enterprise differentiator of mq on zos
Matt Leming
 
Dependable Cloud Comuting
Dependable Cloud ComutingDependable Cloud Comuting
Dependable Cloud Comuting
Kazuhiko Kato
 
Providing user security guarantees
Providing user security guaranteesProviding user security guarantees
Providing user security guarantees
Kamal Spring
 
Providing user security guarantees
Providing user security guaranteesProviding user security guarantees
Providing user security guarantees
Kamal Spring
 
Cloud computing security and privacy
Cloud computing security and privacyCloud computing security and privacy
Cloud computing security and privacy
Adeel Javaid
 
Cloud Security
Cloud SecurityCloud Security
Cloud SecurityAli Habeeb
 
Security as a Service Model for Cloud Environment
Security as   a Service Model   for   Cloud   EnvironmentSecurity as   a Service Model   for   Cloud   Environment
Security as a Service Model for Cloud Environment
KaashivInfoTech Company
 
Fs2510501055
Fs2510501055Fs2510501055
Fs2510501055
IJERA Editor
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
IRJET Journal
 
New Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud DataNew Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud Data
EMC
 
SECURITY AND PRIVACY OF SENSITIVE DATA IN CLOUD COMPUTING: A SURVEY OF RECENT...
SECURITY AND PRIVACY OF SENSITIVE DATA IN CLOUD COMPUTING: A SURVEY OF RECENT...SECURITY AND PRIVACY OF SENSITIVE DATA IN CLOUD COMPUTING: A SURVEY OF RECENT...
SECURITY AND PRIVACY OF SENSITIVE DATA IN CLOUD COMPUTING: A SURVEY OF RECENT...
cscpconf
 
Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...
Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...
Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...
csandit
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
Shakas Technologies
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
Shakas Technologies
 
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
Bharath Nair
 

Similar to Virtual Computing Question-- Answer the following question that listed.docx (20)

EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
 
Cloud security test
Cloud security testCloud security test
Cloud security test
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
 
The enterprise differentiator of mq on zos
The enterprise differentiator of mq on zosThe enterprise differentiator of mq on zos
The enterprise differentiator of mq on zos
 
Dependable Cloud Comuting
Dependable Cloud ComutingDependable Cloud Comuting
Dependable Cloud Comuting
 
Providing user security guarantees
Providing user security guaranteesProviding user security guarantees
Providing user security guarantees
 
Providing user security guarantees
Providing user security guaranteesProviding user security guarantees
Providing user security guarantees
 
Cloud computing security and privacy
Cloud computing security and privacyCloud computing security and privacy
Cloud computing security and privacy
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Security as a Service Model for Cloud Environment
Security as   a Service Model   for   Cloud   EnvironmentSecurity as   a Service Model   for   Cloud   Environment
Security as a Service Model for Cloud Environment
 
Fs2510501055
Fs2510501055Fs2510501055
Fs2510501055
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
 
New Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud DataNew Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud Data
 
SECURITY AND PRIVACY OF SENSITIVE DATA IN CLOUD COMPUTING: A SURVEY OF RECENT...
SECURITY AND PRIVACY OF SENSITIVE DATA IN CLOUD COMPUTING: A SURVEY OF RECENT...SECURITY AND PRIVACY OF SENSITIVE DATA IN CLOUD COMPUTING: A SURVEY OF RECENT...
SECURITY AND PRIVACY OF SENSITIVE DATA IN CLOUD COMPUTING: A SURVEY OF RECENT...
 
Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...
Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...
Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
 

More from mtruman1

Wages and salaries incurred in March amounted to $10-000- of which $4-.docx
Wages and salaries incurred in March amounted to $10-000- of which $4-.docxWages and salaries incurred in March amounted to $10-000- of which $4-.docx
Wages and salaries incurred in March amounted to $10-000- of which $4-.docx
mtruman1
 
Visual Studio Short Answer- 1- What is the name of the tool that lets.docx
Visual Studio Short Answer- 1- What is the name of the tool that lets.docxVisual Studio Short Answer- 1- What is the name of the tool that lets.docx
Visual Studio Short Answer- 1- What is the name of the tool that lets.docx
mtruman1
 
Visit two or more social media sites and review information that peopl.docx
Visit two or more social media sites and review information that peopl.docxVisit two or more social media sites and review information that peopl.docx
Visit two or more social media sites and review information that peopl.docx
mtruman1
 
Visual Basic Short Answer- 1- What is the primary advantage to definin.docx
Visual Basic Short Answer- 1- What is the primary advantage to definin.docxVisual Basic Short Answer- 1- What is the primary advantage to definin.docx
Visual Basic Short Answer- 1- What is the primary advantage to definin.docx
mtruman1
 
Vanadium is a transition metal that can be found in the four consecuti.docx
Vanadium is a transition metal that can be found in the four consecuti.docxVanadium is a transition metal that can be found in the four consecuti.docx
Vanadium is a transition metal that can be found in the four consecuti.docx
mtruman1
 
Virtual Computing Questions-- Answer both questions in 500-600 words W.docx
Virtual Computing Questions-- Answer both questions in 500-600 words W.docxVirtual Computing Questions-- Answer both questions in 500-600 words W.docx
Virtual Computing Questions-- Answer both questions in 500-600 words W.docx
mtruman1
 
VB Create a Class named file that contains the following properties- I.docx
VB Create a Class named file that contains the following properties- I.docxVB Create a Class named file that contains the following properties- I.docx
VB Create a Class named file that contains the following properties- I.docx
mtruman1
 
Ventura Capital is a financier who specializes in capitalizing start-u (1).docx
Ventura Capital is a financier who specializes in capitalizing start-u (1).docxVentura Capital is a financier who specializes in capitalizing start-u (1).docx
Ventura Capital is a financier who specializes in capitalizing start-u (1).docx
mtruman1
 
VB -What is the primary advantage to defining an interface type in an.docx
VB -What is the primary advantage to defining an interface type in an.docxVB -What is the primary advantage to defining an interface type in an.docx
VB -What is the primary advantage to defining an interface type in an.docx
mtruman1
 
Valence electrons are not responsible for A- B- O D- The chemical reac.docx
Valence electrons are not responsible for A- B- O D- The chemical reac.docxValence electrons are not responsible for A- B- O D- The chemical reac.docx
Valence electrons are not responsible for A- B- O D- The chemical reac.docx
mtruman1
 
Vertically polarized light that has an intensity of 200 W-m2 is incide.docx
Vertically polarized light that has an intensity of 200 W-m2 is incide.docxVertically polarized light that has an intensity of 200 W-m2 is incide.docx
Vertically polarized light that has an intensity of 200 W-m2 is incide.docx
mtruman1
 
Week 4 - HIDS or AntiVirus Systems Research Paper The focus of the res (1).docx
Week 4 - HIDS or AntiVirus Systems Research Paper The focus of the res (1).docxWeek 4 - HIDS or AntiVirus Systems Research Paper The focus of the res (1).docx
Week 4 - HIDS or AntiVirus Systems Research Paper The focus of the res (1).docx
mtruman1
 
Week 2 Discussion- I need help understanding the following question- C.docx
Week 2 Discussion- I need help understanding the following question- C.docxWeek 2 Discussion- I need help understanding the following question- C.docx
Week 2 Discussion- I need help understanding the following question- C.docx
mtruman1
 
We will assume the universe is expanding at a constant rate- At t - t0.docx
We will assume the universe is expanding at a constant rate- At t - t0.docxWe will assume the universe is expanding at a constant rate- At t - t0.docx
We will assume the universe is expanding at a constant rate- At t - t0.docx
mtruman1
 
We normally think of the arts as very different from technologies in s.docx
We normally think of the arts as very different from technologies in s.docxWe normally think of the arts as very different from technologies in s.docx
We normally think of the arts as very different from technologies in s.docx
mtruman1
 
We discussed how the processor routes data between internal components.docx
We discussed how the processor routes data between internal components.docxWe discussed how the processor routes data between internal components.docx
We discussed how the processor routes data between internal components.docx
mtruman1
 
We normally think of the arts as very different from technologies in s (1).docx
We normally think of the arts as very different from technologies in s (1).docxWe normally think of the arts as very different from technologies in s (1).docx
We normally think of the arts as very different from technologies in s (1).docx
mtruman1
 
We reproduce the class Money here- in part- class Money{ public- Mone.docx
We reproduce the class Money here- in part- class Money{ public-  Mone.docxWe reproduce the class Money here- in part- class Money{ public-  Mone.docx
We reproduce the class Money here- in part- class Money{ public- Mone.docx
mtruman1
 
We have two oscillators- used to measure time- One is a vertical mass-.docx
We have two oscillators- used to measure time- One is a vertical mass-.docxWe have two oscillators- used to measure time- One is a vertical mass-.docx
We have two oscillators- used to measure time- One is a vertical mass-.docx
mtruman1
 
Water of constant density The solution is- Can someone show me how to.docx
Water of constant density The solution is-  Can someone show me how to.docxWater of constant density The solution is-  Can someone show me how to.docx
Water of constant density The solution is- Can someone show me how to.docx
mtruman1
 

More from mtruman1 (20)

Wages and salaries incurred in March amounted to $10-000- of which $4-.docx
Wages and salaries incurred in March amounted to $10-000- of which $4-.docxWages and salaries incurred in March amounted to $10-000- of which $4-.docx
Wages and salaries incurred in March amounted to $10-000- of which $4-.docx
 
Visual Studio Short Answer- 1- What is the name of the tool that lets.docx
Visual Studio Short Answer- 1- What is the name of the tool that lets.docxVisual Studio Short Answer- 1- What is the name of the tool that lets.docx
Visual Studio Short Answer- 1- What is the name of the tool that lets.docx
 
Visit two or more social media sites and review information that peopl.docx
Visit two or more social media sites and review information that peopl.docxVisit two or more social media sites and review information that peopl.docx
Visit two or more social media sites and review information that peopl.docx
 
Visual Basic Short Answer- 1- What is the primary advantage to definin.docx
Visual Basic Short Answer- 1- What is the primary advantage to definin.docxVisual Basic Short Answer- 1- What is the primary advantage to definin.docx
Visual Basic Short Answer- 1- What is the primary advantage to definin.docx
 
Vanadium is a transition metal that can be found in the four consecuti.docx
Vanadium is a transition metal that can be found in the four consecuti.docxVanadium is a transition metal that can be found in the four consecuti.docx
Vanadium is a transition metal that can be found in the four consecuti.docx
 
Virtual Computing Questions-- Answer both questions in 500-600 words W.docx
Virtual Computing Questions-- Answer both questions in 500-600 words W.docxVirtual Computing Questions-- Answer both questions in 500-600 words W.docx
Virtual Computing Questions-- Answer both questions in 500-600 words W.docx
 
VB Create a Class named file that contains the following properties- I.docx
VB Create a Class named file that contains the following properties- I.docxVB Create a Class named file that contains the following properties- I.docx
VB Create a Class named file that contains the following properties- I.docx
 
Ventura Capital is a financier who specializes in capitalizing start-u (1).docx
Ventura Capital is a financier who specializes in capitalizing start-u (1).docxVentura Capital is a financier who specializes in capitalizing start-u (1).docx
Ventura Capital is a financier who specializes in capitalizing start-u (1).docx
 
VB -What is the primary advantage to defining an interface type in an.docx
VB -What is the primary advantage to defining an interface type in an.docxVB -What is the primary advantage to defining an interface type in an.docx
VB -What is the primary advantage to defining an interface type in an.docx
 
Valence electrons are not responsible for A- B- O D- The chemical reac.docx
Valence electrons are not responsible for A- B- O D- The chemical reac.docxValence electrons are not responsible for A- B- O D- The chemical reac.docx
Valence electrons are not responsible for A- B- O D- The chemical reac.docx
 
Vertically polarized light that has an intensity of 200 W-m2 is incide.docx
Vertically polarized light that has an intensity of 200 W-m2 is incide.docxVertically polarized light that has an intensity of 200 W-m2 is incide.docx
Vertically polarized light that has an intensity of 200 W-m2 is incide.docx
 
Week 4 - HIDS or AntiVirus Systems Research Paper The focus of the res (1).docx
Week 4 - HIDS or AntiVirus Systems Research Paper The focus of the res (1).docxWeek 4 - HIDS or AntiVirus Systems Research Paper The focus of the res (1).docx
Week 4 - HIDS or AntiVirus Systems Research Paper The focus of the res (1).docx
 
Week 2 Discussion- I need help understanding the following question- C.docx
Week 2 Discussion- I need help understanding the following question- C.docxWeek 2 Discussion- I need help understanding the following question- C.docx
Week 2 Discussion- I need help understanding the following question- C.docx
 
We will assume the universe is expanding at a constant rate- At t - t0.docx
We will assume the universe is expanding at a constant rate- At t - t0.docxWe will assume the universe is expanding at a constant rate- At t - t0.docx
We will assume the universe is expanding at a constant rate- At t - t0.docx
 
We normally think of the arts as very different from technologies in s.docx
We normally think of the arts as very different from technologies in s.docxWe normally think of the arts as very different from technologies in s.docx
We normally think of the arts as very different from technologies in s.docx
 
We discussed how the processor routes data between internal components.docx
We discussed how the processor routes data between internal components.docxWe discussed how the processor routes data between internal components.docx
We discussed how the processor routes data between internal components.docx
 
We normally think of the arts as very different from technologies in s (1).docx
We normally think of the arts as very different from technologies in s (1).docxWe normally think of the arts as very different from technologies in s (1).docx
We normally think of the arts as very different from technologies in s (1).docx
 
We reproduce the class Money here- in part- class Money{ public- Mone.docx
We reproduce the class Money here- in part- class Money{ public-  Mone.docxWe reproduce the class Money here- in part- class Money{ public-  Mone.docx
We reproduce the class Money here- in part- class Money{ public- Mone.docx
 
We have two oscillators- used to measure time- One is a vertical mass-.docx
We have two oscillators- used to measure time- One is a vertical mass-.docxWe have two oscillators- used to measure time- One is a vertical mass-.docx
We have two oscillators- used to measure time- One is a vertical mass-.docx
 
Water of constant density The solution is- Can someone show me how to.docx
Water of constant density The solution is-  Can someone show me how to.docxWater of constant density The solution is-  Can someone show me how to.docx
Water of constant density The solution is- Can someone show me how to.docx
 

Recently uploaded

Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 

Recently uploaded (20)

Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 

Virtual Computing Question-- Answer the following question that listed.docx

  • 1. Virtual Computing Question.. Answer the following question that listed below.. also provide one Reference This scenario involves the integrity portion of the CIA Triad. The integrity portion of the triad deals with maintaining the accuracy and trustworthiness of data over its life cycle. Jim, the virtual server manager, wants to send three separate documents to users on his virtual server; one document for each person. Therefore, each document has to travel from the server to a client machine on the network. The virtual machine manager is Oracle VirtualBox and each client has a different operating system on their system: one has Fedora Linux, one has Microsoft XP, and one is running Mac OS X. What will ensure these documents travel to their recipients without being changed en route? What precautions should Jim take before sending them? Also, will one client operating system be more at risk of their packet being sniffed or changed? Solution The docs will be reached on client site without being changed which is ensured by Data Encapsulation provided by TCP/IP Protocol and by resilient and scalable networks, Encryption also plays an important role in this Jim has to take the following steps First use the VPN Second use security concerns like Encryption, password protection It depends upon the schema which a OS applies for data decryption because the data transmission doesnt care about the OS of the Recipient, so the risk always lies on the client side not on the medium