# Slides | Version |
---|---|
1 | |
2 | |
3 | |
4 | |
5 | |
6 | |
7 |
Three possible options: theoretical, practical, and quiz.
Make short survey with at least 3 papers from the arxiv.org e-Print archive.
Solve at least 2 of the following exercises:
- Research and compare the different security protocols used in cloud computing, such as SSL/TLS, SSH, and IPSec. Write a report outlining their strengths and weaknesses and make recommendations for which one to use in different scenarios.
- Create a disaster recovery plan for a cloud-based infrastructure. This should include steps for backing up data, restoring systems, and ensuring data integrity in the event of a disaster.
- Conduct a security audit of a cloud-based application or service. This should include identifying potential vulnerabilities, testing for weak passwords or other security weaknesses, and making recommendations for improving security.
- Investigate the use of edge computing in the context of security. Research the benefits and drawbacks of using edge computing for security-sensitive applications, such as industrial control systems or financial systems.
- Develop a security strategy for a cloud-based infrastructure that includes both network-level and application-level security measures. This should include firewalls, intrusion detection and prevention systems, and encryption technologies.
- Research the use of blockchain technology for securing data in the cloud. Investigate the potential benefits and drawbacks of using blockchain for data storage and sharing, and make recommendations for when it would be appropriate to use.
- Investigate the use of machine learning and artificial intelligence in cloud security. Research the benefits and drawbacks of using these technologies for intrusion detection, threat detection, and incident response.
- Create a security policy for a cloud-based infrastructure. This should include guidelines for user authentication and access control, incident response procedures, and acceptable use policies.
- Investigate the use of zero-trust architecture in cloud security. Research the benefits and drawbacks of using a zero-trust approach, and make recommendations for when it would be appropriate to use.
- Research the use of network segmentation in cloud security. Investigate the benefits and drawbacks of using network segmentation, and make recommendations for when it would be appropriate to use in a cloud-based infrastructure.
100 multiple choice questions (60% to pass the exam). Contact Alex Carrega (alessandro.carrega@unige.it) to get the link to the quiz.