Skip to content

s2n-cnit/phd-stiet-cyber-security-approaches-cloud-edge-environments

Repository files navigation

PhD STIET Cyber security approaches for Cloud/Edge Environments

Materials

# Slides Version
1 pptx pdf
2 pptx pdf
3 pptx pdf
4 pptx pdf
5 pptx pdf
6 pptx pdf
7 pptx pdf

Exams

Three possible options: theoretical, practical, and quiz.

Theoretical

Make short survey with at least 3 papers from the arxiv.org e-Print archive.

Practical

Solve at least 2 of the following exercises:

  1. Research and compare the different security protocols used in cloud computing, such as SSL/TLS, SSH, and IPSec. Write a report outlining their strengths and weaknesses and make recommendations for which one to use in different scenarios.
  2. Create a disaster recovery plan for a cloud-based infrastructure. This should include steps for backing up data, restoring systems, and ensuring data integrity in the event of a disaster.
  3. Conduct a security audit of a cloud-based application or service. This should include identifying potential vulnerabilities, testing for weak passwords or other security weaknesses, and making recommendations for improving security.
  4. Investigate the use of edge computing in the context of security. Research the benefits and drawbacks of using edge computing for security-sensitive applications, such as industrial control systems or financial systems.
  5. Develop a security strategy for a cloud-based infrastructure that includes both network-level and application-level security measures. This should include firewalls, intrusion detection and prevention systems, and encryption technologies.
  6. Research the use of blockchain technology for securing data in the cloud. Investigate the potential benefits and drawbacks of using blockchain for data storage and sharing, and make recommendations for when it would be appropriate to use.
  7. Investigate the use of machine learning and artificial intelligence in cloud security. Research the benefits and drawbacks of using these technologies for intrusion detection, threat detection, and incident response.
  8. Create a security policy for a cloud-based infrastructure. This should include guidelines for user authentication and access control, incident response procedures, and acceptable use policies.
  9. Investigate the use of zero-trust architecture in cloud security. Research the benefits and drawbacks of using a zero-trust approach, and make recommendations for when it would be appropriate to use.
  10. Research the use of network segmentation in cloud security. Investigate the benefits and drawbacks of using network segmentation, and make recommendations for when it would be appropriate to use in a cloud-based infrastructure.

Quiz

100 multiple choice questions (60% to pass the exam). Contact Alex Carrega (alessandro.carrega@unige.it) to get the link to the quiz.

About

PhD STIET Cyber security approaches for Cloud/Edge Environments

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published