CC Unit 4
CC Unit 4
Any software, application, or cloud technology that uses standardized web protocols (HTTP or
HTTPS) to connect, interoperate, and exchange data messages – commonly XML (Extensible
Markup Language) – across the internet is considered a web service. Web services have the
advantage of allowing programs developed in different languages to connect with one another by
exchanging data over a web service between clients and servers. A client invokes a web service by
submitting an XML request, which the service responds with an XML response.
Microsoft Azure:
Azure is Microsoft’s cloud platform, just like Google has its Google Cloud and Amazon has
its Amazon Web Service or AWS.000. Generally, it is a platform through which we can use
Microsoft’s resources. For example, to set up a huge server, we will require huge investment, effort,
physical space, and so on. In such situations, Microsoft Azure comes to our rescue. It will provide us
with virtual machines, fast processing of data, analytical and monitoring tools, and so on to make our
work simpler. The pricing of Azure is also simpler and cost-effective. Popularly termed as “Pay As
You Go”, which means how much you use, pay only for that.
Azure History:
Microsoft unveiled Windows Azure in early October 2008 but it went to live after February 2010.
Later in 2014, Microsoft changed its name from Windows Azure to Microsoft Azure. Azure provided
a service platform for .NET services, SQL Services, and many Live Services. Many people were still
very skeptical about “the cloud”. As an industry, we were entering a brave new world with many
possibilities. Microsoft Azure is getting bigger and better in the coming days. More tools and more
functionalities are getting added. It has two releases as of now. It’s a famous version of Microsoft
Azure v1 and later Microsoft Azure v2. Microsoft Azure v1 was more JSON script-driven than the
new version v2, which has interactive UI for simplification and easy learning. Microsoft Azure v2 is
still in the preview version.
Features in Preview
In a later iteration of the app engine, these functions will undoubtedly be made broadly
accessible. However, because they are in the preview, their implementation may change in ways that
are backward-incompatible. Sockets, MapReduce, and the Google Cloud Storage Client Library are a
few of them.
Experimental Features
These might or might not be made broadly accessible in the next app engine updates. They
might be changed in ways that are irreconcilable with the past. The “trusted tester” features,
however, are only accessible to a limited user base and require registration in order to utilize them.
The experimental features include Prospective Search, Page Speed, OpenID,
Restore/Backup/Datastore Admin, Task Queue Tagging, MapReduce, and Task Queue REST API.
App metrics analytics, datastore admin/backup/restore, task queue tagging, MapReduce, task queue
REST API, OAuth, prospective search, OpenID, and Page Speed are some of the experimental
features.
Third-Party Services
As Google provides documentation and helper libraries to expand the capabilities of the app
engine platform, your app can perform tasks that are not built into the core product you are familiar
with as app engine. To do this, Google collaborates with other organizations. Along with the helper
libraries, the partners frequently provide exclusive deals to app engine users.
1. Secure your information: This means managing who has access and encrypting your data. Only people who need it
to perform essential functions should have access, and information should be encrypted as it goes back and forth
between the database and their computer or device.
2. Prepare ahead of time for threats: You can get ready for a potential data security incident by testing your system,
educating employees, devising an incident management plan, and creating a data recovery plan.
3. Delete data you are not using: You should get rid of both digital and physical copies of data you no longer need. In
this way, you reduce the chances of a hacker discovering it and using it for profit.
Types of Data Security
Organizations can use a wide range of data security types to safeguard their data, devices, networks,
systems, and users. Some of the most common types of data security, which organizations should look to combine to
ensure they have the best possible strategy, include:
1.Encryption
Data encryption is the use of algorithms to scramble data and hide its true meaning. Encrypting data ensures
messages can only be read by recipients with the appropriate decryption key. This is crucial, especially in the event
of a data breach, because even if an attacker manages to gain access to the data, they will not be able to read it
without the decryption key.
Data encryption also involves the use of solutions like tokenization, which protects data as it moves through an
organization’s entire IT infrastructure.
2.Data Erasure
There will be occasions in which organizations no longer require data and need it permanently removed
from their systems. Data erasure is an effective data security management technique that removes liability and the
chance of a data breach occurring.
3.Data Masking
Data masking enables an organization to hide data by obscuring and replacing specific letters or numbers.
This process is a form of encryption that renders the data useless should a hacker intercept it. The original message
can only be uncovered by someone who has the code to decrypt or replace the masked characters.
4.Data Resiliency
Organizations can mitigate the risk of accidental destruction or loss of data by creating backups or copies of
their data. Data backups are vital to protecting information and ensuring it is always available. This is particularly
important during a data breach or ransomware attack, ensuring the organization can restore a previous backup.