IT Security Access Control Permissions Permissions are needed to give users specific acess to data and resources that are need for their job role define type of access Read-only access Modify access Delete access Principle of Least Privilege Grant only the minimal privileges needed to a user Start with a minimum set of permissions, and grant additional permissions as necessary Identity and Acces..
CS/클라우드컴퓨팅
AWS Well-Architected Framework Cloud Operation Cloud Operation 클라우드 환경에서 IT 자원을 효율적으로 관리하고 운영하기 위한 일련의 활동 With AWS, customers can enable provision and operate their environment for both business agility and governance control Benefits of AWS Cloud Operations Innovation Scale Simplicity Cost savings AWS Well-Architected Framework Well-Architected (WA) Framework AWS에서 제공하는 클라우드 아키텍처 디자인에 관한 모범 사례 ..
Introduction to Database Flat File Approach Store database as CSV files use a separate file per entity, application must parse the files Challenges Data integrity implementation Durability Basic of Database Databases give access to the data while keeping the integrity of the data in a secure environment. Data Model logical structure of database data model is influenced by the structure of data D..
Basic of Networking What is Networking? Computer network is two or more devices that are connected together to share resources. Node: devices on the network Host node: servers Client: node that depends on the host node Network require network connecting devices (ex. router, switch) to connect all devices together. Network Components Server physical computer that runs software services that other..
Basic Steps to create and Configure a bucket Create a Bucket 1. Give the bucket a name The name must be globally unique Bucket name include: 3-63 characters, lowercase letters, numbers, dots(.), hyphens(-) Bucket name must begin and end with a letter or number conbination of a bucket name, key, version ID uniquely identifies the object https://bucket-name.s3.amazonaws.com/folder-name/filename.zi..
Introduction to Cloud Storage On Premises storage: Data are shared through your local network Cloud storage: Data are shared through the internet -> outside service provider like AWS hosts your data Benefits of Cloud Storage Cost efficient: no huge up-front fee Secure: data is saved across multiple servers Accessible: multiple users can access Scalable Managed: cloud service provider manages the..
Lanching options AWS Management Console AWS Command Line Interface (CLI) AWS Software Development Kit (SDK) Other AWS services: AWS CloudFormation, AWS OpsWorks, AWS Elastic Beanstalk Amazon EC2 Lifecycle States Pending - Not billed preparing to enter the running state when it launching for the first time or when it starting after being in the stopped state. Running - Billed running and ready fo..
7 Steps to launching an EC2 Instance 1. Instance name and tags Tag Tag is a label that you can assign to an AWS resource key - value(optional), Name of the instance is the default tag tag limit per EC2 resource is 50 tags can search resources by key or by value or by combination of keys and values Benefits of Using Tags Resource organization: search & filter by tag, create groups of resources Co..
Lec 04-1: Intro to Amazon EC2 Intro to Computing Computing is the brain that makes IT application work. It collects, analyzes, processes, distributes data Main Components of Computing CPU runs and processes the instructions that it is given = makes the calculation possible RAM store data, temporary storage, main memory (DRAM) Hard drive long-term storage, stores the boot files and files that you..
Lec 03: Cloud Platforms, AWS Intro Cloud platforms Software as a Service (SaaS) CSP(Cloud Service Provider) provides an entire application Customer don't need to install and run the app on their computer CSP manages everything ex) Google Docs, Gmail Platform as a Service (PaaS) CSP exposes a set of tools (a platform) which allow users to create SaaS applications SaaS application runs on CSP's in..