Posts

Week 10 - Blog Wrap-Up

Now that this blogging assignment is wrapped up, I can say it wasn’t really something I enjoyed. I gave it a shot, but writing blog posts just doesn’t click with me. It felt more like checking a box than something I was excited to do. In terms of my job, blogging hasn’t been helpful and probably won’t be in the future either. The skills I use at work are pretty different, so I didn’t see much overlap with this assignment. I don’t see myself blogging unless it’s for another class or if it’s required for something. It’s not something I’d do for fun or by choice. I know blogging can be useful in some fields, but it’s not something I’m likely to use personally. That said, I do get why companies might value someone who can blog well. It’s another skill to have in your toolbox, but for me, it’s not one I plan on using unless I have to.

Week 9 - Recovery Planning

Disaster recovery is about making sure your business can keep running or quickly recover after something goes wrong, like a power outage, cyberattack, or natural disaster. Two important things to know are how fast you need to recover (RTO) and how much data you can afford to lose (RPO). These help you decide how to plan your recovery. Google Cloud makes disaster recovery easier with its global network, strong security, and tools that help you backup and restore data quickly. Because everything is in the cloud, it’s often cheaper and faster than using your own hardware. To get started, it’s important to figure out which parts of your system are most important and how fast they need to be back online. You also need to decide who will do what during an emergency and make sure they have the right access to your backup systems. Security matters too. Your backup system should have the same protections as your main system. That includes setting user permissions and keeping logs of what hap...

Week 8 - Relational Database

A relational database is a system used to store and organize information in a structured way. Instead of keeping everything in one long file, it separates information into tables. These tables work a lot like spreadsheets, with columns that describe the type of data, such as a name or a date, and rows that contain the actual data. What makes relational databases special is that the tables can be connected, or related, to each other. For example, one table might hold customer information, while another stores their orders, and the database links those pieces together. This approach was first introduced in 1970 by E. F. Codd, a researcher at IBM. Before that, information was often kept in flat files, which made it hard to find specific details or make connections between different pieces of data. Codd’s idea completely changed how businesses manage large amounts of information. To interact with a relational database, people use a language called SQL, or Structured Query Language. It al...

Week 7 - Access Control

Access control is how organizations decide who can see or use certain information, tools, or areas. It’s a key part of keeping data and systems safe. There are several models used to manage access, and each works a little differently depending on what a company needs. The first type is Discretionary Access Control (DAC) . This model gives control to the person who owns the information or file. That person decides who else can access it. DAC is easy to use and flexible, but it can be risky if users make mistakes or don’t manage access carefully. Mandatory Access Control (MAC) is much stricter. In this model, only a system administrator can decide who gets access. Users can’t make changes on their own. MAC is often used in high-security places like government offices because it keeps control tight and consistent. Role-Based Access Control (RBAC) is common in businesses. People are given access based on their job role. For example, a manager might have access to more tools than a reg...

Week 6 - Cloud Security

Cloud security is an important part of protecting data and systems that are stored and used in the cloud. As more businesses move to cloud platforms to store files, run applications, and manage operations, it’s critical to understand how cloud security works and why it matters. Unlike traditional IT security, which focuses on physical servers and devices, cloud security is designed to protect data that is stored across multiple locations and accessed through the internet. Cloud environments are common targets for cyberattacks, data breaches, and unauthorized access. Without strong cloud security, businesses risk losing sensitive information, damaging their reputation, and even facing legal issues. That’s why cloud security uses a combination of tools and practices to keep information safe. Some key parts of cloud security include identity and access management, which controls who can access data; encryption, which scrambles data so it can’t be read without permission; and regular moni...

Week 5 - Can the Cloud Keep Up

The Internet of Things (IoT) is exploding, connecting everything from smart home devices to industrial machines. This rapid growth creates huge amounts of data that need to be processed, stored, and managed efficiently. Many experts believe the cloud will play a key role in handling this flood of information. Cloud computing offers flexible resources and scalable infrastructure that can adjust to the growing number of IoT devices. However, there are challenges to overcome. For example, IoT devices often generate real-time data that needs quick processing, which can be difficult when relying on distant cloud servers. This has led to the rise of “edge computing,” where data is processed closer to the devices themselves to reduce delays. Security and privacy are also major concerns. As more devices connect to the cloud, protecting data from cyberattacks becomes critical. The cloud must evolve to offer stronger security measures to keep IoT data safe. In the future, a combination of clo...

Week 4 - Amazon VPC

Amazon Virtual Private Cloud (Amazon VPC) is a service from AWS that lets you create your own private network in the cloud. It works like a traditional data center but gives you the flexibility and scalability of the cloud. With a VPC, you can set up parts of your network called subnets, choose your own IP address ranges, and control how data moves in and out using route tables and gateways. For example, an internet gateway lets your resources connect to the internet, while a VPC endpoint lets you privately connect to AWS services without going through the internet. Every AWS account comes with a default VPC so you can start quickly, but you can also create your own custom VPC with settings that meet your specific needs. You can connect your VPC to other networks, like other VPCs or even your company’s on-premises network, using features like VPC peering, VPNs, or transit gateways. AWS also offers tools like traffic mirroring to help you monitor network activity and VPC flow logs to t...