Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1a) What are some security concerns with Virtualized Networks? =================================================================== Virtualization is the type of technology that should be adopted with purpose. Depending on the

1a) What are some security concerns with Virtualized Networks?

===================================================================

Virtualization is the type of technology that should be adopted with purpose. Depending on the company, different goals may include anything from reducing capital investments in hardware to increasing the efficiency of existing existing IT systmes.

Network Virtualization can improve security in several ways.

i)Centralizing Confidential Data

ii)Providing Secure Access

iii)Setting Up Sendbox

Virtualization Security Challenges:

======================================

i)Virtualization does a lot to security,but simply using it can introduce all new security risks.

ii)Security threats can evade existing security mechanisms and wreak havoc across the targeted host.

iii)If precautions are not taken DOS attacks to data breaches may compromise vital production aspects within,and possibly outside the virtual environment.

Risks:

========

Specific risks will vary depending on a number of factors

i) Allow Virtual Machines to access the internet

ii) Allow Virtual Machines to access other networked computers and devices.

iii) More Virtual Machines between physical host machines.

1b) Do you feel that a virtualized network is secure enough to host identity information?

==============================================================================================

Yes,Virtualized network is secure enough to host identity information because every host has his personal information.Then we have to protect ourselves.If information is not secure then we will face more problems.This network can keep this in more secure.

Deploying Virtualization in infrastructure provides many benefits,but also it can introduce new risks. Virtualized resources and services should be developed with following security considerations.

i) The host and hypervisor become prime targets. They are often a single point of failure for guests and data.

ii) Virtual Machines can interfere with each other in undesirable ways.

iii) Resources and services can become difficult to track and maintain with rapid deployment of virtualized systems comes an increased need for management of resources,monitoring and maintenance.

iv) Resources such as storage can be spread across and dependent upon several machines.

v) This can lead to overly complex environments and poorly managed and maintained systems.

vi) Virtualization does not remove any of the traditional security risks present in your environment; the entire solution stack, not just the virtualization layer, must be secured.

image text in transcribedimage text in transcribedimage text in transcribedimage text in transcribed
Consider the following multiple regression model: y = Bo + B1X, + ...+ PKXk + U. Which of the following statements is correct? a Under Assumptions MLR.1 through MLR.4, OLS is unbiased. Under Assumptions MLR.1 through MLR.5, OLS estimators 's are the best linear unbiased Ob. estimator (BLUE) of Bj's: this is the Gauss-Markov Theorem. Oc. Assumptions MLR.1 through MLR.5 are known as the Gauss-Markov assumptions (for cross- sectional analysis). Od. All of the above.ECON20110/ECON30370 1. Consider the regression model: y = Xf u (a) State the Gauss-Markov assumptions required to show that the Ordinary Least Squares estimator of the coefficients is the Best Linear Unbiased Estimator (BLUE) [5 marks] [b) Prove that the OLS estimator is unbiased if the Gauss-Markov assumptions hold Show relevant steps and assumptions [10 marks] (c) Show that the variance covariance matrix of the OLS estimator is Var (8 X) -6-(XX) [5 marks]1. Fill in the details for the proof of the Cauchy-Schweitz inequality for random variables EXY 5 VIEXZEYZ. 2. Show that the \"main" theorem on Galton-Watson processes cannot be extended to cases where the offspring disnibution changes over time. That is, give random variables Xle , . .. each of mean EX,- 2 2 but such that if individuals in generation I each have a number of children EX} (independently of one another} then PtUdZ: =0})=1. 3. Show that, for every tr > 1 and I] 1. Let T denote the correSponding Gabon-Watson tree. and let '1\" denote (the distribution of] T conditioned on extinction. Show that T' is distributed like a Salton-Watson tree with offspring distribution X\" d:P0l:q.u} where q is the extintion probability of T. In a Galton-Watson branching process starting with a single individual in generating zero, the offspring distribution is Binomial B(5, 1/4). (a) The mean and variance of the number of individuals in the second generation are respectively 5/4, 15/16 25/16, 15/8 25/16, 675/256 5/2, 675/256 (b) To fourdecimal places, the probabilities that the process becomes extinct by the second generation and extinct at the third generation are respectively 0.1099, 0.0631 0.3472, 0.0631 0.1099, 0.4103 0.3472, 0.4103 (c) To fourdecimal places the probability that the process eventually becomes extinctis 0.4776 0.5527 1

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Intermediate Algebra A Text/Workbook

Authors: Charles P McKeague

2nd Edition

1483214176, 9781483214177

More Books

Students also viewed these Mathematics questions

Question

Brief the importance of span of control and its concepts.

Answered: 1 week ago

Question

What is meant by decentralisation?

Answered: 1 week ago