Students develop an understanding of the technology used to distribute information in support of eBusiness and the security concerns inherent in an open access environment. The instruction surveys the technologies enabling the migration of computing applications, communications, and information to the cloud environment. The instruction also surveys the technologies that facilitated backend integration and front-end deployment. Many of these technologies are still in use today. Coursework reviews the information assurance challenges and popular solutions of cloud computing. Communications concepts such as TCP/IP, ISP delivery channels, and wireless technology are discussed in detail. Performance and security issues relative to each technology introduced in this course are discussed.
- Students will grasp the fundamentals of internet technology by way of an extensive review in class.
- Students will understand the security strengths and weaknesses of legacy open access technologies, including: XML, CORBA, DCOM, JavaBeans, HTML and Java.
- Students will know the advantages of applying cloud technology to computing applications, communications and information storage.
- Students will be able to articulate a migration strategy from legacy open access technologies to the cloud technology.
- Students will apply defense-in-depth techniques to achieve information assurance in the cloud computing environment.