Monday, February 2, 2026

Week 7

 




Role of authentication in access control



Authentication is basically the “ID check” part of access control. Before a system decides what you’re allowed to do, it needs to make sure you are who you say you are.

Think of it like this: when you enter a building, the security guard asks for your ID. That’s authentication. Once they know it’s really you, they check what rooms you’re allowed to go into — that’s access control.

In computers and networks, authentication can be:

Passwords or PINs – something you know

Biometrics – something you are (like a fingerprint or face scan)

Tokens or smart cards – something you have

Without authentication, access control can’t work properly, because the system wouldn’t know which permissions to give you.

Week 6





Cloud Security Tips to Reduce Risks, Threats, and Vulnerabilities



    One of the best ways to reduce cloud security risks is by using strong identity and access management. This means using multi-factor authentication, strong passwords, and only giving users access to what they actually need. Doing this helps prevent unauthorized access and lowers the chances of accounts being compromised.

    Another important step is avoiding misconfigurations, which are one of the most common causes of cloud security issues. Regularly reviewing cloud settings, keeping systems updated, and using security tools to scan for mistakes can help catch problems early. This makes it easier to fix issues before they turn into serious risks.

    Protecting data is also a big part of cloud security. Sensitive data should always be encrypted, and tools like data loss prevention (DLP) can help stop accidental data sharing. On top of that, continuous monitoring and user security training help organizations stay aware of threats and reduce human error over time.

Thursday, January 22, 2026

Week 5

  


   

 Difference between cloud computing and colocation



The biggest difference between cloud computing and colocation is who owns and manages the hardware. With cloud computing, you use servers and storage that belong to a cloud provider like AWS or Azure. They handle the physical data center, hardware, power, cooling, and most of the infrastructure work for you. This makes cloud computing very flexible because you can scale resources up or down easily and only pay for what you need, which is great for businesses that want convenience and fast setup.

With colocation, you own the servers yourself but keep them in a third-party data center. The colocation provider gives you the space, power, cooling, and network connection, but you’re responsible for maintaining and managing the hardware. This option gives you more control over your systems, which can be important for organizations with specific performance or compliance requirements. In short, cloud computing is about flexibility and ease of use, while colocation is about control and ownership

Thursday, January 15, 2026

Week 4

 

The OSI and TCP/IP models are both used to explain how data moves across a network, and they share the same overall goal: making communication between systems work smoothly. A big similarity is that both models use a layered approach, meaning each layer has a specific job, and both help with troubleshooting and understanding how networks function. They also both include comparable functions like routing, data transmission, and application-level communication, even if they organize them differently.

The main difference is how detailed they are. The OSI model has seven layers, which makes it more detailed and useful for learning, teaching, and troubleshooting specific network issues. In contrast, the TCP/IP model has only four layers, which combine several OSI layers together. Another key difference is usage: OSI is more of a theoretical model, while TCP/IP is a practical model that’s actually used on the internet today. Also, the OSI model clearly separates services like presentation and session layers, while TCP/IP groups those functions into the application layer, making it simpler but less granular.






Thursday, December 18, 2025

Week 3

 


Five Stages of Migration


Migration in IT usually happens in five main stages:

PlanningFigure out what needs to be moved, why, and how. Set goals, check risks, and create a roadmap to make sure the migration goes smoothly.


AssessmentTake a close look at your current systems, data, and apps. Identify any dependencies or problems that could slow things down.


DesignPlan the actual migration process. Decide on tools, steps, timelines, and backups. Think of it like mapping out the journey before you start.


Migration/ExecutionMove the data, apps, or systems to the new environment. Usually done in phases to avoid downtime or errors.


Validation/Post-MigrationTest everything after the move. Make sure data is correct, apps work, and users can access what they need. Fix any issues before finishing.


The five stages - Planning, Assessment, Design, Migration, and Validation, help make migrations smooth, reduce risks, and ensure everything runs properly in the new system.

Saturday, December 13, 2025

Week 2

    



VIRTUALIZATION


Virtualization plays a big role in today’s technology because it makes using computers more efficient and flexible. Instead of needing a separate physical computer for every task, virtualization allows one computer to run multiple virtual machines at the same time. This helps save money, space, and energy since fewer physical machines are needed. It also makes managing systems easier because everything can be controlled and updated from one main system. Virtualization is helpful for testing and learning because you can try new software or settings without risking damage to the main computer. If something goes wrong, it usually stays within that virtual machine. In general, virtualization helps businesses and schools work smarter by improving performance, organization, and reliability in IT environments.



Thursday, December 4, 2025

Week 1 Posting - First Entry

 


Starting My IT and Cloud Computing Journey


Hi everyone! My name is Maria, and I’m excited to start this blog as I begin learning about IT and Cloud Computing. I’m new to this field, so I don’t have much hands-on experience yet, but I’m eager to learn and grow over the course of this class. Cloud Computing is something I’ve heard a lot about, especially how it helps businesses store data, improve efficiency, and support flexible work environments. Through this course, I hope to understand the basics, like cloud types, services, and how organizations use them. I also want to learn about the challenges involved and ways to solve them. I’m looking forward to sharing my progress, reflecting on what I’m learning, and connecting with others who are exploring IT and cloud computing.



Week 7

  Role of authentication in access control Authentication is basically the “ID check” part of access control. Before a system decides what ...