Question 1: In January 2004, an IT security association of companies, vendors, government groups, and academics “dedicated to advancing secure business in a global open-network environment†formed the Jericho Forum (www.jerichoforum.org), under the auspices of The Open Group. Originally created to address network deperimeterization (the erosion of the network perimeter), in April 2009, the forum published the Jericho Cloud Cube Model version 1.0. The model is intended to describe key characteristics, benefits and risks of different cloud formations. The Jericho Cloud Cube Model describes the model for cloud computing as having four “dimensions.â€
Please show the Jericho Cube graphic representation, list the dimensions and provide explanations of the characteristics of each. In addition, in terms of the cube dimensions, in what area of the cube would it be ideal to operate with optimum flexibility and collaboration from the customer perspective?
Question 2: It might appear that all activities related to the secure management of a hypervisor and its hardware host—collectively called the hypervisor platform—should simply consist of established best practices for any server class software and its hosting environment. However, closer examination reveals that the unique functions provided by the Hypervisor Platform require a dedicated set of security considerations. These functions are called hypervisor baseline functions. According to NIST SP 800-125A , SECURITY RECOMMENDATIONS FOR HYPERVISOR DEPLOYMENT ON SERVERS, please list these baseline functions and provide a description of each in your own words.