Tuesday, December 31, 2019

The Theme Of Good And Evil In Bless Me By Rudolfima Anaya

There are a lot of good in the world, but there may also be a lot of evil that exists. This story written by Rudolfo Anaya discusses about a young man and an elderly lady attempting to end the battle amongst good and evil that is happening through their town during World War II. In the novel Bless Me, Ultima Anaya uses characters to explore the true meanings of good and evil by comparing those that believe and those who don’t believe, death of Lupito and Narciso, and including characters that are both good and bad. It can be seen in the novel that Anaya uses animals as a way to symbolize good and evil. He uses an owl to represent Ultima, and to portray as a good character. Many people believe that Ultima is truly a bruja simply based†¦show more content†¦Lucas enters the forest where he sees the Trementina sisters dancing as fireballs and casting evil spells. This shows that the Trementina sisters and Tenorio are the truly the ones that are evil. Besides all the good and evil mentioned in this novel Antonio learns about all this with the guidance of Ultima leading him through it. Another example of Antonios sense of development in good and evil is his home. It is means a lot to Antonio, because the people living in it makes him feel protected and provide warmth to him. When Tenorio and his men came to his house to take Ultima away, Antonio’s father You walk on my land! That is my business (Anaya 130). This make Antonio feel that he would be protected by the presence of his father., Gabriel. However, Antonios mother made home very fond and ardent for him. She had always been affectionate towards him and would show him care. Most importantly, Ultima was the one who contributed to the goodness of Antonios home. She made Antonio feel as though her presence filled the home with love and safety. It was Ultima who calmed Antonio down after he had seen Lupito die. Whenever he had a nightmare, Ultima would always be right beside to comfort Ant onio and could sleep again (Anaya 34). Ultimas fearlessness against Tenorio and his three daughters made Antonio feel that he would be safe wherever Ultima was. Overall, the

Monday, December 23, 2019

The s Equations Of The Universe - 1401 Words

Isaac Newton, famous for his equations of the forces of the universe, has been put to the test by Einstein himself. Although Newton has found the numbers and equations to describe gravity and the way nature is, he has not figured out how it really works. Einstein noticed this, and learned that space, gravity, and time work together like a Spiral Wishing Well. He says that space is flat with no matter, but when there is matter, like the earth, the fabric of space warps and curves. One must imagine the hole of the Spiral Wishing Well as the earth and the penny rotating around it is like the moon to see how space warps and how the medium that affects gravity is space itself. With this in mind, many other theorists and physicists began†¦show more content†¦After this discovery, many started to ask where are these other dimensions? A man named Oskar Klein found a way to answer this question in 1926. He stated the dimensions come in two different kinds. One is the dimension s we see with our own eyes, and the others are tiny, minuscule curled up dimensions that we cannot see. This idea reveals that deeply tucked in the fabric of space itself, there could be other dimensions. In result, the theory called the Superstring theory was discovered. Superstring theory tries to describe the basic and fundamental components that make up everything in the world around us. The idea can be described by looking at an object such as a pencil and trying to find out what its made of. When one looks deeply, there are atoms, and then electrons and protons, and then finally quarks. This is where conventional ideals stop. However, due to Superstring theory, there are actually more past quarks. Deep inside these particles, there is a dancing thread of energy. It looks like a vibrating string on a guitar and can also vibrate in different patterns just like guitar strings do. They do not make musical notes, instead, they produce the different particles making up the world around us. If these ideals are right, this is what the tiny, microscopic landscape of the universe looks like. It is made up of a large amount of minuscule fibers of vibrating energy that vibrate in various frequencies. TheseShow MoreRelatedScientific View of Creation and the Big Bang Essay1449 Words   |  6 Pagesby most scientists as the explanation of the beginning of the universe. The big bang theory suggests that the universe was once extremely compact, dense, and hot. Some uncommon event, a cosmic explosion called the big bang, occurred about 10 billion to 20 billion years ago, and the universe has since been expanding and cooling. The theory is based on mathematical equations, known as the field equations. These equations come from the general theory of relativity, established in 1915Read MoreThes Equations Of The Universe1749 Words   |  7 PagesIsaac Newton, famous for his equations of the forces of the universe, has been put to the test by Einstein himself. Although Newton has found the numbers and equations to describe gravity and the way nature is, he has not figured out how it really works. Einstein noticed this, and learned that space, gravity, and time work together like a Spiral Wishing Well. He says that space is flat with no matter, but when there is matter, like the earth, the fabric of space warps and curves. One must imagineRead MoreThe Objectivity Of The Enlightenment1156 Words   |  5 Pagesthrough Thomasina’s equation. â€Å"Each week I plot your equations dot for dot, x’s against y’s in all manner of algebraical relation, and every week they draw themselves as commonplace geometry, as if the world of forms were nothing but arcs and angles. God s truth, Septimus, if there is an equation for a curve like a bell, there must be an equation for one like a bluebell, and if a bluebell, why not a rose?†(Stoppard, 37). Thomasina’s ultimate goal is not to find a mathematical equation that expressesRead MoreThe Ontological Argument Made By Anselm1365 Words   |  6 PagesThe ontological argument made by Anselm was criticized by one of his contemporaries, a monk named Gaunilo, who said, that by Anselm s reasoning, one could imagine a certain island, more perfect than any other island, tf this island can exist in the mind, then according to Anselm, it would necessarily exist in reality, for a perfect island would have this quality. But this is obviously false; we cannot make things exist merely by imagining them. Anselm replied, upholding his argument by sayingRead MoreScience Fiction : Extraterrestrial Life1601 Words   |  7 Pagesreal world. They all have varying ideas of what we expect from extraterrestrial life, how we would interact with aliens, and what kind of technology it would require to find them or what they would have. The idea of other intelligent life in the universe is not a s farfetched as some people think it is. Scientists have been searching habitable planets for years using advanced telescopes to observe planets outside of our solar system. Planets can be found by observing if a star â€Å"wobbles† (Fuller-Wright)Read MoreBill Bryson Reading Assignment Essay1405 Words   |  6 Pages What do astronomers think the universe was like the instant before the Big Bang? Astronomers believe the whole universe started with that we re shrunk to a billionth of its normal size into a place infinitesimally tiny. Then you must pack that minuscule space about an ounce of matter. Then you are ready to start the universe. To imagine this you need to gatherRead More Albert Einstein Essay829 Words   |  4 Pagesexplanation of the photoelectric effect quot;and other contributionsquot;; however, the announcement of the award was not made until a year later, in 1922. His theoretical work suggested the possibility of creating an atomic bomb. His discovered equation, E=MC2 is well known as one that changed the world. Einstien was born March 14, 1879 at Ulm in Wberg, Germany. He grew up in Munich and later in Italy, and received his higher education in Switzerland. At age 17 he renounced his German citizenshipRead MoreDepression And Its Effects On Depression1325 Words   |  6 PagesSo the whole thing is about depression, and about how to overcome it. There is a secondary story running throughout about how DC comics works and Morrison s critique of that but it also serves the depression metaphor. So the whole thing starts with a dead god. That s pretty heavy, and it is a dead god of war at that. Must mean that war is won - and the good guys lost. So he wasn t killed with a regular bullet - he was killed with a bullet from the future (and as we learn later) an idealized protoRead MoreThe Big Bang Theory Essay1208 Words   |  5 Pagesalso somewhat misunderstood. One on these misconceptions is that it explains the universes origin, a statement that is not quite true. The Big Bang Theory is an attempt in explaining how the universe has been developed, not what initiated such a creation. (Strickland, 2008) The basics of the theory can be explained with reasonable simplicity, in that essentially, all of the current and past substance in the universe came into existence at the same time. At one point about fifteen billion years agoRead MoreThe Genius Of Sir Isaac Newton1687 Words   |  7 Pagesonce said â€Å"If I have done the public any service, it is due to my patient thought†. Isaac Newton transformed the way people saw the universe in the 1600’s because of his law of universal gravitation, his laws of motion, and other discoveries and inventions. Isaac Newton s law of universal gravitation and planetary motion shed light on the clockwork of the universe. Newton’s discoveries about gravity all began while he was sitting under an apple tree. one of the apples fell from the tree making

Sunday, December 15, 2019

Nora’s Individualism Free Essays

Nora’s Individualism Women in the 19th century live in the shadows of men. They don’t have occupations. Their gender role was to cook, clean, shop for the household, and to care for the children. We will write a custom essay sample on Nora’s Individualism or any similar topic only for you Order Now They were expected to find a suitor; this man would take care of the family financially. Women were submissive to their husbands back then. They didn’t stand up for their rights or voice their opinions. Women catered to their husbands. Nora is submissive to Torvalds’s needs. The play is about Nora’s behavior to her husband. She submits to him and is a mother to their children. She is unhappy as a caretaker. She over enthusiastic personality throughout the play seems forced. She feels she has no purpose in life, being a mother or housewife isn’t fulfilling her needs. She lacks being a mother the nannies constantly look after the children. She is searching for her true self subconsciously in the beginning of the play. Due to her upbringing, Nora has been raised to live under a man, to be submissive to them. Nora doesn’t know any other way than being an oppressed woman. The way Nora grew up influences her behavior now as an adult. She grew up wealthy, her father took care of her, and then she married Helmer at any early age. Nora says to Torvald † When I lived at home with Papa, he gave me his opinion about everything, she had the same opinions and if I didn’t I keep my mouth shut he wouldn’t have liked it. And then I came to live in your house. I was Just passed from Papa’s hands to yours. You arranged everything according to your own taste, and I choose the same tastes as you. Or else I pretended to† (Ibsen 1167). Nora was raised by her father to live under a man. She transitioned from living with her father and now to her husband, Torvald. Through this realization she isn’t content with her well-being. Nora appears to be happy on the outside, she is not deep inside. Her personality is over exaggerated to all. It’s apparent that it is ungenuine. She is quite giddy about small things, such as showing Torvald the items she bought. Nora says, â€Å"But come here and let me show you what I bought. And all so cheap! Look a new suit for Ivar, and a sword, a horse and a trumpet for Bob, and a doll and a doll’s bed for Emily’ (Ibsen 1122). She doesn’t ave anything exciting going on in her life, she has to focus on something no matter how minute it is. The only excitement she has is hiding the secret from Torvald. Which isn’t excitement at all, she fears he will find out about it. That’s why Nora keeps up her charade of shopping for her children and the household. That’s what she use to do before borrowing the money. This loan has given her purpose; she has to find ways to pay it back. She has done side Jobs and started being more frugal about her money she gets from her husband. Through this experience she realizes she is nhappy in her marriage. Her husband’s expectations of her are too high with a lack of love and care for one another on an intimate level. She has to live up to her husband’s standards of being a trophy wife. Nora is not satisfied with knowing that Torvald Just cares about the outward appearance ot ner and the tamily, and not the love they should share with each other. Torvald wants to have the appearance to others they are well put together. He focuses on small things like Nora dancing the Tarantella. It must be perfection in his eyes, he wouldn’t settle for anything less. He makes her practice it numerous times and gets quickly frustrated with her when she doesn’t perform the moves correctly. He should focus on her feelings, not worrying about his wife’s outward appearance. Torvalds’s narcissism makes it difficult for Nora to be happy in their marriage. She likes materialistic things but cares about her marriage more. She forged her signature on a formal document for a loan to travel to Italy to save her husband’s life when he was ill. She shows her love to him by getting this loan in secret and by taking care of their children. What has Torvald done lovingly for Nora? That is the issue; he hasn’t done anything loving or romantic for her. Women need their love shown by spending quality time together, not by getting money to buy gifts. Torvald see’s providing for his wife as sustainable to keep their relationship going. Women like to hear that men love them and to be shown that they are loved through actions. Nora is unhappy with Torvalds’s behavior. Their marriage is for show and spurious in Nora’s perspective, she is unhappy. She feels there is no substance or closeness there. They don’t share intimate details with one another. Torvald is always concerned about work, while Nora is looking after the children or preparing for an event they will attend in the near future. Torvald isn’t aware of Nora’s unhappiness in the most of the play because Nora masks her feelings. She expresses herself when she can’t hold her feelings in about their lack of a marriage anymore. Nora realizes that nothing is going to change in her life and she won’t settle for less. Nora has gone on for eight years doing what Torvald expects of her. She is willing to makes a change for her happiness. Nora begins to tell Torvald that their relationship lacks a good solid foundation based on trust and concern for one another mutually. Nora says you have never understood me. IVe been treated badly, first by Papa and now by you (Ibsen 1167). She has a husband who she hardly knows and won’t accept it. She no longer has the interest in being a wife or a mother. She decides to leave it all to figure herself out. Nora tells Torvald, Duties to myself. I believe that first and foremost I’m a human being, Just as you are, or at least I have to try to become one. I can’t be satisfied with what most people say or with what’s in books. I have to think things through for myself and come to understand them (Ibsen 1168). Nora has decided to leave her old life to discover a new one. She is willing to sacrifice her children for her happiness. What is more realistic? For a woman to have children and be in an unhappy marriage or abandon her children and pursue her desires? Nora pursues herself she no longer has interest in taking care of others. Nora leaving her husband in the 1800’s is unheard of. Women didn’t venture from their roles as a wife and a mother. Ibsen’s play got negative attention, being that his main character did the unthinkable at the end of the play; leave her family for her goals. The play leads the audience to believe she doesn’t need her husband anymore. That she is strong and will discover her needs and aspirations. Nora has gone through a transformation of being an oppressed women to now caring about herself. She has had to make a drastic change to start a new Journey to meet her new goals. I’m proud of Nora for standing up for herself. She went against the grain of all women and explor ed her dreams. How to cite Nora’s Individualism, Papers

Saturday, December 7, 2019

Transactions Parallel Distributed Systems †Myassignmenthelp.Com

Question: Discuss About The Transactions Parallel Distributed Systems? Answer: Introduction Webbs Stores that operates in Australia and New Zealand has decided to integrate cloud computing in their daily operations. In order to do so, they are planning to close their Auckland data center and the existing data center would be moved to cloud (Li et al., 2015). The report discusses the risks and security issues associated with a hybrid cloud approach. The different risks and associated with backing up of data to cloud and the effects on cloud backup on their DR plan are elaborated in the following paragraphs. Migration of MS SQL Server 2012 R2 database to IaaS Webbs Stores is planning to migrate their MS SQL Server 2012 R2 database to an IaaS instance in a hybrid cloud environment. However, there are certain risks associated with storing the database in a hybrid cloud environment and therefore, proper risk mitigation policy is needed to be undertaken. The major types of security that Webbs Stores can deploy in order to protect the critical database are encryption of data and authenticated use of data apart from other strategies, which include data masking and back up of the data (Hashizume et al., 2013). Encryption is a process of converting a data into cipher text or unreadable text in order to prevent the unauthorized use and access of data. Through the process of encryption, the electronic data is converted into cipher text. The primary aim of enabling an encryption process in to protect the confidentiality of the digital data stored over the cloud, in this case, it is the database of Webbs Stores. Different encryption algorithm can be used in order to severe the database. Confidentiality of data is one of the primary aims of encryption and therefore, this method will be very effective in securing the database (Malawski et al., 2013). Authentication is often used to ensure that only the registered candidates are allowed to access the data. Authentication allows any user to access the data only if he is registered to use that data. Different authentication techniques can be used to protect unauthorized use and access of data (Boyd Mathuria, 2013). Therefore, the Webbs Stores must necessarily deploy these two security techniques as a primary security feature. Although the hybrid environment is safe to be used, the Webbs Stores must implement these two security essentials for securing their data after moving their MS SQL server 2012 R2 database to an IaaS instance in cloud. Benefits and Issues with the deployed security measure The security measures deployed for securing the data in cloud approach is encryption and authentication. The different benefits that is associated with the deployment of these information security are as follows- 1) Security of all data types: Data is generally more vulnerable when it is moved to a different location. The same is the case for Webbs Stores as well. Encryption works in the process of data transferring as well. The protects the data from being stolen, as even if an attacker gets access to the data, it would be unreadable for them since it is encrypted (Chen Zhao, 2012). 2) Data Integration is maintained in Encryption: Maintaining the integrity of data is essential. Encryption helps in maintaining the integrity of the data (Doan, Halevy Ives, 2012). 3) Privacy of data is protected: The personal and the confidential data of the Store is properly protected through the method of encryption. This is possible because, with the method of encryption only the authorized person is able to access the data (Zissis Lekkas, 2012). Apart from this, deployment of these security standards would further allow other advantages that are discussed below- 1) Flexibility: the deployment of this security policy would offer a high flexibility in the use of database. 2) High security: the process of encryption coupled with the authentication provides high security of the database (Arora, Parashar Transforming, 2013). 3) Cost Effective: The deployment of this security policy is a cost effective solution with a very low maintenance cost. However, with these advantages, there are certain issues that are associated with the process of encryption and authentication. The issues associated with the security measures of the organization is listed below (Tao et al., 2014)- 1) Complex structure: The method of encryption is complex and therefore proper research is necessary for implementing this structure. 2) Brute Force Attack: It is a method of trial and error method that can be used by an attacker to decode an encrypted data stored in a database (Wei et al., 2014). Therefore, it can be said that the process of encryption is associated with the risk of Brute Force attack as it can result in data leak and loss of data. These are the two major issues associated with the security measure deployed by the organization apart from the other minor issues that includes, the method of data storage, and process of proper encryption of the data (Garg, Versteeg Buyya, 2013). Risks Associated with the migration of database to cloud There are certain risks that are associated with the migration of database in cloud. Furthermore, Webbs Stores is planning to migrate their MS SQL server 2012 R2 database to an IaaS instance in cloud. The risk associated with the migration of the database in cloud environment are listed below- 1) The major risk in migration of data to a cloud database is the risk of data loss. This is because, migrating the whole R2 database is prone is very complex and if proper measures are not taken, few or all data may face this risk (Hashem et al., 2015). Therefore, Webbs Stores must ensure proper strategic plan before the migration of data in order to avoid this risk. 2) Another risk associated with migrating the database to IaaS instance is data loss due to corruption of data. This is a common risk associated with data migration and therefore, proper measures are needed to be taken by the Webbs Stores in order to eliminate the risk of data corruption. The Risk IaaS Infrastructure The different risk associated with the migration of Webbs Stores MS SQL server 2012 R2 database to an IaaS instance are listed below- 1) Privacy and security Risk: One of the major concerns associated with adopting the IaaS infrastructure is security of confidential data. This is because, the database is hosted on a public server managed by a vendor, and therefore Webbs should ensure that the vendor is trusted enough to protect the data from unauthorized access. This risk can be termed as risk from insider as well (Hashizume et al., 2013). Since the vendor would be able to access the data, it is essential for Webbs Stores to keep a track of their database. 2) Risk of downtime and technical difficulties- The IaaS Infrastructure is a bit complex and therefore, it is probable that the structure would face technical difficulty, which may freeze the operational work of the Store. Furthermore, the whole IaaS setup is largely dependent of an internet connection and therefore, any connectivity or network related issue might render the entire setup useless. 3) The risk of Vulnerability: Any cloud-based solution has a high chance of being attacked or exploited by malicious users and hackers. Nothing is completely secure on internet and the interdependency of cloud systems may lead to the loss and leakage of important data (Zissis Lekkas, 2012). 4) Limited Flexibility and control: Another issue associate with the IaaS instance is that, it is controlled by a third party vendor and therefore, it offers little control and low or negligible flexibility. 5) Denial of Service Attack: The cloud storage is prone to external attack, one of which may be denial of service attack. This attack is generally implemented to make the resources unavailable for the legitimate users. Public cloud environment is more prone to this attack (Malawski et al., 2013). The Risk in communication between Webbs and IaaS database The different risks that is associated with the communication between Webbs and iaaS database in cloud are listed below- 1) The major risk associated with the communication is that, an attacker can intercept or breach the data during an ongoing communication. 2) The data might be lost due to some technical error while an ongoing communication. This is another risk associated with communication (Fernando, Loke Rahayu, 2013). 3) Any technical error may render the data unavailable, thus freezing the operations of the Webbs Stores. Risk associated with data archival and Data back up i) The risks associated with the backing up of data in the cloud are listed below- Security: One of the major concerns or risks in backing up of data in cloud is the security risk. This is because, while backing up of data in cloud, The Webbs Stores will have to rely on the IaaS Vendor thus inviting a risk of unauthorized access of data (Gonzalez et al., 2012). Data Loss: The cloud storage while backing up of data, overwrite the previous version of the files, which saves the time and bandwidth. However, this leads to the delete of the previous versions of the data and in case if the Store needs an old data, it may find itself in a problem (Hashem et al., 2015). Therefore, the procedure of backing up of data leads to data loss. ii) The risks associated with the storage of data in cloud after backing up described below- Security Risk: Since the vendor has access to the data stored in IaaS infrastructure, there is a high possibility of security risk and data loss. The chances of sensitive and confidential data being stolen are high in storage of data in cloud (Wei et al., 2014). Lack of data Standardization: The data stored will be can be accessed by the third party vendor and there is lack of proper standardization and protocol in limiting the access of data. This is another concern of data storage in a cloud environment (Dinh et al., 2013). Data Theft of data loss: another major concern associated with the storage of data in the cloud environment is that it is prone to data theft. Malware infections: Third party vendors use cloud services for data ex filtration, which can result in malware infections (Chou, 2013) iii) The risk that Webbs Stores might face while retrieving the data are listed below- Snooping: One of the major risks associated with the retrieval of data in cloud is snooping. The stored data is transmitted over internet, which is a primary risk factor. The possibility of intercepting of data on route is high during the data retrieval and therefore it possesses a significant amount of risk (Leippold Lohre, 2012). Data leakage: Retrieval of data is dependent is largely dependent on internet connection and therefore, the risk of data leakage is considerably high during the data retrieval. Cloud back up and DR plans The disaster recovery concept in cloud involves the storage and maintenance of the copies of electronic records in cloud environment. The primary aim of DR is proving an organization a way to recover its important data in case of data loss (Li et al., 2013). The migration of the entire database to cloud will definitely help in developing a better DR plan for Webbs Stores. This is because, the process of data recovery us very simple in case of cloud environment (Phillips, 2015). The primary advantage of migrating the data in cloud and deploying a cloud back up strategy is that it keeps a copy of the data in an offsite server as well (Rahimi et al., 2014). The Iaas infrastructure allows this facility of periodic data backup and therefore, data recovery becomes easier. The backup and restore strategy will definitely change as a result of this service. This is because the process of data recovery and back up in cloud is very simple and Webbs Stores need not have to worry about the backup as well. This is because; the cloud provider will control the regular data backup (Sanaei et al., 2014). A proper DR plan eliminates the risk of data loss during migration, retrieval or storage. Therefore, this strategy will be helpful for the Webbs Stores in data recovery. Access protection on moving to cloud Access control and access protection is very essential for protection of data from unauthorized access. Access control limits the access of data only to the authorized person thus eliminating the risk of data theft and data loss. The recommendation for protecting the access to IaaS infrastructure, database, cloud network infrastructure and cloud backup and restore are elaborated below (Khan, 2012)- IaaS Infrastructure The IaaS infrastructure should be properly protected in order to avoid the risks associated with the loss of data and data theft. The recommendations for ensuring access protection for IaaS Infrastructure are elaborated below- 1) Controlling the physical access to the IaaS infrastructure is an effective method of ensuring access control in IaaS Infrastructure. Use of multifactor authentication, which includes OTP, tokens and smart cards, will help in reducing the risk of unauthorized access to the infrastructure. 2) The access of IaaS infrastructure with unsecure API is one of the primary reasons of malware infection and data threat. Only secure and authorized utilization of API should be ensured in order to protect the data in IaaS infrastructure (Xiao, Song Chen, 2013). MS SQL Server 2012 R2 Cloud Instance The contents of MS SQL Server R2 cloud instance can be protected ensuring a proper access control methodology. The access control procedures recommended for SQL server are elaborated below- 1)Only the registered users should be able to access the database. This should be controlled by the Webbs Stores to ensure that an employee with a sufficient permission will only be allowed to access the database and the servers. 2) Proper encryption standards can help in preventing the unauthorized access to the data. The person having the decryption key can only decrypt encrypted data and therefore, this strategy helps in controlling the access to the database (Biham Shamir, 2012). Cloud network infrastructure The recommendations in ensuring the access control in cloud network infrastructure are listed below- 1) The only useful approach of ensuring the access control in cloud network infrastructure is monitoring the cloud database server. This will help in keeping a tract of users accessing the data and can further help in eliminating the risk of data theft (Whaiduzzaman et al., 2014). 2) The cloud network infrastructure would be accessible to the cloud service vendor and therefore, protection against the internal threats is necessary (Rittinghouse Ransome, 2016). The traffic in the system should be regularly monitored and any suspecting communication or transaction should be immediately tracked. Cloud backup and restore infrastructure The recommendations from protecting the access to cloud backup and restore infrastructure are listed below (Rahimi et al., 2014)- 1) One of the most useful security measures for protecting the access to backup data is to encrypt the data. The encryption will help in preventing any unauthorized access to the backup data (Avram, 2014). 2) The process of data restoring should ensure password protection. This indicates that the data restoring will be enabled only after providing a valid password (Botta et al., 2016). Conclusion Therefore, from the above discussion it can b concluded that the migration of database to an IaaS instance would definitely benefit the Webbs Stores. However, there are certain issues that are associated with the data migration that should be properly dealt with. The report provides certain recommendation in ensuring data protection in hybrid cloud and secure access of data. References Arora, R., Parashar, A., Transforming, C. C. I. (2013). Secure user data in cloud computing using encryption algorithms.International journal of engineering research and applications,3(4), 1922-1926. Biham, E., Shamir, A. (2012).Differential cryptanalysis of the data encryption standard. Springer Science Business Media. Boyd, C., Mathuria, A. (2013). Protocols for authentication and key establishment. Springer Science Business Media. Chen, D., Zhao, H. (2012, March). Data security and privacy protection issues in cloud computing. In Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on (Vol. 1, pp. 647-651). IEEE. Chou, T. S. (2013). Security threats on cloud computing vulnerabilities. International Journal of Computer Science Information Technology, 5(3), 79. Dinh, H. T., Lee, C., Niyato, D., Wang, P. (2013). A survey of mobile cloud computing: architecture, applications, and approaches.Wireless communications and mobile computing,13(18), 1587-1611. Doan, A., Halevy, A., Ives, Z. (2012). Principles of data integration. Elsevier. Fernando, N., Loke, S. W., Rahayu, W. (2013). Mobile cloud computing: A survey.Future generation computer systems,29(1), 84-106. Garg, S. K., Versteeg, S., Buyya, R. (2013). A framework for ranking of cloud computing services.Future Generation Computer Systems,29(4), 1012-1023. Gonzalez, N., Miers, C., Redigolo, F., Simplicio, M., Carvalho, T., Nslund, M., Pourzandi, M. (2012). A quantitative analysis of current security concerns and solutions for cloud computing. Journal of Cloud Computing: Advances, Systems and Applications, 1(1), 11. Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., Khan, S. U. (2015). The rise of big data on cloud computing: Review and open research issues.Information Systems,47, 98-115. Hashizume, K., Rosado, D. G., Fernndez-Medina, E., Fernandez, E. B. (2013). An analysis of security issues for cloud computing.Journal of Internet Services and Applications,4(1), 5. Khan, A. R. (2012). Access control in cloud computing environment. ARPN Journal of Engineering and Applied Sciences, 7(5), 613-615. Leippold, M., Lohre, H. (2012). Data snooping and the global accrual anomaly. Applied Financial Economics, 22(7), 509-535. Li, J., Li, Y. K., Chen, X., Lee, P. P., Lou, W. (2015). A hybrid cloud approach for secure authorized deduplication. IEEE Transactions on Parallel and Distributed Systems, 26(5), 1206-1216. Malawski, M., Juve, G., Deelman, E., Nabrzyski, J. (2015). Algorithms for cost-and deadline-constrained provisioning for scientific workflow ensembles in IaaS clouds.Future Generation Computer Systems,48, 1-18. Phillips, B. D. (2015). Disaster recovery. CRC press. Tao, F., Cheng, Y., Da Xu, L., Zhang, L., Li, B. H. (2014). CCIoT-CMfg: cloud computing and internet of things-based cloud manufacturing service system.IEEE Transactions on Industrial Informatics,10(2), 1435-1442. Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., Vasilakos, A. V. (2014). Security and privacy for storage and computation in cloud computing.Information Sciences,258, 371-386. Zissis, D., Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation computer systems, 28(3), 583-592.