 The student in this module we will look at the security of the Amazon web services why security is important First of all when something is on the internet, okay? It is kind of fair game. Now, for example, consider the case of a movie database or there is a Serial which is very popular and that is placed over the internet over the web services using the web services Now if it is not secured There that that episode of that movie or a television serial might get removed and might get shared with the people and Then the company will not be able to get the desired level of revenue through advertisement or through subscription charges, whatever So that is one reason where we are not looking at any financial records But we are looking at the marketing content or the that value of the customer value of certain content which is placed over the Amazon web services stored over the net What is the security over there? So this this is what we are looking at the amazon web services a api Then the interaction mechanism and of course the how that security is implemented That is implemented in in three ways or you can say two ways. I will Share it with you. So next now look at it So we have this over here rest which we discussed in the previous module It is meant to integrate with the standard web protocols Okay, so that increases the ease of use. So this is the example of the rest Okay, and you can see that we have a structure which is very similar to the html structure The way in which we make references or the URLs, okay And we are looking for the employee info for a certain employee with the name of ismail siddiqui Now this example is for the example of the amazon web services api And you can see that there what is the how they are comparable Look at this example. What this code is saying is that run between one and three, right? And use the amazon machine image Which machine image this machine image over there? Okay, and place in a certain zone Which certain zone it is certain zone united states east coast and enable the monitoring So you can also read it very very well. So there's not much difficulty over here So you can see that this rest approach as I said in the previous module is being adopted by the amazon web services Now how how people interact how people interact with the amazon web services We have one which is the management console. Okay This uh, I think it is in 164 module slide 11 You will look at that console. Okay, it is it is graphical So this is one way of looking at accessing interacting with it Which is through this management console Then there is the short file development kit or the language library Through which the programmers can access the those all those services And command line interface cli CLI you can you can you can type the commands command entry and of course, then there are third party tools also These third party tools they either extend or simplify the amazon web services. Why because It is kind of difficult Okay, it it it is error prone to directly access amazon web services using the apis So third party is extended simplified Separate the functionality or maybe make create entire applications There there are smart people and hardworking people who have developed all those things And finally how this security is implemented. There are two ways one is the encryption and the other methods So in the encryption, uh, there is an access key and there is a secret access key The secret access key is is a random sequence of alphanumeric characters, which is with you also And with amazon also you keep it safely And using this s a key you encrypt the data Okay, so that it is it is it is garbage for anyone who who doesn't have access to those keys Second is other methods. There is the date associated with the service call And if the date is very inappropriate that will be that call will not be executed And if somebody kind of evades drafts or Or or gets the message while it's uh in is in transition over the net And they make certain changes or they read it that checksum will be different Okay, if they modify it the checksum reading will not modify but it will be garbage But if they modify it the checksum will be different And the amazon web services Will not execute the call So there are certain levels of security and more details are given in the A course notes that is for this module. Thank you very much