Question

In: Computer Science

1. Explain the important areas that need to be considered for a migration of web or...


1. Explain the important areas that need to be considered for a migration of web or mail services to the cloud. Why are these areas important?

2. The cloud computing model can lead to privacy compliance concerns. Provide examples of these concerns, and an analysis of the types of actions that you might take to mitigate these concerns.


5. What cloud computing best practices would you propose adopting? Why?

Solutions

Expert Solution

1.

Reduced Cost

Switching to cloud helps companies lower their capital expenses, as they no longer need to

spend on hardware or the teams to maintain it. Additionally, in a cloud model you pay for

resources only when they are used, allowing you to save money during periods of low usage.

Higher Flexibility and Scalability
Gaining operational agility is one of the top reasons to adopt a cloud-based system. The potential
to easily scale capacity up or down on remote servers makes a cloud system the perfect choice
for companies with fluctuating bandwidth demands.

Enhanced Security
Cloud offers enhanced security against data theft and hacking. When data is stored off-site,
employees and visitors are physically separated from accessing it. Furthermore, Cloud service
providers monitor data 24/7 to protect it from threats and undergo thorough yearly audits,
providing more protection than what would be feasible for an on-site solution.

Better Disaster Recovery

A virtual, cloud-based server is completely hardware independent, meaning that all programs,

apps, patches and data are safely backed up. In the event of a disaster, all of that data can be

spun up onto a new system in a matter of minutes without losing any functionality.

Better Customer Reach

Migrating applications to the cloud enables organizations to reach more customers and expand

their geographical presence. Easy integration with social and mobile platforms help them reach

more people through different channels anytime and anywhere.

Increased Collaboration

A cloud system makes collaboration easy. Team members and colleagues can use collaborative

spaces to connect effortlessly, irrespective of their geographic location. They can share

information and work closely and securely across a cloud-based platform, improving employee

engagement.

Faster Time-to-Market
Moving to the cloud leads to faster time-to-market, whether you’re launching a new product,
reaching new markets, or making the most of deployed infrastructure. Having on-demand access
to computing power means faster

2..

Cloud Computing Models
There are three basic models introduced by cloud computing SAAS,
IAAS, and PAAS, SAAS stands for software as a service, IAAS stands for
infrastructure as a service and PAAS stands for platform as a service

Cloud Security Issues
There are many security issues in clouds as they provide hardware
and services over the internet [8].
Data breaches
Cloud providers are the attractive target for the hackers to attack
as massive data stored on the clouds. How much severe the attack is
depend upon the confidentiality of the data which will be exposed. The
information exposed may be financial or other will be important the
damage will be severe if the exposed information is personal related
to health information, trade secrets and intellectual property of a
person of an organization. This will produce a severe damage. When
data breached happened companies will be fined some lawsuits may
also occur against these companies and criminal charges also. Break
examinations and client warnings can pile on critical expenses.
Aberrant impacts, for example, mark harm and loss of business, can
affect associations for a considerable length of time. Cloud suppliers
commonly convey security controls to ensure their surroundings, in
any case, associations are in charge of ensuring their own information
in the cloud. The CSA has suggested associations utilize multifaceted
confirmation and encryption to ensure against information ruptures
[9].
Network security
Security data will be taken from enterprise in Saas and processes
and stored by the Saas provides. To avoid the leakage of the confidential
information Data all over the internet must be secured. Strong network
traffic encryption will be involved to secure the network for traffic.
Data locality
Consumer’s uses Saas applications in the Saas environment
provided them by the Saas providers and also processing of their data.
In this case users or clients of clouds are unaware of the fact that where
their data is getting stored. Data locality is much important in May of
the countries laws and policies regarding the locality of data are strict.
Data access
Data on clouds must be accessible from anywhere anytime and
from any system. Cloud storages have some issues regarding the access
of the data from any device [10]. Information breaks and different sorts
of assaults flourish in situations with poor client verification and frail
passwords. Take a gander at the genuine assault on Sony that happened
only a few years back. They are as yet feeling the budgetary and social
impacts of the hack, which to a great extent succeeded on account of
administrators utilizing feeble passwords. The cloud is a particularly
appealing target since it exhibits a concentrated information store
containing high-esteem information and brought together client get
to. Utilize enter administration frameworks in your cloud condition,
and be sure that the encryption keys can't without much of a stretch be
discovered on the web. Require solid passwords and place teeth in the
prerequisite via consequently turning passwords and different methods
for client ID. To wrap things up, utilize multi-figure validation.
DoS attacks
One cannot stop the denial of service attacks because it is not
possible one can mitigate the effect of these attacks but cannot stop these
attacks. DoS assaults overpower resources of a cloud service so clients
can't get to information or applications. Politically roused assaults get
the front features, however programmers are similarly prone to dispatch
DoS assaults for pernicious goal including extortion. What's more,
when the DoS assault happens in a distributed computing condition,
process burn charges experience the rooftop. The cloud supplier ought
to invert the charges, yet consulting over what was an assault and what
wasn't will take extra time and irritation. Most cloud suppliers are set
up to deny DoS assaults, which takes consistent observing and moment
alleviation.
System vulnerabilities
Vulnerabilities of the system are exploitable program bugs in
the OS that programmers intentionally use to control or invade a
PC framework. Fortunately, essential IT cleanliness goes far towards
shielding you from this sort of genuine assault. Since machines exist
in your cloud supplier's server farms, be sure that your supplier hones
normal weakness examining alongside convenient security fixes and
overhauls.

Account hijacking

You may have seen an email that looks true legitimate. You tap on

a connection, and soon thereafter sirens blast and cautioning lights

streak as your antivirus program goes to fight. Or, then again you may

have been genuinely unfortunate and had no clue that you were recently

the casualty of a phishing assault. At the point when a client picks a

powerless secret key, or taps on a connection in a phishing endeavor,

they are at genuine danger of turning into the channel for genuine risk

to information. Cloud-based records are no special case. Foundation

solid two variable validation and computerize solid passwords and

watchword cycling to help secure yourself against this sort of digital

assault.

Malicious insiders

Most information loss or harm happening inside an association is

human mistake. noxious insiders do exist and they do much of harm.

A malicious insider may be a present or previous worker, contractual

worker, or accomplice who has the accreditations to get to organization

information and intentionally uses, takes, or harms that information.

Resistance fixates on secure procedures, for example, solid get to

control, and always screen forms and explore activities that lie outside

the limits of adequate capacities.

The APT parasite

Additionally called APTs, programmers plan these long term

cyber-attacks to give them continuous access into a system. Cases of

section focuses incorporate phishing, introducing assault codes by

means of USB gadgets, and interruption by means of unreliable system

get to focuses. Once in, the interruption shows up as ordinary system

movement and the aggressors are allowed to act. Mindful clients and

solid get to controls are the lines of best safeguard against this kind of

assault.

Permanent data loss

Any information destruction or loss can be a permanent harm to

the business. Cloud information is liable to an indistinguishable dangers

from is on premise information: unintentional cancellation by clients

or staff of providers, natural loss or damage, or psychological militant

assault. It is the cloud supplier's obligation to make preparations for

human mistake and to fabricate strong physical server farms. In any

case, IT should likewise secure against cloud information misfortune by

setting up SLAs that incorporate incessant and obvious reinforcement

to remote locales, and encoding records in the event of inadvertent

information introduction [11].

Shared technology, shared dangers

Cloud suppliers allow administrations to thousands to a huge

number of occupants. Administrations run from cloud reinforcement

to whole framework, stage, and applications as an administration.

The supplier ought to plan their engineering for solid separation in

multitenant designs: a fruitful assault on one client is sufficiently

terrible. A multitenant assault that spreads from one client to thousands

is a debacle. When you take a gander at cloud supplier and multitenant

administrations, ensure that they have executed multifaceted validation

on all server has and work present day interruption location frameworks.

Compromised credentials and broken authentication

Many cloud applications are equipped towards client collaboration,

however free programming trials and join openings open cloud

administrations to pernicious clients. A few genuine assault sorts

can ride in on a download or sign in: DoS assaults, email spam,

computerized click extortion, and pilfered substance are only a couple

of them. Your cloud supplier is in charge of solid episode reaction

structures to distinguish and remediate this wellspring of assault. IT

is in charge of checking the quality of that structure and for observing

their own cloud condition for manhandle of resources.

Hacked interfaces and APIs

APIs and UIs are the backbone of cloud computing connections and

integration amongst clients and distributed computing. Cloud APIs'

IP addresses uncover the association amongst clients and the cloud,

so securing APIs from irruption or human mistake is basic to cloud

security. Work with your cloud supplier and application merchants to

construct information streams that don't open APIs to simple assault.

Put resources into applications that model dangers in a live situation,

and practice visit entrance testing.

Solution to Security Issues

There are many security issues in the security of cloud computing

which are need to be resolved in order to make clouds more secure to

check the security of a cloud the following areas must be consulted with

the cloud service providers.

Written security policies plan

If the cloud service providers have a written security plan of policies

then the security of the data will be guaranteed, if the cloud service

provider do not have a security policies written plan then the cloud

is not safe and security of the data cannot be guaranteed as they do

not have a written plan of security policies. This means that their data

security program development. Organizations that have not formalized

their security strategies cannot be trusted with your touchy corporate/

client information. Strategies shape the system and establishment and

without security is just an idea in retrospect

Multifactor authentication

If the cloud providers provide the multifactor authentication for

example one time password and mobile [3] code then the security of

the data will be more tight as it will be protected by multi factors. If

someone try to unlock the data through password one time wrong

password will be sent to the data owner at his or her mobile so that he

can authenticate the login to the data [12]. Multifactor authentication

make the level of protection of data more high.

Access to data

Data of enterprise must be accessed and seen by the administration

not by the users. This access will provide the enhance security to the data

over the cloud. Many cloud applications are equipped towards client

collaboration, however free programming trials and join openings

open cloud administrations to pernicious clients. A few genuine assault

sorts can ride in on a download or sign in DoS attacks, email spam,

computerized click extortion, and pilfered substance are only a couple

of them. Your cloud supplier is in charge of solid episode reaction

structures to distinguish and remediate this wellspring of assault. IT

is in charge of checking the quality of that structure and for observing

their own cloud condition for manhandle of resources.

Appropriate cloud model for business

Appropriate cloud model for business will be private cloud. Private

cloud are more costly than public clouds but more secure. As they

are costly they are more secure. Private clouds are only used by only

one organization and security level is higher than the public cloud. As

business contains confidential information and financial transactions

and business secrets more security is needed hence private clouds are

safer than public clouds.

3....

Self-service on demand
A customer can independently arrangement, figuring limits, for
instance, server time and framework or system stockpiling, as required
therefore without requiring human coordinated effort with every
master association.
Pooling of resources
The supplier's processing assets are pooled to serve different
customers using, a multi occupant demonstrate with different physical
and virtual assets effectively doled out and reassigned by shopper ask.
There is a sentiment territory self-rule in that the customer generally
has no control or data over the right region of the given assets yet may
have the ability to decide region at a more hoisted measure of thought.
Instances of benefits consolidate stockpiling, taking care of, memory
and framework transmission limit.
Broad network access
Capacities are available over the structure and access to through
standard methodology or instrument that actuate use by heterogeneous
thin or thick client stages (e.g., cell phones, tablets, adaptable PCs and
workstations) (Figure 1).
Rapid elasticity
Capacities can be adaptably provisioned, and discharged some of
the time consequently, relative rapidly outward and inside comparable
with demand. For the customer, the capacities available for provisioning
much of the time radiate an impression of being limitless and can be
appropriated in any sum at whatever point.
Measured service
Cloud frameworks automatically control and upgrade, cloud
resource use by utilizing a metering ability at the level of abstraction
suitable to the kind of administration (e.g., stockpiling, planning,
exchange speed and dynamic customer accounts). Resource use can
be observed, controlled and revealed, giving straightforwardness to the
supplier and customer.


Related Solutions

explain the Great migration
explain the Great migration
1. (0.8) two areas of a large city are being considered as the seat of day...
1. (0.8) two areas of a large city are being considered as the seat of day care centres. Of 200 families interviewed in one section. the proportion of mothers working full - time was 0.52. In the other section, 40 % of the 150 families interviewed had mothers who they worked full-time jobs. With a level of significance of o =0.04. is there is a significant difference in the proportion of mothers who work full - time in the two...
Using the NPV of migration model; explain why migration can be seen as an investment in...
Using the NPV of migration model; explain why migration can be seen as an investment in human capital? Is there a positive correlation between migration, remittances and poverty reduction?
1. What are occupational hazards? 2. List give major areas that are considered to be part...
1. What are occupational hazards? 2. List give major areas that are considered to be part of occupational hazardy in the industry.
1. What are occupational hazards? 2. List give major areas that are considered to be part...
1. What are occupational hazards? 2. List give major areas that are considered to be part of occupational hazardy in the industry.
The physical stress theory applies to all areas of physical therapy and is extremely important. Explain...
The physical stress theory applies to all areas of physical therapy and is extremely important. Explain what you understand from mechanical factors and how they affect cell injury.
Web crawlers need to estimate the frequency of changes to Web sites to maintain a current...
Web crawlers need to estimate the frequency of changes to Web sites to maintain a current index for Web searches. Assume that the changes to a Web site follow a Poisson process with a mean of 3.5 days. a) (6 pts) What is the probability that the next change occurs in less than 2.0 days? b) (6 pts) What is the probability that the time until the next change is greater 7.0 days? c) (6 pts) What is the time...
What are the three important questions of corporate finance you will need to address? Please briefly explain them and indicate how they are related to the areas in the balance sheet of a company.
What are the three important questions of corporate finance you will need to address? Please briefly explain them and indicate how they are related to the areas in the balance sheet of a company.
Q. Explain the important elements that are to be considered when designing an enterprise governance framework....
Q. Explain the important elements that are to be considered when designing an enterprise governance framework. (20 Marks question)
Q. Explain the important elements that are to be considered when designing an enterprise governance framework....
Q. Explain the important elements that are to be considered when designing an enterprise governance framework. (20 Marks question)
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT