Discuss About The Security Deployment Protect Migration Iaas?
Webb’s Store is a regional retail store based in Australia and New Zealand. They want to increase their market share, hence want to embellish the business activities. Therefore, Webb has decided to move to Cloud (Azam et al., 2013). They have engaged a consultant who will show lights on the various aspects of Cloud Computing and will help them to adopt the cloud technology.
The report will highlight the security factors correlated with the migration of their SQL Server database to IaaS cloud framework. The report will showcase the benefits as well as the risks associated with the database, the IaaS framework. The risks associated with backing up of data, storage of data and retrieval of data will be discussed elaborately in this report. Finally, the recommendations have been made on how Webb should adopt the cloud technology.
Webb’s want to move to the cloud and the challenges they will have to face are data breaches, hijacking of accounts, gaining access to APIs, malware attack at the database and the data loss all due to the intruders (Shufeng & Xu, 2012). Thus to safeguard the cloud database following measures should be taken-
A Proper understanding of the network- The database administrators should know where Webb’s sensitive data will be stored and those data should be labelled so that it can be retrieved easily at the time of need.
Securing network information- The data stored in the database must have a proper accessing rule that means which data will be accessed by which employee within the Webb. A set of rules must be applied to the customers as well (Azam et al., 2013). The customers will access data and the data to which extent must be set by the administrators that are how they can secure their database.
Monitoring of network- Webb must hire a security team, they must act proactively and search for any vulnerabilities all the time as anytime the intruders can attack the database and Web’s security can be compromised.
Security intelligence technologies- The Security Intelligence and Event Management technologies must be implemented to detect any flaws in the defence system. Proper cryptographic technologies can be used along with that (Dinh et al., 2013).
Benefits of mitigating those risks-
iii. Regulatory compliance- Cloud computing solutions help Webb to regulate and maintain the advanced infrastructure thus financial data can be made secure.
The issue that Webb can face is that they will have to spend heavy for this security solution (Dillon & Vossen, 2015).
Data breaches Webb’s customer’s personal details and along with that the employees’ data can be hacked and the whole company can face huge loss and their reputation will suffer.
Account hijacking- The sensitive information can be hijacked by means of phishing and in that case, the security passwords of both the employees and the customers can be at risks (Tsai et al., 2014).
Malware attack- The malware attack and the worm attack can make the system and the database vulnerable.
The three risks associated with IaaS Cloud are-
Misconfiguration- Since Webb will adopt the IaaS framework they can face the misconfiguration issue, the framework must comply with their existing hardware and software system along with that the network framework.
Vulnerabilities- The vulnerability can be managed by Elastic Workload Protector technique via Scan, Prioritize and Remediate (Manvi, & Shyam, 2014).
Shadow-IT- The Shadow-IT includes using a server that is inactive for a longer period of time, not using dormant resources like Webb using the new cloud server and forget the older one, use of AWS new services which is still in testing mode.
Webb should adopt the IaaS architecture provided by Amazon AWS, Amazon will provide the hardware and software solutions for Webb. Webb will just need minimal changes in their existing hardware and software solutions to comply with Amazon IaaS cloud framework (Gai, & Steenkamp, 2014). Amazon will take care of their data, maintain and upgrade system and database and will provide latest security solutions.
The risks associated with backing up of data are-
iii. Due to server breakdown of the cloud vendor, the data can be lost.
The following benefits Webb can enjoy-
iii. The cloud vendor, Amazon will provide advanced security solutions so both Webb and Webb’s customers will not have to worry about the data breaches.
Webb should adopt the IaaS architecture provided by Amazon AWS, Amazon will provide the hardware and software solutions for Webb. Webb will just need minimal changes in their existing hardware and software solutions to comply with Amazon IaaS cloud framework (Sharma et al., 2017). Amazon will take care of their data, maintain and upgrade system and database and will provide latest security solutions. So Webb will have to trust Amazon for the protection service.
Amazon RDS for SQL server provides the facility so that Webb can acquire the full capabilities of SQL server for deploying new application programs. Besides that, Webb must implement physical security that means database server hardware and network components must be protected from unauthorised access (Dillon & Vossen, 2015). Again, they will have to apply digital encryption keys and certificates for enhanced security of their database.
They need to adopt the cloud architecture provided by a cloud vendor, Amazon. They need the latest hardware, latest operating system and latest software-these changes are required to integrate with Amazon cloud architecture (Varia & Mathew, 2014). After integration, they can use the cloud server of Amazon to deploy their apps and perform their business activities in a secured manner.
Amazon AWS will back up the data of Webb and will keep track of data stored, modified, retrieved by Webb (Sharma et al., 2017). All these data transmission will be done on a secure channel, thus with the advanced security solutions provided by Amazon AWS, Webb do not have to worry about the data breaches.
Conclusion
It can be concluded from the above discourse that Webb Store can be largely benefitted if they adopt Amazon AWS framework for enhancing their business operations. The consultant must advise Amazon AWS for the excellent service they offer, and with their latest cloud technology features and advanced web solutions, they are quite ahead of all their competitors. Thus adopting Amazon AWS, Webb can be benefitted both in Australia and New Zealand retail stores. The report has showcased the security factors correlated with the migration of their SQL Server database to IaaS cloud framework. The report has highlighted the benefits as well as the risks associated with the database, and the IaaS framework. The risks associated with backing up of data, storage of data and retrieval of data has been thoroughly discussed in this report. Lastly, the recommendations have been made on how Webb should adopt the cloud technology, how they can be benefitted from Amazon AWS.
References
Azam, Abdollahzadehgan; Ab Razak Che Hussin; Gohary , Marjan Moshfegh Gohary & Mahyar Amini (2013), The OrganizationalCritical Success Factors for Adopting Cloud Computing in SMEs, Journal of Information Systems Research and Innovation (JISRI), Volume 4, Issue 1, pp. 67-74.
Dillon, S., & Vossen, G. (2015). SaaS cloud computing in small and medium enterprises: A comparison between Germany and New Zealand. International Journal of Information Technology, Communications and Convergence, 3(2), 87-104.
Dinh, H. T., Lee, C., Niyato, D., & Wang, P. (2013). A survey of mobile cloud computing: architecture, applications, and approaches. Wireless communications and mobile computing, 13(18), 1587-1611.
Gai, K., & Steenkamp, A. (2014). A feasibility study of Platform-as-a-Service using cloud computing for a global service organization. Journal of Information Systems Applied Research, 7(3), 28.
Manvi, S. S., & Shyam, G. K. (2014). Resource management for Infrastructure as a Service (IaaS) in cloud computing: A survey. Journal of Network and Computer Applications, 41, 424-440.
Muthui, M., & SISAT, C. (2013). Amazon Web Services.
Sharma, P., Lee, S., Guo, T., Irwin, D., & Shenoy, P. (2017). Managing Risk in a Derivative IaaS Cloud. IEEE Transactions on Parallel and Distributed Systems.
Shufeng Gao & Xu, Ai, (2012) Boosting Electronic Business Applications by Digitally Enabling SMBs with Cloud Computing Model, 11th International Symposium on Distributed Computing and Applications to Business, Engineering & Science, pp-214-218.
Tsai, W., Bai, X., & Huang, Y. (2014). Software-as-a-service (SaaS): perspectives and challenges. Science China Information Sciences, 57(5), 1-15.
Varia, J., & Mathew, S. (2014). Overview of amazon web services. Amazon Web Services.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download