The case study presents that Webb’s Stores is a successful retailer. The two main warehouses for the company are Melbourne and Sydney. The report suggests that there are two key issues or business challenges for the organization. The first issue is the operational complexity and the second issue is the management of data. Therefore, it is important that the suggested issue of cloud computing should solve these two business challenges for the company. The management of the company should understand that any migration is a difficult task that must be handled strategically. However, there would be long term benefits of migration. The case study suggests that the organization should focus on hybrid cloud. It means that part of the infrastructure would be on cloud and the part of the infrastructure would be on premise. The high level logical diagram of hybrid cloud can be shown as:
This report is divided into various sections. The various sections of this report can be discussed as:
One of the critical step for Webb’s would be migration of MS SQL Server 2012 R2 database to IaaS instance in the cloud. This migration would be a three-step process. These three steps can be discussed as:
Step 1: Data Extraction – Extraction of data from the current SQL database. This step is the easiest of all the three steps. However, the migration activity should ensure that all the data is extracted and any data is not missed (Ghosh & Ghosh, 2015).
Step 2: Data Massaging – This step includes the formatting of the data as per the target database (Varia, 2010). In this case, the target database could be Amazon Web Services or Microsoft Azure.
Step 3: Deployment – Once the data format is set, the next step is the deployment in the new of targeted server. It is suggested that the deployment should first happen in development environment and they it should be moved to production environment. The diagrammatic representation of IaaS can be shown as:
There are various security controls that should be implemented as a part of IaaS infrastructure. There are various global security control standards that should be followed by and Cloud Service provider. Some of the measures and suggestions can be discussed as:
There are various advantages and disadvantages or limitations of above security controls. It is important that the management of Webb’s should analyse all the benefits and challenges. The key advantages and disadvantages can be discussed as:
The tight security of the system is the biggest benefit. With this system in place it is not possible for intruders or hackers to hack into the system (Dlodlo, 2011). With this system in place users cannot access the information because the data is encrypted. It would ensure that that confidential data and information of the organization is not leaked.
One of the biggest challenge or disadvantage is that the establishment of this system is a costly affair. Webb’s may have to invest a lot to develop this kind of system. Moreover, the company would need to give two-way authenticator token to all the employees. In certain cases, the efficiency of system can also suffer as there are multiple layers in between (Ramachandran & Chang, 2016).
The database migration is a difficult task and there are various risks involved across the process of data migration. There are risks associated at different levels. For example, some of the risks exist at the migration level and some risks exist at infrastructure level. Some of the risks can be discussed as:
At the migration level, there are two key risks that exists. These two risks can be discussed as:
At IaaS infrastructure level, there are three key risks that must be addresses. These risks can be discussed as:
The third aspect of the risk is the risk that exist between the communication channel. There are two major risks that can occur in the communication channel. These risks can be discussed as:
It would be correct to say that data backing should be a strategic pillar of IT strategy of Webb’s. It is recommended that the organizations should also have a back-up copy maintained that they can access in case of any failure. The certain part of this section can be discussed as:
Cloud backup, also known as online backup, is a strategy for backing up data that involves sending a copy of the data over a proprietary or public network to an off-site server It is highly recommended that Webb’s should back up the data on cloud. Both Microsoft Azure and AWS offers good data back features. A good CSP is one that can provide the provision of real time data backup (Claycomb & Nicoll, 2012). It is important to mention that backing the data in the cloud is different than the storing the data in the cloud. The real-time data backing means that the stored data is getting backed up on real time. Today, most of the CSPs provide this facility where the backup copy is created on real time.
With the use of CPS, storage of data on cloud comes naturally. However, there are few risks associated with storage of data in the cloud that should be addresses. These issues can be discussed as:
The retrieval of data form cloud may not be a difficult task. However, there exists a dependency on the cloud service provider. Clouds systems must ensure that the retrieval requests are coming from the authentic sources and users are authorized for that information (Kandukuri, & Rakshit, 2009). It is suggested that the employees of Webb’s should be trained on the method to retrieve the data for the cloud.
In case of any loss of data, recovery is the key. Therefore, it is important that the organization must have good recovery plan in place (Ristov, Gisev, & Kostoska, 2012). Webb’s store must have a contingency plan in place that would also cover the data recovery plan. It has to conduct pilot methods for replicating the backups and also regular conduct drills so as to check if the RTO (Recovery time objective) promised by the cloud vendor is feasible or not. There should also be proper escalation and penalty mechanism (Alhazmi, & Malaiya, 2013) in place in case something goes wrong.
This section would discuss the way Webb’s store protect access to the services that they are now moving to the Cloud. The key themes under this section can be discussed as:
It is important that Webb’s should have a full control over their IaaS infrastructure (Dahbur, Mohammad, & Tarakji, 2011). The organization can protect the infrastructure using device, location and user: This means that person can access the data as long as he is in one country but not able to access data if he is in another country. Also, devices that belongs to organization should be able to access documents and download however this is not possible thought the devices belonging to the organization or there are different privileges like downloading of data is not allowed from outside systems due to insider threat
It is suggested that the SQL cloud instance should be encrypted in nature. The use of encryption would ensure that the access is limited to authorized user only. The two way authentication process and user profiling of users across different levels would ensure that encrypted cloud instance is strong in nature.
It is recommended that Webb’s They must use virtual machine and DLP programs which means even if data is loss, it can’t be comprehended or readable making it useless. Cloud service providers must keep their security systems up to date with latest tools and techniques and must monitor the malicious attacks on a constant basis (Dahbur, et al., 2011).
As discussed above, backup is the key across any cloud set up. The real time back up strategy should be used to back up the data (Jarvelainen, 2012). Another thing it must have service level agreements beyond which CSPs will be liable for penalty.
Conclusion
The above paper discusses the case study of Webb’s store. With the above discussion, it can be said that organization and decision holder should have a strong involvement in the implementation of cloud. The above paper discusses various risks and mitigation strategies that should be used. The risks are mainly technical in nature that could be overcome. The key thing for Webb’s is to have a strong data back-up strategy in place.
References
Alhazmi, O. H., & Malaiya, Y. K. (2013, January). Evaluating disaster recovery plans using the cloud. In Reliability and Maintainability Symposium (RAMS), 2013 Proceedings-Annual (pp. 1-6). IEEE.
Claycomb, W. R., & Nicoll, A. (2012, July). Insider threats to cloud computing: Directions for new research challenges. In Computer Software and Applications Conference (COMPSAC), 2012 IEEE 36th Annual (pp. 387-394). IEEE.
Dahbur, K., Mohammad, B., & Tarakji, A. B. (2011, April). A survey of risks, threats and vulnerabilities in cloud computing. In Proceedings of the 2011 International conference on intelligent semantic Web-services and applications (p. 12). ACM.
Dlodlo, N. (2011, April). Legal, privacy, security, access and regulatory issues in cloud computing. In Proceedings of the European Conference on Information Management & Evaluation (pp. 161-168).
Ghosh, N., Ghosh, S. K., & Das, S. K. (2015). SelCSP: A framework to facilitate selection of cloud service providers. IEEE transactions on cloud computing, 3(1), 66-79.
Järveläinen, J. (2012). Information security and business continuity management in interorganizational IT relationships. Information Management & Computer Security, 20(5), 332-349.
Kandukuri, B. R., & Rakshit, A. (2009, September). Cloud security issues. In Services Computing, 2009. SCC’09. IEEE International Conference on (pp. 517-520). IEEE.
Rahumed, A., Chen, H. C., Tang, Y., Lee, P. P., & Lui, J. C. (2011, September). A secure cloud backup system with assured deletion and version control. In Parallel Processing Workshops (ICPPW), 2011 40th International Conference on (pp. 160-167). IEEE.
Ramachandran, M., & Chang, V. (2016). Towards performance evaluation of cloud service providers for cloud data security. International Journal of Information Management, 36(4), 618-625.
Ristov, S., Gusev, M., & Kostoska, M. (2012). Cloud computing security in business information systems. arXiv preprint arXiv:1204.1140.
Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of network and computer applications, 34(1), 1-11.
Tang, Y., Lee, P. P., Lui, J. C., & Perlman, R. (2012). Secure overlay cloud storage with access control and assured deletion. IEEE Transactions on dependable and secure computing, 9(6), 903-916.
Varia, J. (2010). Migrating your existing applications to the aws cloud. A Phase-driven Approach to Cloud Migration.
Wang, F. K., & He, W. (2014). Service strategies of small cloud service providers: A case study of a small cloud service provider and its clients in Taiwan. International Journal of Information Management, 34(3), 406-415.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download