Question:
Discuss About The Cloud Compute Transforming IT And Business?
The Aztec organization wants to transform their working tactics with new and advanced features which helps in enhancing their turnover of the company. The senior executives of the enterprise has decided to transform their working curriculum with the deployment of any one of the recent technology into their enterprise such s bring your own device, migration to cloud computing, changing techniques with IPv6, and other. We as a project consultant recommended the Aztec organization to change their business functionality with the migration of business operation to the external cloud hosting solution.
The changing of the traditional working style with the new innovative concepts is complied with many risks and challenges. The adoption of cloud computing platform increases the risks associated with the traditional physical infrastructure (Hogmen, 2012). The renovation of the existing devices can be easily done with the inclusion of cloud environment with minimum cost.
The follow up of the standard are used for data security to manage the financial security procedures. The analysis of the financial data is measured in terms of government norms. It has been seen that the ethical code of conduct should be deprived in the curriculum of the Aztec organization to improve the financial services by managing good and clear relationship with the banking sector. The customers are provided with the unique banking codes for carrying out effective transaction. The planning of the financial services helps in developing cost effective plan (Chauhan, 2014). The operational policies of the Aztec organization should focuses on deploying insurance service architecture. The budget of the enterprise can be reduced by managing resources availability according to the demand of the user. The capability of the financial sector can be improved with the deployment of cloud software as a service model for effectively managing functions with suppliers, dealers, and customers, and etc. (Dhammeratchi, 2012). The electronic trading services are used for managing the financial services of the Aztec enterprise. The legislation plays an important role in captivating insurance services provided to the financial department with regard to safety, security, integrity, and reliability of the financial processes. It is significantly important for managing rules and regulations associated with the implication of financial market. The legislations which are used for providing financial insurance services to the Aztec organization are categorised as consumer and competition act 2010, law implied for Australian consumers, act passed for corporation 2001, amendment act 2012 for corporations, financial act 2006 passed for counter terrorism and anti-money laundering schemes, and protection act 2010 passed for national consumer. The key legislation which are used for providing efficient financial services for taking authorised decision for business activity, for providing general legislation, legislation used for superannuation policies and standards, and society life insurance. The licence and permits are used for providing insurance to the financial services in the discipline of general ledger, provision developed for providing credit schemes, services related with deposits and custody, and products affiliated to the financial sector of the Aztec organization. The enterprise is moving towards the new and advanced technology for enhancing the advice related to the financial productivity. The financial products can be efficiently taken under consideration with the implication of legislation law in using cloud environment. The market policies of the underlying product changed with the cloud technology for increasing the market ability of the enterprise. It helps in remaining ahead of the competitors in the financial sector by reducing the cost incurred on the resources and other operational functions. The skills of the working employees can be enhanced with the effective management of training and development program for fulfilling the requirement of global demand due to the changing trends of new technology. The owner of the company is working on reducing financial risks associated with the deployment of cloud environment in the traditional working of the company. The financial risks can be reduced by the following procedures:
Implication of Goods and service tax: The good and service tax associated with the productivity should be taken under consideration for achieving the accuracy in the optimization of the product. The GST credits can be claimed by the Aztec organization in the later cases.
Policies related with reinsurance pool corporation: These policies help in administrating and monitoring of the cyber-terrorism activities which focuses on providing facilities to the primary insurers for resolving the issues related with the insurance policies implied on commercial properties harmed by the cyber-terrorism.
The insurance packages used for providing supports to the practitioners of medical market for achieving sustainability of the enterprise. The policies should be developed for financial claims because the decision making capability of the owner can be enhanced by focusing on the potential losses associated with failure of the business operations. The funding activities associated with enterprise helps in levying the charges associated with financial activities.
The capability of the financial services helps in improving the productivity of the organization which creates the environment of innovation by providing open platform for exchanging of vision, thoughts, and business advice. The skills and knowledge of the employees should be improved according to the requirement of management policies for cloud environment. The business strategies should be focused on the health and safety requirement for improving the working standards of the employees. The transformation of traditional working structure with the cloud computing infrastructure can affect the legal compliance with government policies. The working employees should be provided with the standard equipment. The insurance is required for providing general liability to provide financial services to the employees at the time of personal injuries. The superannuation liability helps in developing laws for overcoming the breaches. The financial insurance policies are used for providing financial covers for theft, resource utilization, and others. The operational policies of the Aztec organization should focuses on deploying insurance service architecture. The budget of the enterprise can be reduced by managing resources availability according to the demand of the user.
It has been seen that the traditional working of the enterprise have older version devices which are placed with the help of wires and cables. USB and CD drives are used for storing the data of the organization. The IT department is working on legacy system with the incorporation of adequate security policies. The InfoSec security model is used for securing the traditional processes and application of the Aztec organization. Now it is recommended that with the changing digital technology, the company has to transform their working to the cloud environment. The cloud environment is capable of resolving all the issues of the company which exist with the continuation of the business application. The renovation of the existing devices can be easily done with the inclusion of cloud environment with minimum cost. The data storage capability of the organization can be improved with the management of data on the cloud using Hadoop file system. The Hadoop file system can efficiently maintains the big data of the enterprise for easy retrieval of information. The most important step is to develop a security architecture for the Aztec organization to overcome the problem of risks and challenges. The services provided to the end user can be made secure by organizing a token system. The implementation of the virtual private network helps in managing services of the cloud environment. The framework of the security model depends on the implementation of the following components:
The adoption of cloud computing environment helps in dealing with network management, deployment of the operating system and the databases, inclusion of resource scheduling plan, management of the transactional processing, management of the concurrency control, and planning of memory management. The changing of the traditional working style with the new innovative concepts is complied with many risks and challenges which are categorised as security to the infrastructure, performance of the business activities, data availability on demand, difficulty in the integration of in-house activities, customization support is not applicable, more cost incurred than demand, difficulty in managing back up data which can create a big scenario of complexity at the time of system failure, and others. The following graph shows the statistical representation of risks and challenges associated with the transformation of traditional working system with the cloud computing working system.
The impact of changing the traditional working with the cloud computing for carrying over business activities are comprised of following security concern which are describe below:
The management of risks is the basic criteria for managing the cloud computing activities. The analysis of the security should be done with the help of qualitative and quantitative research methodology. The research methodology was designed to analyse the risks associated with the migration to cloud computing environment.
The migration process is equipped with threats and vulnerabilities because the implementation of the new architecture involves the change management program of the traditional working architecture (Samad, 2014). The migration towards the adoption of cloud is equipped with some major threats which are classified as insecurity associated with the application programming interfaces, inclusion of malicious and virus attacks, vulnerabilities associated with the shared technologies, data leakages, hijacking of user account, and inclusion of risk profile. The Aztec organization is recommended to consider some of the major potential risks which are assimilated with the inclusion of cloud architecture in the working curriculum of the enterprise.
Identification of risks |
Explanation |
Consequences |
Theft of data associated with cloud services |
The unauthenticated person can access the data from the internet |
Physical security of the cloud infrastructure get affected |
Inclusion of DOS attack |
The supply and demand of the resources is not met |
Adverse impact on cloud network |
Scheduling the history of resources used |
||
XML signatures are used getting unauthorised accessing of data from the cloud etwork |
||
Attack of viruses and malware |
Leaking of confidential information of the user login Data leakages The change in behaviour of the cloud services |
The infrastructure of the cloud is get affected |
The implementation of the virtual system |
Data loss |
Cloud physical infrastructure |
Resources used |
||
Process of memory sharing |
Resources are leaked on the external environment |
Cloud physical infrastructure |
User credentials are leaked |
||
Direct attack of malware and viruses |
||
Adverse effect of phishing process |
Accessing of user credentials |
Cloud network and cloud physical infrastructure |
Installation of the malicious codes and viruses |
||
Change in the behaviour of cloud services |
||
Unavailability of the information to the requested client |
||
Installation of the botnets |
Unauthorised accessing of the cloud resource from the external parties |
Cloud network and cloud physical infrastructure |
Changing behaviour of the cloud services |
||
Hacking of confidential and private data |
||
Stenography Attack |
Unauthorised accessing of the cloud resource from the external parties (Marston, 2011) |
Changing behaviour of the cloud services |
The information stored on the user account get deleted |
||
Data loss |
||
Virtual System Rollback |
Inclusion of brute force attack Unauthorised accessing of the cloud resource from the external parties |
Cloud network and cloud physical infrastructure |
Changes in security policies |
The risks associated with the transfer of security policies associated with the traditional infrastructure |
Interface used for developing cloud applications |
Accessing of services on demand |
The resources are not available for use at the time of demand placed |
Inefficiency in the planning processes |
Technical risks |
The technical risks are not available for use at the time of demand placed |
The technical risks associated with the free flow sharing of resources |
Techniques used for interpreting the data |
Data interpretation for decrypting the associated data |
Resource scalability |
Distributed denial of service attack |
Inefficiency in providing cloud services |
Physical infrastructure of the cloud |
Risks associated with the legal process |
The transformation of traditional working structure with the cloud computing infrastructure can affect the legal compliance with government policies |
Physical infrastructure of the cloud |
Inefficiency of the planning process |
The transformation of traditional working structure with the cloud computing infrastructure can affect the legal compliance with government policies (Kaisler, 2012) |
Physical infrastructure of the cloud |
Government security policies are not properly managed |
The consideration is not given to the government policies may result into inefficiency in government compliance |
Providers of the cloud services |
Risks associated with the lock in platforms |
Data leakages due to the sharing of information (Jayachandran, 2013) |
Confidentiality, accuracy, and integrity of the information get lost |
No isolation in the multi-tenancy platform |
Mismanagement in the isolation of multi-tenancy platform |
Cloud network |
Data protection and security |
Data leakages due to the sharing of information |
Confidentiality, accuracy, and integrity of the information get lost |
Internet connectivity portfolio |
Inefficiency in managing many devices on the same cloud |
Failure f connectivity |
Estimating occurrence of risks |
It is difficult in estimating the risks before its occurrence |
|
Cloud services are unavailable |
Inadequacy in controlling of cloud services |
Cloud services |
Inadequacy in the management of internal risks security program |
Inefficiency in controlling internal processing |
Internal cloud infrastructure |
Inadequacy in the management of External risks security program |
Inefficiency in controlling external processing |
External cloud infrastructure |
Threats associated with the differential analysis |
The arrival of the new threats can deform the security code of the traditional environment |
|
Repudiation attack |
It can affect the validity of the messages send by the sender |
|
Man in the middle attack |
It can affect the communication channel placed between the participating units. |
It has been seen that availability and reliability of the application can be increased with the deployment of the application on the cloud. It is difficult to manage the availability of the resources according to the rising demand of the different applications. The security and privacy are the two major issues associated with the cloud computing environment due to the open sharing of the resources and the information. It has been seen that the third party is capable of performing critical operations. The data lock in problem associated with the deployment of activities on the cloud platform. The government compliance procedures should be used for managing the integrity of the legal document. It has been reviewed that the implementation of cloud computing model raises the security concern for physical security associate with the data and information because the technology of cloud computing involves the sharing of resources between different participating units. The contractor should focus on achieving all the activities and requirement mentioned in the service level agreement. The traditional architecture should be integrated with the new system for managing component level services deployed by the cloud supporting applications. The strategic decision should be taken for managing the availability of the resources approved by the vendor (Murray, 2013).
The private cloud environment is used for deploying the business activities of the Aztec enterprise. The inclusion of processes is used for providing privacy and security to the data. It is comprised of four phases which are categorised as pre-virtualization, virtualization, standardization, and automation phase. The pre-virtualization phase is used for developing strategies to increase the efficiency for the effective utilization of the resources. The phase of virtualization is working on managing virtual machine pool on the server. The public key infrastructure is used for managing cryptographic procedures for securing the confidentiality, integrity, and accuracy of the information. The optimization of the resources can helps in developing the cost effective techniques for the enterprise. The availability of the cloud environment helps in developing the resilience network to simplify the operational activities to enhance the cloud infrastructure. The phase of standardization is used for leveraging the diversification of information and application which are deployed on the cloud environment. The phase of automation is used for providing resources to the end user on their demand which helps in improving the working capability of business activities. The following diagram shows the implementation of the four processes to deploy the private cloud environment:
The traditional platform of security infrastructure deployed in the Aztec enterprise required to enhance security the following areas which are classified as:
It is recommended that the Aztec organization should migrate their business processes to cloud computing environment. It is required for the enterprise to develop risk quantification for securing the project from the occurrence of project vulnerabilities. The security of the Aztec organization depends upon resources security for the efficient working of the business processes. The access control mechanism should be used for managing the procedures of resources to be utilized in the effective manner. The provision should be used for deploying the application on the cloud environment (Betcher, 2010). The governance compliance procedures should be used for auditing the vulnerabilities and threats associated with the deployment of procedures and activities. The verification and validation procedures are used for testing the cloud activities which are performed on the cloud environment. It is required for the organization to deploy the security architecture which is given below:
It is recommended for the Aztec organization to deploy the risks mitigation plan in the working curriculum of the enterprise to improve the performance and enhance the business operation. The security procedure plan should be deployed according to the requirement of cloud computing environment. The risks mitigation plan is used for controlling the security architecture of the enterprise (Murray, 2013). The functional unit of the business should be verified and validated at each phase of the business plan. The two based authentication is the recommended protocol which should be used for providing authentication for accessing of the required information from the cloud. The public key infrastructure is used for managing cryptographic procedures for securing the confidentiality, integrity, and accuracy of the information. The processes are effectively managed with the help of auditing procedures and authenticated policies (Oredo, 2014).
Conclusion:
It is concluded that the private cloud environment is used for deploying the business activities of the Aztec enterprise. The adoption of cloud computing platform increases the risks associated with the traditional physical infrastructure. The security of the Aztec organization depends upon resources security for the efficient working of the business processes. The access control mechanism should be used for managing the procedures of resources to be utilized in the effective manner. The security procedures should be used for managing the data loss occurred due to the occurrence of interoperable operations between the participating units.
References:
Betcher, T. (2010). Cloud computing: IT related risks. Retrieved from https://scholarsbank.uoregon.edu/xmlui/bitstream/handle/1794/10207/Betcher-2010.pdf
Bhopale, S. (2013). Cloud Migration Benefits and its challenges issues. Retrieved from https://www.iosrjournals.org/iosr-jce/papers/sicete-volume1/8.pdf
Samad, S. (2014). Mitigating risks in the cloud. Retrieved from https://webobjects.cdw.com/webobjects/media/pdf/Solutions/Cloud-Computing/151383-Mitigating-Risk-in-the-Cloud.pdf
Chauhan, M. (2014). Towards process support for migrating application to cloud computing. Retrieved from https://pure.itu.dk/ws/files/78453849/PID2535147.pdf
Dhammeratchi, D. (2012). Reinventing business with cloud computing. Retrieved from https://www-01.ibm.com/events/wwe/grp/grp033.nsf/vLookupPDFs/CWHK_Cloud_User_Guide_IBM_May_2012/$file/CWHK_Cloud_User_Guide_IBM_May_2012.pdf
Garg, A. (2013). Cloud computing for the financial services industry. Retrieved from https://www.sapient.com/content/dam/sapient/sapientglobalmarkets/pdf/thought-leadership/GM_Cloud_Computing.pdf
Greenwood, D. (2014). Cloud migration: A case study of migrating an enterprise IT system to IAAS. Retrieved from https://www.aspiresys.com/WhitePapers/Cloud-Migration-Methodology.pdf
Hogmen, G. (2012). Benefits, risks, and recommendation for information security. Retrieved from https://resilience.enisa.europa.eu/cloud-security-and-resilience/publications/cloud-computing-benefits-risks-and-recommendations-for-information-security
Jayachandran, J. (2013). Cloud migration methodology. Retrieved from https://www.aspiresys.com/WhitePapers/Cloud-Migration-Methodology.pdf
Kaisler, S. (2012). A decision framework for cloud computing. Retrieved from https://www.computer.org/csdl/proceedings/hicss/2012/4525/00/4525b553.pdf
Kushwah, V. (2013). A security approach for data migration in cloud computing. Retrieved from https://www.iosrjournals.org/iosr-jce/papers/sicete-volume1/8.pdf
Marston, S. (2011). Cloud computing the business perspective. Retrieved from https://www.keencomputer.com/images/KEENCOMP/CLOUD/cloud-computing-business-perspective.pdf
Murray, P. (2013). Common risks of using business apps in the cloud. Retrieved from https://www.us-cert.gov/sites/default/files/publications/using-cloud-apps-for-business.pdf
Oredo, J. (2014). Challenges of cloud computing in business. Retrieved from https://www.ijbssnet.com/journals/Vol_5_No_3_March_2014/18.pdf
Patron, C. (2012). Cloud computing: Transforming IT and business. Retrieved from https://www-01.ibm.com/events/wwe/grp/grp033.nsf/vLookupPDFs/CWHK_Cloud_User_Guide_IBM_May_2012/$file/CWHK_Cloud_User_Guide_IBM_May_2012.pdf
Zhao, J. (2015). Strategies and methods for cloud migration, ”International Journal of automation and computing”, Vol. 11. No (2.)
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download