Webb’s Store, the retail store in Australia has a proposed plan to shift their business activities to the cloud. The various parameters of the Webb have been explained in the report (Beck, Hao & Campan, 2017). The report will highlight risks, threats and the vulnerabilities and risk diminishing procedures. The report will highlight why Webb should adopt Amazon AWS for good.
Webb has planned to shift their business operations to the cloud, therefore they have to consider the issues relevant to the cloud technology (Shufeng & Xu, 2012). The problems associated with the cloud technology are an illegitimate entry to APIs, the attacks conducted by the hacktivists alike the malware attack and the virus attack. Webb Store should follow certain policies to stay protected from all kinds of threats and the risks.
Follow-through: The Webb Store’s database administrators must be acknowledged about every aspect of the cloud technology and the risks associated with the cloud (Azam et al., 2013). They must arrange the files stored in the database accordingly so that they can acquire files stored in the database with ease and that is why they have planned to mark the files
Security associated with network information: The rules and regulations and policies must be implied on both the customers and the employees to limit their access to the database, that will protect the data of Webb’s database to the maximum extent (Sadooghi et al., 2017).
Security Intelligence process: The defence mechanism for the Webb system must be really strong enough to restrict hacktivists of any kind, proper cryptographic methodologies applied within the system can protect the Webb Store from all kinds of data breaches. The cryptographic methodologies are not easy to decipher by the hackers (Dinh et al., 2013). Therefore, the security Intelligence must look upon the defence system in a constant manner to keep the database of Webb Store protected all the time.
Benefits of security –
The primary issue is that Webb will have to pay heavy revenues to Amazon on a yearly basis and monthly basis to acquire the enhanced cloud solutions and the security solutions, Amazon will provide the latest software, hardware and operating system to Webb in lieu of money. This latest configuration will help Webb to get the competitive edge and security from the hackers and malware.
Fig 1: SQL Server and its features
(Source: Tsai et al., 2014, pp-1-15)
The risks involved within the database are-
Data breaches- Webb Store database’s data can get breached by a malware attack. This malware attack is conducted by intruders intentionally to steal sensitive information, to harm one company’s reputation as well. Webb due to the attack from the hackers can face huge monitory loss. The reputation of Webb can be threatened as well.
Account hijacking of customers and employees- The malware attack can cause severe damage to one’s company (Tsai et al., 2014). The DDoS attack can affect Webb’s employees, Webb’s system can get disrupted due to this attack. Again by means of phishing, the customers’ credentials like their username, the password can get stolen due to the phishing attack.
The IaaS infrastructure
The risks involved in IaaS Cloud are-
Misconfigure issues- Webb’s existing hardware, software and the application programs must comply with Amazon AWS cloud architecture. The misconfiguration may arise if hardware, software, operating system and application programs failed to comply with the cloud vendor’s components.
Threat issues- The elements associated with IaaS cloud framework that is vulnerable to malicious threats can be foreseen by the Prioritize and Scan and Remediate methodologies (Manvi, & Shyam, 2014).
Shadow-IT- Shadow-IT generally addresses the assets and the resources that are not being used for long. After adopting the cloud technology, Webb will certainly not use the prevalent database or if used they will not use one or two database components for sure. That unused component scan is vulnerable to threats.
Fig 2: SQL Server risks and their detection
(Source: Gai, & Steenkamp, 2014, pp-28)
Amazon AWS is known to cater the best cloud solutions and they are highly appreciated all over the globe (Gai, & Steenkamp, 2014. Webb in order to adhere to the cloud architecture catered by Amazon they have to make littlest changes to their existing hardware, software components so that they can go well with the cloud architectural components of Amazon AWS.
The threats and the security risks associated with backup of data are-
The benefits that Webb is about to get-
They should have a disaster recovery plan ready, they must store their important files, financial record on the external drive so that they can retrieve those files offline in the absence of Internet. Moreover, offline business activities leave no chance for hackers to attack Webb’s database
Fig 3: Securing Cloud Data
(Source: Manvi, & Shyam, 2014, pp-424-440)
Webb Store can enjoy the Amazon’s AWS services and can carry out their business operations in the fast efficient way (Dillon & Vossen, 2015). Webb though will have to pay to Amazon annually for subscribing their cloud platform, however, they must know that the Amazon’s cloud service will help them in their business in the long run.
Amazon RDS for the SQL server caters excellent services to Webb Store in deploying web applications on the cloud (Varia & Mathew, 2014). Along with that, Web must apply physical security and along with that they must apply digital certificate for ensuring security of their database.
Webb can flourish their business activities with the aid of Amazon’s advanced cloud and security solutions and the latest configuration of AWS has the capability to provide them with the facility to run cloud apps and cloud relevant tasks (Sharma et al., 2017).
Fig 4: Amazon AWS and its services
(Source: Muthui & SISAT, 2013)
Webb’s data gets transmitted via the secured channel and this channel is a capacity to cater secure services to defend the hacktivist (Gai, & Steenkamp, 2014).
Conclusion
It can be concluded from the above discourse that Webb Store can be greatly facilitated by the advanced cloud solutions catered by Amazon AWS. The risks, threats and vulnerabilities related to the cloud platform have been elaborately defined in the report. The procedures to reduce the risks associated with the cloud has been explained in the report as well.
References
Azam, Abdollahzadehgan; Ab Razak Che Hussin; Gohary , Marjan Moshfegh Gohary & Mahyar Amini (2013), The OrganizationalCritical Success Factors for Adopting Cloud Computing in SMEs, Journal of Information Systems Research and Innovation (JISRI), Volume 4, Issue 1, pp. 67-74.
Beck, M., Hao, W., & Campan, A. (2017, January). Accelerating the Mobile cloud: Using Amazon Mobile Analytics and k-means clustering. In Computing and Communication Workshop and Conference (CCWC), 2017 IEEE 7th Annual (pp. 1-7). IEEE.
Dillon, S., & Vossen, G. (2015). SaaS cloud computing in small and medium enterprises: A comparison between Germany and New Zealand. International Journal of Information Technology, Communications and Convergence, 3(2), 87-104.
Dinh, H. T., Lee, C., Niyato, D., & Wang, P. (2013). A survey of mobile cloud computing: architecture, applications, and approaches. Wireless communications and mobile computing, 13(18), 1587-1611.
Gai, K., & Steenkamp, A. (2014). A feasibility study of Platform-as-a-Service using cloud computing for a global service organization. Journal of Information Systems Applied Research, 7(3), 28.
Manvi, S. S., & Shyam, G. K. (2014). Resource management for Infrastructure as a Service (IaaS) in cloud computing: A survey. Journal of Network and Computer Applications, 41, 424-440.
Muthui, M., & SISAT, C. (2013). Amazon Web Services.
Sadooghi, I., Martin, J. H., Li, T., Brandstatter, K., Maheshwari, K., de Lacerda Ruivo, T. P. P., … & Raicu, I. (2017). Understanding the performance and potential of cloud computing for scientific applications. IEEE Transactions on Cloud Computing, 5(2), 358-371.
Sharma, P., Lee, S., Guo, T., Irwin, D., & Shenoy, P. (2017). Managing Risk in a Derivative IaaS Cloud. IEEE Transactions on Parallel and Distributed Systems.
Shufeng Gao & Xu, Ai, (2012) Boosting Electronic Business Applications by Digitally Enabling SMBs with Cloud Computing Model, 11th International Symposium on Distributed Computing and Applications to Business, Engineering & Science, pp-214-218.
Tsai, W., Bai, X., & Huang, Y. (2014). Software-as-a-service (SaaS): perspectives and challenges. Science China Information Sciences, 57(5), 1-15.
Varia, J., & Mathew, S. (2014). Overview of amazon web services. Amazon Web Services.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download