CIS142_2.7_Project_Part_1_Cloud_Deployment_Model_Cloud_Provider_Corey_Adams

docx

School

ECPI University, Greensboro *

*We aren’t endorsed by this school

Course

142

Subject

Computer Science

Date

Jan 9, 2024

Type

docx

Pages

7

Uploaded by corada5995

Report
CLOUD COMPUTING PROJECT: PART 1 - 4 Corey Adams | CIS142 | 8/23/2022
Introduction Cloud Computing can be an alternative to datacenters on-premises. All aspects of managing on-premise datacenters are our responsibility. This includes installing hardware, virtualization, and operating system, as well as setting up the network and configuring firewalls. After we have completed the setup, we are responsible for maintaining it. Cloud Computing manages hardware purchase and maintenance. They also provide a variety platforms and software as an option. We will begin our journey with cloud computing software and all it has to offer good and bad, then, educate on threats and how to mitigate them, and finally, conclude with business continuity and disaster recovery through cloud computing. SaaS (Software as a Service) Out of all the SaaS providers, I would pick Amazon Web Services, IBM, and Slack. AWS would be the number one option from the list of three. In these challenging times, Amazon has been the only one to beat. Slack, IBM Cloud and Amazon's AWS offer excellent cloud services for developers and users alike. IBM Cloud is likely to be their closest competitor due to its quality and the number of services they offer. AWS offers the same number of services as IBM Cloud, but more because they are determined to grow the market. This growing market now extends into the online world. AWS addressed these challenges with its development and frontier in the gaming industry. Epic Games was one PAGE 1
of the key players in Epic's continued sustainability after the pandemic. They also worked closely with Epic Games. AWS covers a wide range of companies, so this was true for several other companies. Amazon has performed well across all platforms of business. With the world constantly changing and cloud services proving their worth, it is not surprising that Amazon is outperforming other companies. Amazon has been a trusted business partner for many small- and large enterprises since before the pandemic. Amazon's Web Service quality, stability, and flexibility in cloud service have demonstrated their commitment to the world’s development. AWS (SaaS) Advantages and Disadvantages This is an "if" scenario, which asks whether AWS could allow users on- site purchase hardware for their services. Amazon Web Services offers many options for software as a service. These services can be accessed from many users and businesses. It is possible only because of Amazon and an internet connection. This excludes any Offline Modes available or any restrictions. While they can assure a reliable uptime rate of 99.999% and availability rate of 99.999%, AWS will not allow anyone to access their work if it is down. It is necessary to download it. You may need hardware that is dedicated to making these services available. AWS is more convenient if the hardware is available. Unfortunately, we cannot fix all problems. AWS cannot reply immediately, or send a representative, if it does. Both the advantages as well as the disadvantages of these options are inherent. These drawbacks point out the benefits of other options. Amazon's PAGE 2
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
reliability is a significant advantage when you consider the cloud services that Amazon Web Services offers. Amazing uptime and availability are both remarkable. Threats and Mitigation Software as a Service is vulnerable to many types of attacks. Amazon is limited in its resources so it cannot guarantee security. SaaS is susceptible to many of the same threats we all encounter every single day. Phishing, physical hacking/intrusion and other threats are just a few of the many that we encounter in our daily computer use. Although these threats are quite common, they can result in loss of work and even company shutdowns. We have been trained in Phishing. Avoid opening suspicious emails and avoiding links from unknown origin. There are many people out there trying to steal company information. It is incredible how many things can be embedded within emails and provided hidden hyperlinks. Untrained targets make it extremely difficult to avoid phishing. Regular training is a great way to ensure that you are well-prepared for these tactics. Even though physical hacking/intrusions may seem rare, they are quite common. They could be carrying ladders in the building to claim maintenance. IT sends support to inspect hardware. This could happen when someone claims that they forgot their badge but asks for your help to open it. A company could lose everything if employees forget to lock their doors after they use the restroom. If you spot something, let us know. To prevent this from happening, businesses have several identification procedures. PAGE 3
Power outages could cause inconveniences and/or serious delays, as well as loss of work/progress. Normal circumstances will usually protect equipment. It is possible that surge protectors might need to be replaced depending upon the nature of the outage. However, data loss can be frustrating. While it is a promising idea to save data as you go, it can happen that data becomes corrupted, particularly if the SaaS provider goes down. These outages can often be avoided by using surge protectors or emergency generators. All businesses face serious problems from zero-day attacks. After malicious actors have discovered an issue, monitoring securities might not detect it immediately. A zero-day vulnerability can typically be enough to take out a business. Businesses can lose millions in customers. Businesses make every effort to minimize these threats by hiring capable people to evaluate their defenses. The objective is to catch the exploiter before they do. Most internal leakages involve employees who are unhappy and leave the company to go work for another company. Employees then use the knowledge and skills that they have gained and pass it on to their competitor. The voluntary sharing of secrets and other practices from previous companies is now possible. Most large-scale companies deter this with the contracts signed by their employees/developers. Even if they have left the company under Nondisclosure agreements, they could still be responsible for contract obligations. Business Continuity and Disaster Recovery PAGE 4
Business Continuity Plans, Disaster Recovery Plans, and Business Continuity Plans help reduce the impact on your business network from outages. These plans identify ways to increase your company's recovery ability after disasters happen and to reduce the risk of data loss. These plans are often made back when your infrastructure was locally hosted. The BCDR must be updated as soon as your business moves to the cloud. Your data center is located in the cloud. There is software and hardware virtualization. Cloud usage allows you to recover your data quickly and easily from outages or natural catastrophes. Cloud storage makes it easy to retrieve your data because it is always online. Cloud storage is less expensive than localized solutions. This allows you to save money when backing up your data. Backups can be easily set up to automatically run at certain times. This allows your business's operations to continue at all times. Backups can easily be restored. It is 99 percent better than backup media like tapes or disks. You only need an internet connection. Once your BCDR has been verified, you can quickly restore business as normal. Conclusion Customers are responsible to ensure that applications remain accessible in the cloud. It is essential to identify what a catastrophe is. Then, you can develop a disaster recovery strategy to address the possible impact on business results. After performing risk assessments and impact analysis, you can develop Recovery Time Objectives and Recovery Point Objectives, then choose the appropriate architecture to stop disasters. It is important to ensure that disaster detection can be done quickly and easily. It is important PAGE 5
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
to have a plan. Make sure to test it. In the event that disaster recovery plans are not validated, they may be rejected or not implemented. This is because there is not enough confidence in their ability. References Amazon. (2022, July). Amazon . Retrieved from AWS: https://aws.amazon.com/ Cox Business. (2022, August). How Cloud Computing Enhances Business Continuity and Disaster Recovery . Retrieved from Cox Business: https://www.cox.com/business/cloud-services/resources/business- continuity-disaster-recovery.html#:~:text=Since%20the%20cloud %20utilizes%20the,a%20natural%20disaster%20or%20emergency. IBM. (2022, August). IBM Cloud . Retrieved from IBM: https://www.ibm.com/cloud Jay, A. (n.d.). 10 SaaS Security Risks And Concerns Every User Has . Retrieved from FinancesOnline: https://financesonline.com/10-saas- security-risks-concerns-every-user/ Slack. (2022, August). Slack Features . Retrieved from Slack: https://slack.com/features PAGE 6