logo

Risk and Security in Cloud Computing | Report

17 Pages4058 Words59 Views
   

Added on  2020-04-01

Risk and Security in Cloud Computing | Report

   Added on 2020-04-01

ShareRelated Documents
Running head: CLOUD COMPUTING Cloud ComputingName of the StudentName of the UniversityAuthor Note
Risk and Security in Cloud Computing | Report_1
1 CLOUD COMPUTINGExecutive SummaryThe purpose of this report id to highlight the different risks and security concerns associated withthe migration of data of Webb’s store to hybrid cloud. Webb’s Stores is a regional retaileroperating in Australia and New Zealand. The report discusses the different risks and benefits ofusing cloud storage and recommends certain measures of protecting the data. The objective ofthe report is to highlight the different issues and concerns associated with the IaaS cloudinfrastructure.
Risk and Security in Cloud Computing | Report_2
2 CLOUD COMPUTINGTable of ContentsIntroduction..........................................................................................................................31. Migration of MS SQL Server 2012 R2 database to IaaS.................................................31.1. Security Type............................................................................................................31.2. Benefits and Issues with the deployed security measure..........................................42. Risks Associated with the migration of database to cloud..............................................62.1. The Risk in Database................................................................................................62.2. The Risk IaaS Infrastructure.....................................................................................62.3. The Risk in communication between Webb’s and IaaS database............................83. Risk associated with data archival and Data back up......................................................83.1. Risk of Backing up data to the cloud........................................................................83.2. Cloud back up and DR plans....................................................................................94. Access protection on moving to cloud...........................................................................104.1. IaaS Infrastructure..................................................................................................104.2. MS SQL Server 2012 R2 Cloud Instance...............................................................114.3. Cloud network infrastructure..................................................................................114.4. Cloud backup and restore infrastructure.................................................................12Conclusion.........................................................................................................................12References..........................................................................................................................14
Risk and Security in Cloud Computing | Report_3
3 CLOUD COMPUTINGIntroductionWebb’s Stores that operates in Australia and New Zealand has decided to integrate cloudcomputing in their daily operations. In order to do so, they are planning to close their Aucklanddata center and the existing data center would be moved to cloud (Li et al., 2015). The reportdiscusses the risks and security issues associated with a hybrid cloud approach. The differentrisks and associated with backing up of data to cloud and the effects on cloud backup on theirDR plan are elaborated in the following paragraphs. 1. Migration of MS SQL Server 2012 R2 database to IaaS 1.1. Security TypeWebb’s Stores is planning to migrate their MS SQL Server 2012 R2 database to an IaaSinstance in a hybrid cloud environment. However, there are certain risks associated with storingthe database in a hybrid cloud environment and therefore, proper risk mitigation policy is neededto be undertaken. The major types of security that Webb’s Stores can deploy in order to protectthe critical database are encryption of data and authenticated use of data apart from otherstrategies, which include data masking and back up of the data (Hashizume et al., 2013). Encryption is a process of converting a data into cipher text or unreadable text in order toprevent the unauthorized use and access of data. Through the process of encryption, theelectronic data is converted into cipher text. The primary aim of enabling an encryption processin to protect the confidentiality of the digital data stored over the cloud, in this case, it is thedatabase of Webb’s Stores. Different encryption algorithm can be used in order to severe thedatabase. Confidentiality of data is one of the primary aims of encryption and therefore, thismethod will be very effective in securing the database (Malawski et al., 2013).
Risk and Security in Cloud Computing | Report_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
The Hybrid Cloud Approach | Report
|13
|2689
|73

Virtualization and Cloud Computing Assignment | Information Security
|13
|2386
|37

Cloud Computing Assignment No.: Webb's Store
|12
|2648
|105

Cloud Computing in Amazon | Assignment
|15
|2948
|171

Assignment Cloud Computing
|8
|2601
|266

(Solved) Assignment on Cloud Computing
|13
|2925
|208