Regional Gardens Cloud Architectures: A Survey
VerifiedAdded on 2021/05/31
|35
|7774
|328
AI Summary
Cloud Computing Cloud Computing Cloud Computing Cloud Computing Student Name University Name Date: Executive Summary This report highlights suitable cloud architectures that Regional Gardens must employ to achieve its business strategy. Contents Contents 3 Introduction 4 Part 1 4 Cloud architectures employ to assist Regional Gardens in meeting the Board's strategy 4 Cloud Architectures for Regional Gardens 5 Benefits and issues result of deployment of these architectures for Regional Gardens 6 Part 2 8 Risks associated with Hybrid Cloud and Microservices strategy 9 Each risk 12 Possible control for the risk 13
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: Cloud Computing
Cloud Computing
Student Name
University Name
Date:
Cloud Computing
Student Name
University Name
Date:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Cloud Computing
Executive Summary
This report highlights suitable cloud architectures that Regional Gardens must employ to achieve
its business strategy. Benefits and issues of deploying cloud architectures are also included in
this report. Risks that are associated with new Microservices strategy and Hybrid Cloud are
included in this report. General Information protection steps as well as controls for hybrid cloud
infrastructure are also highlighted in this report. Recommendations for Regional Gardens’ BCP
are also discussed in this report. Remote server administration for the resource management
along with SLA management for PaaS and IaaS and instances required for Regional Gardens
also included in this report.
2 | P a g e
Executive Summary
This report highlights suitable cloud architectures that Regional Gardens must employ to achieve
its business strategy. Benefits and issues of deploying cloud architectures are also included in
this report. Risks that are associated with new Microservices strategy and Hybrid Cloud are
included in this report. General Information protection steps as well as controls for hybrid cloud
infrastructure are also highlighted in this report. Recommendations for Regional Gardens’ BCP
are also discussed in this report. Remote server administration for the resource management
along with SLA management for PaaS and IaaS and instances required for Regional Gardens
also included in this report.
2 | P a g e
Cloud Computing
Contents
Contents...........................................................................................................................................3
Introduction......................................................................................................................................4
Part 1................................................................................................................................................4
Cloud architectures employ to assist Regional Gardens in meeting the Board's strategy...............4
Cloud Architectures for Regional Gardens......................................................................................5
Benefits and issues result of deployment of these architectures for Regional Gardens..................6
Part 2................................................................................................................................................8
Risks associated with Hybrid Cloud and Microservices strategy....................................................9
Each risk........................................................................................................................................12
Possible control for the risk...........................................................................................................13
Part 3..............................................................................................................................................15
General Information Security steps and controls...........................................................................15
Part 4..............................................................................................................................................19
Recommendations included in Regional Gardens’s BCP.............................................................19
Application resilience, disaster recovery and backup issues in Hybrid Cloud..............................21
Part 5..............................................................................................................................................24
Requirements for Remote Server Administration.........................................................................24
SLA associated with storage..........................................................................................................24
Part 6..............................................................................................................................................28
Conclusion.....................................................................................................................................29
References......................................................................................................................................31
3 | P a g e
Contents
Contents...........................................................................................................................................3
Introduction......................................................................................................................................4
Part 1................................................................................................................................................4
Cloud architectures employ to assist Regional Gardens in meeting the Board's strategy...............4
Cloud Architectures for Regional Gardens......................................................................................5
Benefits and issues result of deployment of these architectures for Regional Gardens..................6
Part 2................................................................................................................................................8
Risks associated with Hybrid Cloud and Microservices strategy....................................................9
Each risk........................................................................................................................................12
Possible control for the risk...........................................................................................................13
Part 3..............................................................................................................................................15
General Information Security steps and controls...........................................................................15
Part 4..............................................................................................................................................19
Recommendations included in Regional Gardens’s BCP.............................................................19
Application resilience, disaster recovery and backup issues in Hybrid Cloud..............................21
Part 5..............................................................................................................................................24
Requirements for Remote Server Administration.........................................................................24
SLA associated with storage..........................................................................................................24
Part 6..............................................................................................................................................28
Conclusion.....................................................................................................................................29
References......................................................................................................................................31
3 | P a g e
Cloud Computing
Introduction
Regional Garden Co., Ltd. Company operates a large number of gardening companies. It has a
very large display of gardening products and is open every year for public inspection. This
includes public and regional landscape planners providing garden advice, design and consultancy
services to Regional garden nursery sales plants and garden supplies. The regional garden board
is considering this strategy to improve the company's responsiveness and flexibility. The council
also hopes to significantly reduce the expenses of maintaining its ICT framework by closing its
existing data center. They understand that this requires the retraining of existing ICT personnel
so that they can manage the new cloud-based infrastructure. The regional gardens contact you
again and advise them on this strategy. It has been suggested to the Regional Gardens that this
planned approach means that they ultimately need to easily design as well as operate a "hybrid
cloud" approach where some of the data centers are "on-premise" and the other is the cloud.
Regional Garden also plans to organize risk and safety seminars to assess the risks, safety issues
and possible controls needed for this "hybrid cloud" approach. This study includes how this
approach will affect its BCP and its backup as well as disaster recovery strategy.
Part 1
Cloud architectures employ to assist Regional Gardens in meeting the Board's
strategy
Cloud architecture shows different components such as databases, software functions, and
applications. Its purpose is to use the power of cloud resources to solve business problems.
Defines cloud architecture companies as well as their relationships. The entire cloud architecture
4 | P a g e
Introduction
Regional Garden Co., Ltd. Company operates a large number of gardening companies. It has a
very large display of gardening products and is open every year for public inspection. This
includes public and regional landscape planners providing garden advice, design and consultancy
services to Regional garden nursery sales plants and garden supplies. The regional garden board
is considering this strategy to improve the company's responsiveness and flexibility. The council
also hopes to significantly reduce the expenses of maintaining its ICT framework by closing its
existing data center. They understand that this requires the retraining of existing ICT personnel
so that they can manage the new cloud-based infrastructure. The regional gardens contact you
again and advise them on this strategy. It has been suggested to the Regional Gardens that this
planned approach means that they ultimately need to easily design as well as operate a "hybrid
cloud" approach where some of the data centers are "on-premise" and the other is the cloud.
Regional Garden also plans to organize risk and safety seminars to assess the risks, safety issues
and possible controls needed for this "hybrid cloud" approach. This study includes how this
approach will affect its BCP and its backup as well as disaster recovery strategy.
Part 1
Cloud architectures employ to assist Regional Gardens in meeting the Board's
strategy
Cloud architecture shows different components such as databases, software functions, and
applications. Its purpose is to use the power of cloud resources to solve business problems.
Defines cloud architecture companies as well as their relationships. The entire cloud architecture
4 | P a g e
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Cloud Computing
is designed to provide users with high bandwidth, allowing users to gain access to data and to
applications without interruption (Cowan, 2011). On-demand responsive networks can move
efficiently and quickly between servers and even between clouds, the most important being
network security. The large number of cloud-based building blocks selected by Regional Garden
Co., Ltd. has brought new possibilities to the cloud architecture and brought new challenges.
Cloud architecture begins with sticking to the familiar concepts of local architecture. Cloud
computing is public computing based on the Internet, basically sharing software, resources, and
information used by the end users that are hosted on a virtual server. Few people call anything
outside the company or user's private firewall as the cloud (Lang & Schreiner, 2011). Personal
computing has been developed in three different phases. The very first stage is where data and
applications are stored on the local desktop. Next phase is the application resides on the desktop
with local servers moreover utility software as well as the Internet to provide valuable
information. From the day of the popular Internet usage, Network Architecture illustrates the
Internet as a cloud so that the end can hide the user's complexity - hence the name is called
Cloud Computing resides in services as data centers with application or software server forms
and redundant storage. Finally users can access them through a web browser in a laptop or
handheld device. Google Apps, Salesforce and Facebook are examples of cloud computing,
especially for younger generations, which are quite popular (Lang & Schreiner, 2011).
Cloud Architectures for Regional Gardens
Reasons to Choose SaaS
The SaaS model is widely used a cloud model. Regional Gardens needs to build its career
development in several aspects. Therefore, for this situation, SaaS is best service modes based on
the following important features: So as to increase the efficiency of the company for all the
5 | P a g e
is designed to provide users with high bandwidth, allowing users to gain access to data and to
applications without interruption (Cowan, 2011). On-demand responsive networks can move
efficiently and quickly between servers and even between clouds, the most important being
network security. The large number of cloud-based building blocks selected by Regional Garden
Co., Ltd. has brought new possibilities to the cloud architecture and brought new challenges.
Cloud architecture begins with sticking to the familiar concepts of local architecture. Cloud
computing is public computing based on the Internet, basically sharing software, resources, and
information used by the end users that are hosted on a virtual server. Few people call anything
outside the company or user's private firewall as the cloud (Lang & Schreiner, 2011). Personal
computing has been developed in three different phases. The very first stage is where data and
applications are stored on the local desktop. Next phase is the application resides on the desktop
with local servers moreover utility software as well as the Internet to provide valuable
information. From the day of the popular Internet usage, Network Architecture illustrates the
Internet as a cloud so that the end can hide the user's complexity - hence the name is called
Cloud Computing resides in services as data centers with application or software server forms
and redundant storage. Finally users can access them through a web browser in a laptop or
handheld device. Google Apps, Salesforce and Facebook are examples of cloud computing,
especially for younger generations, which are quite popular (Lang & Schreiner, 2011).
Cloud Architectures for Regional Gardens
Reasons to Choose SaaS
The SaaS model is widely used a cloud model. Regional Gardens needs to build its career
development in several aspects. Therefore, for this situation, SaaS is best service modes based on
the following important features: So as to increase the efficiency of the company for all the
5 | P a g e
Cloud Computing
remote regions and overseas missions Regional Gardens must use SaaS which is one of suitable
option for dealing with problems that may be encountered (Pathari & Sonar, 2012). This includes
service management, security, and the integration of organizational operations, which seems to
be smoother and easier than any other traditional approach. When migrating all data centers to
one single host location (where all is controlled and centralized from a node), cost minimization
can be handled very efficiently. All the tasks of processing software as well as related
deployments are controlled by any third-party vendor (Wang & Hou, 2011).
Reasons for using PaaS
Since the applications and data are locally managed and the third-party vendors have a high level
of control, it is critical to train employees to migrate data from the Regional Garden data center
to other data centers. Many security and Consistency of the data may be affected, resulting in
data loss. In order to overcome shortcomings, SaaS is the main choice and makes operations
easier and more flexible (Lin & Huang, 2016).
Benefits and issues result of deployment of these architectures for Regional Gardens
Benefits to using SaaS
When Regional Garden Co., Ltd. adapts to SaaS, there are several advantages in making internal
management easier to operate.
• Higher reliability as well as the availability
• Reduce management work
• Collaboration across large business areas
• Zero infrastructure
• Provide a high level of services
6 | P a g e
remote regions and overseas missions Regional Gardens must use SaaS which is one of suitable
option for dealing with problems that may be encountered (Pathari & Sonar, 2012). This includes
service management, security, and the integration of organizational operations, which seems to
be smoother and easier than any other traditional approach. When migrating all data centers to
one single host location (where all is controlled and centralized from a node), cost minimization
can be handled very efficiently. All the tasks of processing software as well as related
deployments are controlled by any third-party vendor (Wang & Hou, 2011).
Reasons for using PaaS
Since the applications and data are locally managed and the third-party vendors have a high level
of control, it is critical to train employees to migrate data from the Regional Garden data center
to other data centers. Many security and Consistency of the data may be affected, resulting in
data loss. In order to overcome shortcomings, SaaS is the main choice and makes operations
easier and more flexible (Lin & Huang, 2016).
Benefits and issues result of deployment of these architectures for Regional Gardens
Benefits to using SaaS
When Regional Garden Co., Ltd. adapts to SaaS, there are several advantages in making internal
management easier to operate.
• Higher reliability as well as the availability
• Reduce management work
• Collaboration across large business areas
• Zero infrastructure
• Provide a high level of services
6 | P a g e
Cloud Computing
• Work anytime, anywhere
• Enduring customer relationships
• Data recovery and Backup
Issues to use SaaS
Although there are several advantages to applying Regional Gardens Ltd to the SaaS cloud
service model, there is an obligation to restrict end users from considering changing their
traditional infrastructure to a new service model (Gluchman, 2016).
• Access control loss
• Limited application
• Connection requirements
• Bit slowly as compared to client/server apps
• Additional training costs for employees to adapt to the new system
• Data security is always controlled by third-party vendors and is not 100% trustworthy
• Terminating the switch between supplier contracts and SaaS providers
• More dependent on the internet.
Benefits to using PaaS
• It is very clear from these descriptions of PaaS platform that developers have many options.
• Initially, developing applications on the PaaS platform greatly reduce the time as well as
resources needed to develop the cloud-based applications (Zúñiga-Prieto, González-Huerta,
Insfran & Abrahão, 2016). By providing a higher level of service, developers can always take
benefits of out-of-the-box functionality without having to spend time re-creating these services.
Issues to use PaaS
7 | P a g e
• Work anytime, anywhere
• Enduring customer relationships
• Data recovery and Backup
Issues to use SaaS
Although there are several advantages to applying Regional Gardens Ltd to the SaaS cloud
service model, there is an obligation to restrict end users from considering changing their
traditional infrastructure to a new service model (Gluchman, 2016).
• Access control loss
• Limited application
• Connection requirements
• Bit slowly as compared to client/server apps
• Additional training costs for employees to adapt to the new system
• Data security is always controlled by third-party vendors and is not 100% trustworthy
• Terminating the switch between supplier contracts and SaaS providers
• More dependent on the internet.
Benefits to using PaaS
• It is very clear from these descriptions of PaaS platform that developers have many options.
• Initially, developing applications on the PaaS platform greatly reduce the time as well as
resources needed to develop the cloud-based applications (Zúñiga-Prieto, González-Huerta,
Insfran & Abrahão, 2016). By providing a higher level of service, developers can always take
benefits of out-of-the-box functionality without having to spend time re-creating these services.
Issues to use PaaS
7 | P a g e
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Cloud Computing
• Because the PaaS platform gives a higher level of programming framework and abstraction, it
can accelerate the development of some cloud-based applications and migrate existing SaaS-
based applications to the cloud (Abu Sharkh & Shami, 2017). However, these advantages are
some costs for developers. Balanced costs and benefits indicate the use of the situation for the
use of PaaS, when this is not a case.
• The first challenge for PaaS is a lookout platform. With the use of higher-level service and
programming models, the dependence on these services and access methods depends on these
services.
Part 2
The hybrid cloud computing model is an integrated service model that comprehensively uses
public as well as private clouds in order to perform several operations associated with regional
garden organizations. Public clouds will be used for all the non-sensitive information and
operations, and private service cloud models for sensitive operations related to internal
operations (Pahl, Jamshidi & Weyns, 2017).
8 | P a g e
• Because the PaaS platform gives a higher level of programming framework and abstraction, it
can accelerate the development of some cloud-based applications and migrate existing SaaS-
based applications to the cloud (Abu Sharkh & Shami, 2017). However, these advantages are
some costs for developers. Balanced costs and benefits indicate the use of the situation for the
use of PaaS, when this is not a case.
• The first challenge for PaaS is a lookout platform. With the use of higher-level service and
programming models, the dependence on these services and access methods depends on these
services.
Part 2
The hybrid cloud computing model is an integrated service model that comprehensively uses
public as well as private clouds in order to perform several operations associated with regional
garden organizations. Public clouds will be used for all the non-sensitive information and
operations, and private service cloud models for sensitive operations related to internal
operations (Pahl, Jamshidi & Weyns, 2017).
8 | P a g e
Cloud Computing
Fig 1: Hybrid cloud model
Image Source: realstorygroup.com
Risks associated with Hybrid Cloud and Microservices strategy
Hybrid cloud computing is highly complex Information Technology architecture that involves
various combinations of private clouds, public clouds, and local IT. Complex IT staff is required
to build and run an end-to-end infrastructure that must support continuous data transfer between
all of these platforms and ensure continuous governance wherever data flows. Many IT
departments do not have the necessary internal expertise, so managers need to determine if they
want to hire, sign contracts or provide training for internal IT(Clarke, 2015) (Grützmacher,
2015).
Loss of control: When processing data, cloud providers must undergo full security control
review. Once the cloud is deployed, companies lose the ability to manage their individual data
sets. Regional Garden’s managers must know which security or safety levels are accessible in the
cloud to secure them from accidents(Zhou, Wu & Hong, 2013). Flawless hybrid cloud
9 | P a g e
Fig 1: Hybrid cloud model
Image Source: realstorygroup.com
Risks associated with Hybrid Cloud and Microservices strategy
Hybrid cloud computing is highly complex Information Technology architecture that involves
various combinations of private clouds, public clouds, and local IT. Complex IT staff is required
to build and run an end-to-end infrastructure that must support continuous data transfer between
all of these platforms and ensure continuous governance wherever data flows. Many IT
departments do not have the necessary internal expertise, so managers need to determine if they
want to hire, sign contracts or provide training for internal IT(Clarke, 2015) (Grützmacher,
2015).
Loss of control: When processing data, cloud providers must undergo full security control
review. Once the cloud is deployed, companies lose the ability to manage their individual data
sets. Regional Garden’s managers must know which security or safety levels are accessible in the
cloud to secure them from accidents(Zhou, Wu & Hong, 2013). Flawless hybrid cloud
9 | P a g e
Cloud Computing
computing management can only be achieved when all know what have to be done. Work should
be defined strictly in accordance with management procedures and policies. Without these
guidelines, the network may be affected. A holistic advancement should be taken in order to deal
with the overall infrastructure (Singh, 2015).
Design of network issues: Any hybrid cloud computing model that seeks long-term success
requires excellent network design. Your network needs to consider various factors such as
network bandwidth, management between public and private clouds, the impact of network
location, network requirements for each application, security requirements for different types of
data, and many other factors. Different applications need to run in different parts of the cloud
environment. Understanding the scalability requirements of each application will impact your
network and infrastructure design (ZENG & WU, 2013). When it comes to the network, cloud
administrators also need to consider the limitations of the public cloud, they need to develop
strategies to solve this problem. However, services such as Azure and Cloud Hybrid Services
now provide solutions that enable customers to securely broaden existing data centers without
compromising security and response levels (Banerjee, Kundu & Dattagupta, 2013).
Data Compliance: When it comes to compliance, hybrid clouds require more due diligence.
Both public cloud providers and your private cloud must meet compliance parameters. As data
moves back and forth, maintaining and demonstrating compliance is more difficult for mixed
models.
Scalability: Incomplete security protocols from cloud providers can damage data that may be
damaged, corrupted, or improperly accessed. This is particularly true in the job-driven BYOD
environment (Philip & Bharadi, 2016). Not all staff members as well as insiders are reliable.
10 | P a g e
computing management can only be achieved when all know what have to be done. Work should
be defined strictly in accordance with management procedures and policies. Without these
guidelines, the network may be affected. A holistic advancement should be taken in order to deal
with the overall infrastructure (Singh, 2015).
Design of network issues: Any hybrid cloud computing model that seeks long-term success
requires excellent network design. Your network needs to consider various factors such as
network bandwidth, management between public and private clouds, the impact of network
location, network requirements for each application, security requirements for different types of
data, and many other factors. Different applications need to run in different parts of the cloud
environment. Understanding the scalability requirements of each application will impact your
network and infrastructure design (ZENG & WU, 2013). When it comes to the network, cloud
administrators also need to consider the limitations of the public cloud, they need to develop
strategies to solve this problem. However, services such as Azure and Cloud Hybrid Services
now provide solutions that enable customers to securely broaden existing data centers without
compromising security and response levels (Banerjee, Kundu & Dattagupta, 2013).
Data Compliance: When it comes to compliance, hybrid clouds require more due diligence.
Both public cloud providers and your private cloud must meet compliance parameters. As data
moves back and forth, maintaining and demonstrating compliance is more difficult for mixed
models.
Scalability: Incomplete security protocols from cloud providers can damage data that may be
damaged, corrupted, or improperly accessed. This is particularly true in the job-driven BYOD
environment (Philip & Bharadi, 2016). Not all staff members as well as insiders are reliable.
10 | P a g e
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Cloud Computing
Some insiders might be using customers or sensitive information to disturb corporate activities.
This creates a lack of scalability issues for hybrid cloud and micro-services strategies.
11 | P a g e
Some insiders might be using customers or sensitive information to disturb corporate activities.
This creates a lack of scalability issues for hybrid cloud and micro-services strategies.
11 | P a g e
Cloud Computing
Each risk
Risk
Description
Likelihood Impact Priority Preventive Actions Contingency
Plans
Loss of
control
High High Very
High
Maintain updated
security firewall
networks.
Differentiate security
access level on both
clouds
Backup is
initiated.
Restrict private
data with certified
personnel’s
Design of
the network
issues
Medium High Medium Bandwidth must be
precise for the public
cloud as well as for
private cloud.
Independent servers need
to be properly installed.
Can't proceed to a
higher level
unless the proper
infrastructure is
determined
Data
Compliance
High Very
High
High Understand all regulatory
compliance laws.
Configure furthermore
maintain the security
policy.
Proof of policy
document is must
be created as well
as signed by
parties
12 | P a g e
Each risk
Risk
Description
Likelihood Impact Priority Preventive Actions Contingency
Plans
Loss of
control
High High Very
High
Maintain updated
security firewall
networks.
Differentiate security
access level on both
clouds
Backup is
initiated.
Restrict private
data with certified
personnel’s
Design of
the network
issues
Medium High Medium Bandwidth must be
precise for the public
cloud as well as for
private cloud.
Independent servers need
to be properly installed.
Can't proceed to a
higher level
unless the proper
infrastructure is
determined
Data
Compliance
High Very
High
High Understand all regulatory
compliance laws.
Configure furthermore
maintain the security
policy.
Proof of policy
document is must
be created as well
as signed by
parties
12 | P a g e
Cloud Computing
Scalability Low Low Low Interdependency of the
security tools should be
minimized in order to
decrease intrusion attacks
and data
redundancy(Pahl, 2015)
.
Considering
essential
conditions or
situations that
will surely scale
for high growth
Possible control for the risk
It is understood that the security issue is the primary factor affecting the large-scale adoption of
cloud computing. Although this might be true, more detailed definition is suitable: organizations
focus on the security features of the public cloud-based computing, but do not care about private
cloud security. This hybrid cloud computing (that is, a hybrid public and private hybrid) can
cause security problems compared to processing its various components. From a realistic
perspective, Hybrid Cloud's most important security decision is to choose an instrument that will
be used to manage the environment. By defining, a hybrid cloud has a communication interaction
between public and private cloud infrastructure, so that the tool is flexible enough to manage
both the environment and to implement its security needs(Bernstein, 2014). When Hybrid Cloud
Complies with the Computing Management Tools it provides a management interface for various
cloud providers, especially if Regional Park does not use the same public and private cloud
providers. Its web-based management platform provides an intangible interface for various low-
level APIs of various cloud providers, which is more user-friendly than combining it alone.
Sharing an identity is especially one aspect of the considered hybrid cloud. Regional garden
13 | P a g e
Scalability Low Low Low Interdependency of the
security tools should be
minimized in order to
decrease intrusion attacks
and data
redundancy(Pahl, 2015)
.
Considering
essential
conditions or
situations that
will surely scale
for high growth
Possible control for the risk
It is understood that the security issue is the primary factor affecting the large-scale adoption of
cloud computing. Although this might be true, more detailed definition is suitable: organizations
focus on the security features of the public cloud-based computing, but do not care about private
cloud security. This hybrid cloud computing (that is, a hybrid public and private hybrid) can
cause security problems compared to processing its various components. From a realistic
perspective, Hybrid Cloud's most important security decision is to choose an instrument that will
be used to manage the environment. By defining, a hybrid cloud has a communication interaction
between public and private cloud infrastructure, so that the tool is flexible enough to manage
both the environment and to implement its security needs(Bernstein, 2014). When Hybrid Cloud
Complies with the Computing Management Tools it provides a management interface for various
cloud providers, especially if Regional Park does not use the same public and private cloud
providers. Its web-based management platform provides an intangible interface for various low-
level APIs of various cloud providers, which is more user-friendly than combining it alone.
Sharing an identity is especially one aspect of the considered hybrid cloud. Regional garden
13 | P a g e
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Cloud Computing
hybrids grow for the cloud of their corporate identity solutions, but they must check that the
public cloud expansion will affect the security of the private cloud and the entire company.
Compared with controlling implementation issues, this is more like a risk assessment issue
(Szyjewski & Niemcewicz, 2016). Regional gardens will need to ensure that their mechanisms
for providing and consuming identities do not reduce the security in their private clouds.
Familiar management tools and technologies: IT security teams must change their
perspectives and focus on protecting workloads and cloud-based data, not just servers and
networks. For example, cloud-based workloads that contain regulated data should use similar
control and monitoring measures as the mission-critical servers that reside on the corporate
network. Similarly, SDN policies should simulate policies related to firewall rules and network
segmentation. It should be based on workload classification, location and access requirements,
through the expansion of strategic management, supply and configuration management
technology to complete.
Comprehensive visibility, monitoring, and reporting: The security team cannot manage
incomprehensible content, which applies to all security activities related to physical, virtual, and
hybrid cloud infrastructures (Sala-Zárate & Colombo-Mendoza, 2012). The security team also
needs to cover the entire range of security monitoring and analysis tools to reduce risk, detect
problems, and respond quickly to incidents.
Support cloud automation and coordination: Hybrid cloud security management must work
closely with the DevOps process. This requires the ability to create security templates so that
according to workload classification, compliance requirements or corporate governance
automatically provide the correct security controls.
14 | P a g e
hybrids grow for the cloud of their corporate identity solutions, but they must check that the
public cloud expansion will affect the security of the private cloud and the entire company.
Compared with controlling implementation issues, this is more like a risk assessment issue
(Szyjewski & Niemcewicz, 2016). Regional gardens will need to ensure that their mechanisms
for providing and consuming identities do not reduce the security in their private clouds.
Familiar management tools and technologies: IT security teams must change their
perspectives and focus on protecting workloads and cloud-based data, not just servers and
networks. For example, cloud-based workloads that contain regulated data should use similar
control and monitoring measures as the mission-critical servers that reside on the corporate
network. Similarly, SDN policies should simulate policies related to firewall rules and network
segmentation. It should be based on workload classification, location and access requirements,
through the expansion of strategic management, supply and configuration management
technology to complete.
Comprehensive visibility, monitoring, and reporting: The security team cannot manage
incomprehensible content, which applies to all security activities related to physical, virtual, and
hybrid cloud infrastructures (Sala-Zárate & Colombo-Mendoza, 2012). The security team also
needs to cover the entire range of security monitoring and analysis tools to reduce risk, detect
problems, and respond quickly to incidents.
Support cloud automation and coordination: Hybrid cloud security management must work
closely with the DevOps process. This requires the ability to create security templates so that
according to workload classification, compliance requirements or corporate governance
automatically provide the correct security controls.
14 | P a g e
Cloud Computing
Advanced Security Controls: With the development of regional garden clouds, new types of
security controls are evolving. For example, both cloud and SDDC technologies are based on
network security that supports micro-segmentation and use software to create virtual network
segments for communication between allocated assets. Micro-segmentation can be an important
first step in avoiding cyber attacks in virtual networks (Vostokin, Artamonov & Tsarev, 2018).
Heterogeneous Technical Support: Regional gardens increasingly follow a data center strategy
that integrates open source, on-premises private cloud and SDDC technologies, and public cloud
infrastructure. Therefore, cloud security tools must integrate with leading cloud and SDDC
technologies, and use common command and control management and report to provide
enterprises with appropriate security oversight (Ajoudanian & Ahmadi, 2012).
Part 3
General Information Security steps and controls
After careful caution, IT officials should decide to take public and private cloud services and best
cloud service providers to make the best mix of their unique IT and business objectives. The
deeper study of Hybrid Cloud Solutions will remove the general misconceptions related to
hybrid clouds. U.S. In view of the Department of State Security Department, government
agencies with strict security requirements like American citizenship and immigration services
and federal emergency management agencies have accepted the Public Cloud Policy. Obviously
cloud security rumors are being shelved(Chang, 2015). For service providers responsible for
infrastructure hybrid cloud services, companies can take advantage of the physical infrastructure
provided by cloud service providers, security control and security expertise to find them ahead of
the security curve. Leading cloud providers often have more security expertise and utilize newer
15 | P a g e
Advanced Security Controls: With the development of regional garden clouds, new types of
security controls are evolving. For example, both cloud and SDDC technologies are based on
network security that supports micro-segmentation and use software to create virtual network
segments for communication between allocated assets. Micro-segmentation can be an important
first step in avoiding cyber attacks in virtual networks (Vostokin, Artamonov & Tsarev, 2018).
Heterogeneous Technical Support: Regional gardens increasingly follow a data center strategy
that integrates open source, on-premises private cloud and SDDC technologies, and public cloud
infrastructure. Therefore, cloud security tools must integrate with leading cloud and SDDC
technologies, and use common command and control management and report to provide
enterprises with appropriate security oversight (Ajoudanian & Ahmadi, 2012).
Part 3
General Information Security steps and controls
After careful caution, IT officials should decide to take public and private cloud services and best
cloud service providers to make the best mix of their unique IT and business objectives. The
deeper study of Hybrid Cloud Solutions will remove the general misconceptions related to
hybrid clouds. U.S. In view of the Department of State Security Department, government
agencies with strict security requirements like American citizenship and immigration services
and federal emergency management agencies have accepted the Public Cloud Policy. Obviously
cloud security rumors are being shelved(Chang, 2015). For service providers responsible for
infrastructure hybrid cloud services, companies can take advantage of the physical infrastructure
provided by cloud service providers, security control and security expertise to find them ahead of
the security curve. Leading cloud providers often have more security expertise and utilize newer
15 | P a g e
Cloud Computing
technologies to fully secure applications and data on Regional Garden’s infrastructure. Cloud
provider organizations are provided with the firewall as part of their services to learn how their
threats are being attacked by existing threats. Cloud providers can combine employees and
contractor directories with access control policies to manage access to the cloud system in a
centralized and comprehensive manner. Equally important, data theft sometimes allows
employees to steal hard drives, so placing the data off-site of hybrid cloud provider equipment
eliminates this potential risk (Fazio et al., 2016). In a public cloud environment, Regional
Gardens can also obtain the net benefits of security needs demanded by its customers. The
company might not be capable to prove the multi-factor protection or security of the data center.
As per the “Private Cloud Reality and Vision” report released in the year 2012, almost 90% of
security issues are related with data security and privacy, 62% control and visibility loss, and
40% are related to cloud integration.
The major concerns faced by Regional Gardens are:
Access Control and Identity Management
Continuing compliance issues
Access of data from mobile devices
Safety standards and certification
Mixed customer data
Best practices for using AWS advanced security controls and measures to address security issues
apply to internal and public data within the organization (Gordon, 2016)
.
16 | P a g e
technologies to fully secure applications and data on Regional Garden’s infrastructure. Cloud
provider organizations are provided with the firewall as part of their services to learn how their
threats are being attacked by existing threats. Cloud providers can combine employees and
contractor directories with access control policies to manage access to the cloud system in a
centralized and comprehensive manner. Equally important, data theft sometimes allows
employees to steal hard drives, so placing the data off-site of hybrid cloud provider equipment
eliminates this potential risk (Fazio et al., 2016). In a public cloud environment, Regional
Gardens can also obtain the net benefits of security needs demanded by its customers. The
company might not be capable to prove the multi-factor protection or security of the data center.
As per the “Private Cloud Reality and Vision” report released in the year 2012, almost 90% of
security issues are related with data security and privacy, 62% control and visibility loss, and
40% are related to cloud integration.
The major concerns faced by Regional Gardens are:
Access Control and Identity Management
Continuing compliance issues
Access of data from mobile devices
Safety standards and certification
Mixed customer data
Best practices for using AWS advanced security controls and measures to address security issues
apply to internal and public data within the organization (Gordon, 2016)
.
16 | P a g e
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Cloud Computing
Fig 2: AWS shared sources
Image Source: slideshare.net
Since it is recommended to use efficient security tools to protect organizational data at various
access levels, the following recommendations are recommended:
Fraud recognition
AWS includes a private subnet that also helps encrypt data using the advanced data Encryption
Standard.
Provides safety logs as well as cloud HSMs to store the keys with the Amazon EC2 key pairs.
Help users identify information assets that must be protected.
Authorization to Applications and Data:
AWS offers endpoint API admittance using a protected SSL connection.
Built-in firewall allows traffic to be filtered through a network, creating several accesses in the
similar instance without any interruption.
17 | P a g e
Fig 2: AWS shared sources
Image Source: slideshare.net
Since it is recommended to use efficient security tools to protect organizational data at various
access levels, the following recommendations are recommended:
Fraud recognition
AWS includes a private subnet that also helps encrypt data using the advanced data Encryption
Standard.
Provides safety logs as well as cloud HSMs to store the keys with the Amazon EC2 key pairs.
Help users identify information assets that must be protected.
Authorization to Applications and Data:
AWS offers endpoint API admittance using a protected SSL connection.
Built-in firewall allows traffic to be filtered through a network, creating several accesses in the
similar instance without any interruption.
17 | P a g e
Cloud Computing
AWS provides a single user access account to help access a console that provides service levels
and is utilized to verify SSH access.
Sign in Cloud Authentication
It moreover gives multi-factor authentication to help user accounts more secure and reliable
(Junfeng & Weiping, 2016)
Helps create private network connections.
Supply access authentication, the users can access data merely after being properly authorized.
Avoid invalid logical access attempts.
Governance & Compliance
AWS According to the Payment Card Industry DSS, AWS meets Level 1 standards. This helps
the user store all personal information, credit card data for storage as well as processing. It is a
conference information security standard certified by the ISO 27001 standards.
Transfer existing system information, applications, plus custom log files in order to Cloud Watch
Logs and help monitor these logs.
With Cloud Trial, it provides reports on AWS API calls.
AVPC to help users create their own IP address spaces to make private clouds in the AWS cloud.
This also uses the RFC1918 private space.
Operating system Hardening in addition to updates
Use Amazon Machine Image (AMI) to help standardize operating systems and standardize
system integration updates that users want to deploy
Nowadays IT organizations have to face challenge and complexity in optimizing IT budget and
providing optimum services for internal and external customers(Li, 2015). Whether it is cost-
cutting infrastructure, simplifying IT management, delivery of services or improving in other
ways, it is not necessary for the strategic IT decision to get daily work and support- IP please
18 | P a g e
AWS provides a single user access account to help access a console that provides service levels
and is utilized to verify SSH access.
Sign in Cloud Authentication
It moreover gives multi-factor authentication to help user accounts more secure and reliable
(Junfeng & Weiping, 2016)
Helps create private network connections.
Supply access authentication, the users can access data merely after being properly authorized.
Avoid invalid logical access attempts.
Governance & Compliance
AWS According to the Payment Card Industry DSS, AWS meets Level 1 standards. This helps
the user store all personal information, credit card data for storage as well as processing. It is a
conference information security standard certified by the ISO 27001 standards.
Transfer existing system information, applications, plus custom log files in order to Cloud Watch
Logs and help monitor these logs.
With Cloud Trial, it provides reports on AWS API calls.
AVPC to help users create their own IP address spaces to make private clouds in the AWS cloud.
This also uses the RFC1918 private space.
Operating system Hardening in addition to updates
Use Amazon Machine Image (AMI) to help standardize operating systems and standardize
system integration updates that users want to deploy
Nowadays IT organizations have to face challenge and complexity in optimizing IT budget and
providing optimum services for internal and external customers(Li, 2015). Whether it is cost-
cutting infrastructure, simplifying IT management, delivery of services or improving in other
ways, it is not necessary for the strategic IT decision to get daily work and support- IP please
18 | P a g e
Cloud Computing
increase competitive advantage. IT departments should ensure data security, enter the cloud In
some years, progressive organizations have increased the use of cloud computing in various
industries around the world. Many organizations have observed whether there is a difference
between developments or production environment in the cloud or private and public clouds, and
that cloud services can be offered for IT investment, which is not possible in the traditional IT
infrastructure model. Although these commercial benefits are very attractive, yet there is a major
concern for cloud security for many IT organizations. In fact, the 2011 IDG search survey
conducted by corporate decision-making companies around the world, cloud attendance is the
biggest difficulty in controlling security issues and controlling controls. What legal service
providers want to see, taking into account security measures and understanding industry-specific
compliance requirements is one of the methods discussed in this white paper which helps to deal
with safety restrictions. Which usually prohibits the adoption of senior management cloud
adoption and overcoming these security constraints is tremendous(Rashidi, 2012).
Part 4
Recommendations included in Regional Gardens’s BCP
As a result of adapting to the hybrid cloud deployment model, the following must be considered:
Application Flexibility: In order to enhance resiliency, the factors that need to be considered are
low dependencies, enhanced security and load balancing, which help loosely couple system
components when accessing different components, and increase scalability and security by
enforcing least privilege. It is usually implemented by some redundant components, and if one
of the elements fails, the repeating elements will seamlessly take over plus continue computing-
based services(Singh, 2015)
19 | P a g e
increase competitive advantage. IT departments should ensure data security, enter the cloud In
some years, progressive organizations have increased the use of cloud computing in various
industries around the world. Many organizations have observed whether there is a difference
between developments or production environment in the cloud or private and public clouds, and
that cloud services can be offered for IT investment, which is not possible in the traditional IT
infrastructure model. Although these commercial benefits are very attractive, yet there is a major
concern for cloud security for many IT organizations. In fact, the 2011 IDG search survey
conducted by corporate decision-making companies around the world, cloud attendance is the
biggest difficulty in controlling security issues and controlling controls. What legal service
providers want to see, taking into account security measures and understanding industry-specific
compliance requirements is one of the methods discussed in this white paper which helps to deal
with safety restrictions. Which usually prohibits the adoption of senior management cloud
adoption and overcoming these security constraints is tremendous(Rashidi, 2012).
Part 4
Recommendations included in Regional Gardens’s BCP
As a result of adapting to the hybrid cloud deployment model, the following must be considered:
Application Flexibility: In order to enhance resiliency, the factors that need to be considered are
low dependencies, enhanced security and load balancing, which help loosely couple system
components when accessing different components, and increase scalability and security by
enforcing least privilege. It is usually implemented by some redundant components, and if one
of the elements fails, the repeating elements will seamlessly take over plus continue computing-
based services(Singh, 2015)
19 | P a g e
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Cloud Computing
.
Backup & disaster recovery: By considering that IASO's backup speed gives unique
technology for backing up 9,000 files in one second, it uses a profound de-duplication phase that
helps capture a full backup, thus reducing cost as well as storage space. It helps to keep the best
low bandwidth and CPU usage. AWS accesses backup data by providing multifactor
authentication, and provides various functions by storing data in different locations, such as
AWS Storage Gateway, Amazon S3, as well as Amazon EC2 for the recovery of data(Pahl,
2015).
Data Integration: AWS Storage Gateway helps seamlessly provide consistent output data
between local and public clouds. Using Amazon Redshift to quickly load data into the Amazon
S3 helps company to efficiently manage large amounts of data by using RDS-compliant database
engines for example Oracle and Microsoft SQL Server(Bernstein, 2014).
Cost Effectiveness: As large amounts of data enter the cloud, the precise storage cost will
become a user network's concern and impact. Therefore, by adopting a CloudArray that
minimizes costs through de-duplication and advanced compression technologies, the storage
requirement is limited to 10 times or more. Helps limit data to the cloud using a granular
bandwidth scheduler based on business requirements.
HYBRID CLOUD Migration
This disclosure is an impetus for the advancement of our crossover cloud. Company will now
have to begin the way toward offloading the objective workload to the cloud supplier in the
office. The arrangement gives streamlined execution and lessens Regional Gardens' objective in
hyper-converged arrangements while additionally tending to cost and capital use issues. Not at
all like the troubles experienced while picking an equipment seller, the greatest test in executing
20 | P a g e
.
Backup & disaster recovery: By considering that IASO's backup speed gives unique
technology for backing up 9,000 files in one second, it uses a profound de-duplication phase that
helps capture a full backup, thus reducing cost as well as storage space. It helps to keep the best
low bandwidth and CPU usage. AWS accesses backup data by providing multifactor
authentication, and provides various functions by storing data in different locations, such as
AWS Storage Gateway, Amazon S3, as well as Amazon EC2 for the recovery of data(Pahl,
2015).
Data Integration: AWS Storage Gateway helps seamlessly provide consistent output data
between local and public clouds. Using Amazon Redshift to quickly load data into the Amazon
S3 helps company to efficiently manage large amounts of data by using RDS-compliant database
engines for example Oracle and Microsoft SQL Server(Bernstein, 2014).
Cost Effectiveness: As large amounts of data enter the cloud, the precise storage cost will
become a user network's concern and impact. Therefore, by adopting a CloudArray that
minimizes costs through de-duplication and advanced compression technologies, the storage
requirement is limited to 10 times or more. Helps limit data to the cloud using a granular
bandwidth scheduler based on business requirements.
HYBRID CLOUD Migration
This disclosure is an impetus for the advancement of our crossover cloud. Company will now
have to begin the way toward offloading the objective workload to the cloud supplier in the
office. The arrangement gives streamlined execution and lessens Regional Gardens' objective in
hyper-converged arrangements while additionally tending to cost and capital use issues. Not at
all like the troubles experienced while picking an equipment seller, the greatest test in executing
20 | P a g e
Cloud Computing
a crossbreed IT arrangement is the absence of topic mastery that includes cloud relocation
administrations (Szyjewski & Niemcewicz, 2016). This is the first occasion when that a
territorial garden has executed this kind of condition and it is hard to know where to begin.
Application resilience, disaster recovery and backup issues in Hybrid Cloud
Application Resilience issues: The rapid decline in the price of cloud storage services is driving
Regional Gardens to move from expensive traditional storage systems to cloud storage services.
While cloud storage should definitely be part of your future storage infrastructure, there are some
limitations that you should keep in mind. Nirvanix’s untimely collapse forced its customers to
rush to abandon their cloud storage services, shocking early adopters and underlining the need
for cloud federation and data migration services. Long-distance data migration is still a problem
for enterprises, especially those with large workloads ranging from hundreds of TB to several
petabytes.
Backup Issues: The large scale of some organizations leads to the "insurance" of disaster
recovery very expensive. Refreshing the disaster recovery infrastructure is a slow and laborious
process. Reducing the data center footprint means hardware, maintenance; utility and operator
costs are reduced. From a business perspective, the environment is purely logical, so the
overhead for maintaining it is much smaller(SManjunath & Basu, 2012).
Disaster Recovery issues: Traditional DR is common but effective in most situations. DR will
not be too difficult as long as it is maintained and the flow of the letter is followed. However,
there are some common experiences among organizations that indicate a new disaster recovery
motivation: organizational growth and changes in the causes of change in infrastructure. The
backup strategy may be ignored until it is too late and the data is lost.Hybrid Cloud adds the
21 | P a g e
a crossbreed IT arrangement is the absence of topic mastery that includes cloud relocation
administrations (Szyjewski & Niemcewicz, 2016). This is the first occasion when that a
territorial garden has executed this kind of condition and it is hard to know where to begin.
Application resilience, disaster recovery and backup issues in Hybrid Cloud
Application Resilience issues: The rapid decline in the price of cloud storage services is driving
Regional Gardens to move from expensive traditional storage systems to cloud storage services.
While cloud storage should definitely be part of your future storage infrastructure, there are some
limitations that you should keep in mind. Nirvanix’s untimely collapse forced its customers to
rush to abandon their cloud storage services, shocking early adopters and underlining the need
for cloud federation and data migration services. Long-distance data migration is still a problem
for enterprises, especially those with large workloads ranging from hundreds of TB to several
petabytes.
Backup Issues: The large scale of some organizations leads to the "insurance" of disaster
recovery very expensive. Refreshing the disaster recovery infrastructure is a slow and laborious
process. Reducing the data center footprint means hardware, maintenance; utility and operator
costs are reduced. From a business perspective, the environment is purely logical, so the
overhead for maintaining it is much smaller(SManjunath & Basu, 2012).
Disaster Recovery issues: Traditional DR is common but effective in most situations. DR will
not be too difficult as long as it is maintained and the flow of the letter is followed. However,
there are some common experiences among organizations that indicate a new disaster recovery
motivation: organizational growth and changes in the causes of change in infrastructure. The
backup strategy may be ignored until it is too late and the data is lost.Hybrid Cloud adds the
21 | P a g e
Cloud Computing
benefits of personal and public excitement. The organization uses a private part of the cloud for
mission-critical applications using Hybrid Cloud, as well as the least serious application that uses
public cloud. The advantage of using this combination is that the private clusters provide
improved protection, while the public cloud may reduce the cost of business continuity. Due to
the many data leakages, data protection is a major concern for IT managers(Abu Sharkh &
Shami, 2017). The DR program for BC should be based on a private cloud. Because only one
customer uses this service in a private cloud, the (Chang, 2015). Other cloud service providers
encrypt data and passwords even for a reliable security solution, transmitting data from a client's
firewall to a private cloud. This can be another backbone of increased security. Since private
cloud is a dedicated club, so the cost structure of these services will be very high. In this case,
non-complicated applications are often not organized in such an expensive environment to
reduce costs, these non-critical applications and data may be stored on a public cloud. Even if the
public cloud is not safe, this does not mean that anyone can easily attack the system. Public
clouds will also have access controls, and most cloud service providers use a two-step approach
system to authenticate users. Particularly serious disaster problem and business continuity
process should be in a private cloud. This happens automatically and will ensure that recovery
times and recovery points can be achieved by customer metrics when the product stops. By
accessing programs that are located in the DR / BC private cloud, IT manager can resume
production and the server can reload, get patched security, and run unexpectedly in recovery
mode, private cloud will be able to handle the number of data traffic because organization data is
non- Store in Critical Applications and Public Clouds, because it can be repaired in Even if the
time has passed, it will not have significant fatalities. Even the public cloud can easily and easily
handle any peak data transfer. In both cases, IT managers should ensure proper bandwidth
22 | P a g e
benefits of personal and public excitement. The organization uses a private part of the cloud for
mission-critical applications using Hybrid Cloud, as well as the least serious application that uses
public cloud. The advantage of using this combination is that the private clusters provide
improved protection, while the public cloud may reduce the cost of business continuity. Due to
the many data leakages, data protection is a major concern for IT managers(Abu Sharkh &
Shami, 2017). The DR program for BC should be based on a private cloud. Because only one
customer uses this service in a private cloud, the (Chang, 2015). Other cloud service providers
encrypt data and passwords even for a reliable security solution, transmitting data from a client's
firewall to a private cloud. This can be another backbone of increased security. Since private
cloud is a dedicated club, so the cost structure of these services will be very high. In this case,
non-complicated applications are often not organized in such an expensive environment to
reduce costs, these non-critical applications and data may be stored on a public cloud. Even if the
public cloud is not safe, this does not mean that anyone can easily attack the system. Public
clouds will also have access controls, and most cloud service providers use a two-step approach
system to authenticate users. Particularly serious disaster problem and business continuity
process should be in a private cloud. This happens automatically and will ensure that recovery
times and recovery points can be achieved by customer metrics when the product stops. By
accessing programs that are located in the DR / BC private cloud, IT manager can resume
production and the server can reload, get patched security, and run unexpectedly in recovery
mode, private cloud will be able to handle the number of data traffic because organization data is
non- Store in Critical Applications and Public Clouds, because it can be repaired in Even if the
time has passed, it will not have significant fatalities. Even the public cloud can easily and easily
handle any peak data transfer. In both cases, IT managers should ensure proper bandwidth
22 | P a g e
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Cloud Computing
capabilities and additional features that are easily available. Because of the terrible competition
in the IT sector, transitioning hybrid system requires those companies' pricing effectiveness, cost
reduction, but there is no security cost(Gordon, 2016)
. The organization does not need to maintain an off-site production center, which can remain
inactive for many years and cannot be used. The DR / BC plan is based on hybrid cloud system,
when virtual infrastructure is destroyed, virtual desktops can be used in the cloud and the product
can continue. Hybrid Cloud Solution for Business Continuity is a win for any organization
(wins). It provides low-cost information and data security for IT managers.
23 | P a g e
capabilities and additional features that are easily available. Because of the terrible competition
in the IT sector, transitioning hybrid system requires those companies' pricing effectiveness, cost
reduction, but there is no security cost(Gordon, 2016)
. The organization does not need to maintain an off-site production center, which can remain
inactive for many years and cannot be used. The DR / BC plan is based on hybrid cloud system,
when virtual infrastructure is destroyed, virtual desktops can be used in the cloud and the product
can continue. Hybrid Cloud Solution for Business Continuity is a win for any organization
(wins). It provides low-cost information and data security for IT managers.
23 | P a g e
Cloud Computing
Part 5
Requirements for Remote Server Administration
The basic needs to be easily considered for the remote management are dependable Internet
connection and a applicable IP address. You must also install connection server software to
prevent safety breaches. A few examples of the servers are named as Windows Server 2003, and
2008, and Linux also chains Secure Shell SSH for remote management, which assists to secure
connections (Hameed, Haider & Kantarci, 2017).
SLA associated with storage
Service Level Agreements (SLAs) help to establish contractual terms in the services provided at
each stage. The cloud storage service is provided by a third-party vendor and manages billing by
annual plan or contract-based service billing to provide various functions with reasonable
pricing.
The following figure shows the AWS cloud data storage service based on the user needs.
24 | P a g e
Part 5
Requirements for Remote Server Administration
The basic needs to be easily considered for the remote management are dependable Internet
connection and a applicable IP address. You must also install connection server software to
prevent safety breaches. A few examples of the servers are named as Windows Server 2003, and
2008, and Linux also chains Secure Shell SSH for remote management, which assists to secure
connections (Hameed, Haider & Kantarci, 2017).
SLA associated with storage
Service Level Agreements (SLAs) help to establish contractual terms in the services provided at
each stage. The cloud storage service is provided by a third-party vendor and manages billing by
annual plan or contract-based service billing to provide various functions with reasonable
pricing.
The following figure shows the AWS cloud data storage service based on the user needs.
24 | P a g e
Cloud Computing
Fig 4: Pricing of the AWS Storage specifications
Image Source: aws.amazon.com
25 | P a g e
Fig 4: Pricing of the AWS Storage specifications
Image Source: aws.amazon.com
25 | P a g e
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Cloud Computing
Fig 5: Data Transfer Pricing for AWS Services
Image Source: aws.amazon.com
26 | P a g e
Fig 5: Data Transfer Pricing for AWS Services
Image Source: aws.amazon.com
26 | P a g e
Cloud Computing
Fig 6: AWS vs. Google vs. Azure
Image Source: zdnet.com
From the mentioned price point of view, AWS is usually considered as the medium price among
three providers(Rashidi, 2012). Things to consider are geographical location, hourly and minute
pricing, domestic business and international business. Longer contracts offer higher discount
rates. Billing options vary based on usage. The AWS uses commercially reasonable efforts to
perform the percentage of uptime (defined below) available in the Monthly Billing Cycle
("Service Commitment") of each month, and the percentage of uptime per month is at least
99.99%(Zhou, Wu & Hong, 2013). Regional Gardens will apply any service credits for future
Amazon EC2 or Amazon EBS payments that they pay. Depending on the judgment, Regional
Gardens can issue credit cards to service credit which is used for absence. Service Points will not
allow company to receive refunds or other payments from the AWS. Service credit will only be
27 | P a g e
Fig 6: AWS vs. Google vs. Azure
Image Source: zdnet.com
From the mentioned price point of view, AWS is usually considered as the medium price among
three providers(Rashidi, 2012). Things to consider are geographical location, hourly and minute
pricing, domestic business and international business. Longer contracts offer higher discount
rates. Billing options vary based on usage. The AWS uses commercially reasonable efforts to
perform the percentage of uptime (defined below) available in the Monthly Billing Cycle
("Service Commitment") of each month, and the percentage of uptime per month is at least
99.99%(Zhou, Wu & Hong, 2013). Regional Gardens will apply any service credits for future
Amazon EC2 or Amazon EBS payments that they pay. Depending on the judgment, Regional
Gardens can issue credit cards to service credit which is used for absence. Service Points will not
allow company to receive refunds or other payments from the AWS. Service credit will only be
27 | P a g e
Cloud Computing
applicable and issued when the monthly billing period exceeded the ($1) credit amount. Service
numbers cannot be transferred to any other account or not implemented unless expressed by the
AWS agreement, if you do not see any unavailable, non-availability given to Amazon EC2 or
MASS Or if there is only one solution to other failures, then SLA is to get service credit (if
eligible) based on the following conditions (Philip & Bharadi, 2016).
Part 6
Steps that include in the plan to move their eMail instance to the AWS cloud:
At this stage, as the company gradually adopts more and more IT product portfolios, Regional
Garden migrates existing applications (including mission-critical applications or the entire data
center) to the cloud. From all appearances, we seem to have moved to SharePoint 2013
migration. Compared to previous versions, SharePoint 2013 has experienced a relatively slow
adoption cycle because organizations pause to understand the impact of the new version and in
many cases understand their cloud strategy. Migrating to the latest version seems to be
increasing speed. More and more companies are approving budgets and updating plans, and with
this trend and more firm cloud strategies in place, the Regional Garden has seen increased
interest in SharePoint Online and Office 365. Identify critical workloads or use cases first and
prioritize them based on business impact. Then, first deal with the most important workloads.
Think about Regional Garden's strategic initiatives and how it can help Regional Garden meet
these workload requirements. The core of any knowledge management platform is the
classification of Regional Garden. Without strong classification criteria, your data will still grow,
but the content will become less "visible." Both SharePoint 2013 and 2016 provide delayed site
collection upgrades, and site collection administrators can upgrade themselves after upgrading
the preview. At a fine grain, Regional Garden's can upgrade the site collection to 2013 or 2016,
28 | P a g e
applicable and issued when the monthly billing period exceeded the ($1) credit amount. Service
numbers cannot be transferred to any other account or not implemented unless expressed by the
AWS agreement, if you do not see any unavailable, non-availability given to Amazon EC2 or
MASS Or if there is only one solution to other failures, then SLA is to get service credit (if
eligible) based on the following conditions (Philip & Bharadi, 2016).
Part 6
Steps that include in the plan to move their eMail instance to the AWS cloud:
At this stage, as the company gradually adopts more and more IT product portfolios, Regional
Garden migrates existing applications (including mission-critical applications or the entire data
center) to the cloud. From all appearances, we seem to have moved to SharePoint 2013
migration. Compared to previous versions, SharePoint 2013 has experienced a relatively slow
adoption cycle because organizations pause to understand the impact of the new version and in
many cases understand their cloud strategy. Migrating to the latest version seems to be
increasing speed. More and more companies are approving budgets and updating plans, and with
this trend and more firm cloud strategies in place, the Regional Garden has seen increased
interest in SharePoint Online and Office 365. Identify critical workloads or use cases first and
prioritize them based on business impact. Then, first deal with the most important workloads.
Think about Regional Garden's strategic initiatives and how it can help Regional Garden meet
these workload requirements. The core of any knowledge management platform is the
classification of Regional Garden. Without strong classification criteria, your data will still grow,
but the content will become less "visible." Both SharePoint 2013 and 2016 provide delayed site
collection upgrades, and site collection administrators can upgrade themselves after upgrading
the preview. At a fine grain, Regional Garden's can upgrade the site collection to 2013 or 2016,
28 | P a g e
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Cloud Computing
and then use Export/Import to move individual sites although this may prove challenging
depending on SharePoint.
Critical points and issues
One of biggest issue of migrating to the cloud is cost savings. By running applications in the
cloud, companies do not have to pay IT staff to manage e-mail, handle large data centers,
purchase as much hardware as possible, and keep applications running. The most expensive part
of the migration is often moving storage or data. "It may require a 100GB database." Cloud
providers do not know how to charge for data, but if the volume of data is huge, it may take
weeks or months. , especially if this is their first migration, and it is found that cloud-smart
people may be challenging and expensive, and without cloud knowledge, migration may take
longer than expected and experience more problems. The IT department may find that they just
moved the old internal deployment to the cloud.
Conclusion
To maximize the flexibility to provide as much service as possible to most companies and to
move towards their hybrid cloud access, your IT service provider looking for a better way to
adjust costs. Responsible for reviewing its options, the IT Director discovered that hybrid cloud
has provided the same or better security for the company's business-critical applications and data,
which led to the closure of which they were supposed to load workloads in the cloud. The
question about sensitivity was given. Top hybrid cloud providers have data center infrastructure
and expertise to ensure that there are adequate security measures to protect information in the
cloud. The physical, activity, and network processes used in the cloud and controls, physical,
activity, and controls used by internal systems of network processes and organizations, and
29 | P a g e
and then use Export/Import to move individual sites although this may prove challenging
depending on SharePoint.
Critical points and issues
One of biggest issue of migrating to the cloud is cost savings. By running applications in the
cloud, companies do not have to pay IT staff to manage e-mail, handle large data centers,
purchase as much hardware as possible, and keep applications running. The most expensive part
of the migration is often moving storage or data. "It may require a 100GB database." Cloud
providers do not know how to charge for data, but if the volume of data is huge, it may take
weeks or months. , especially if this is their first migration, and it is found that cloud-smart
people may be challenging and expensive, and without cloud knowledge, migration may take
longer than expected and experience more problems. The IT department may find that they just
moved the old internal deployment to the cloud.
Conclusion
To maximize the flexibility to provide as much service as possible to most companies and to
move towards their hybrid cloud access, your IT service provider looking for a better way to
adjust costs. Responsible for reviewing its options, the IT Director discovered that hybrid cloud
has provided the same or better security for the company's business-critical applications and data,
which led to the closure of which they were supposed to load workloads in the cloud. The
question about sensitivity was given. Top hybrid cloud providers have data center infrastructure
and expertise to ensure that there are adequate security measures to protect information in the
cloud. The physical, activity, and network processes used in the cloud and controls, physical,
activity, and controls used by internal systems of network processes and organizations, and
29 | P a g e
Cloud Computing
better, and more often related to them. Using a secure hybrid cloud, the business is a valuable
internal IT industry. Can eliminate resources, IT for business renewal Redistribute budget and
can ensure that their applications and data are 24x7 available and continue to provide
competitive advantages. It also concludes that the continuity of business is the starting driver of
change, and re-evaluation of hybrid cloud strategy allows regional sector IT There may be
substantial improvement in the infrastructure. This is related to the story of the Business
Continuity Plan (BCP) because users can still use difficult systems like related systems like e-
mail and file storage. Not only that we have successfully implemented a business continuity plan
to ensure the availability of systems, better performance and provide a simple solution for
regional horticulture. After talking about the advantages and disadvantages, it is clear that there
is no clear answer to the support or resistance of the cloud computing. Until now, from the
company's point of view, this is a hybrid solution. Some key, business-sensitive applications will
continue to use traditional business models as long as the concerns about confidentiality and
legal issues are removed from the cloud, and simple applications in the cloud space will become
more and more popular. This concept and technology is still present here, but it is still in its
savings and is still a great way to go.
30 | P a g e
better, and more often related to them. Using a secure hybrid cloud, the business is a valuable
internal IT industry. Can eliminate resources, IT for business renewal Redistribute budget and
can ensure that their applications and data are 24x7 available and continue to provide
competitive advantages. It also concludes that the continuity of business is the starting driver of
change, and re-evaluation of hybrid cloud strategy allows regional sector IT There may be
substantial improvement in the infrastructure. This is related to the story of the Business
Continuity Plan (BCP) because users can still use difficult systems like related systems like e-
mail and file storage. Not only that we have successfully implemented a business continuity plan
to ensure the availability of systems, better performance and provide a simple solution for
regional horticulture. After talking about the advantages and disadvantages, it is clear that there
is no clear answer to the support or resistance of the cloud computing. Until now, from the
company's point of view, this is a hybrid solution. Some key, business-sensitive applications will
continue to use traditional business models as long as the concerns about confidentiality and
legal issues are removed from the cloud, and simple applications in the cloud space will become
more and more popular. This concept and technology is still present here, but it is still in its
savings and is still a great way to go.
30 | P a g e
Cloud Computing
References
Abu Sharkh, M., & Shami, A. (2017). An evergreen cloud: Optimizing energy efficiency in
heterogeneous cloud computing architectures. Vehicular Communications, 9, 199-210.
Banerjee, C., Kundu, A., & Dattagupta, R. (2013). SaaS Oriented Generic Cloud Compiler.
Procedia Technology, 10, 253-261.
Bernstein, D. (2014). Cloud Foundry Aims to Become the OpenStack of PaaS. IEEE Cloud
Computing, 1(2), 57-60.
Clarke, R. (2015). Does SaaS Backup Pass the Fitness-for-Purpose Test?. IEEE Cloud
Computing, 2(6), 58-63.
Grützmacher, M. (2015). „Software as der Datendose" – Outsourcing, Cloud, SaaS & Co.
Computer Und Recht, 31(12).
Hilber, M., & Reintzsch, D. (2014). Cloud Computing and Open Source – Wie groß ist die
Gefahr des Copyleft be SaaS?. Computer Und Recht, 30(11).
Jeong, H., & Choi, H. (2013). The Web Service Framework for SaaS in Cloud Computing
Environment. Applied Mechanics And Materials, 300-301, 664-667.
Pahl, C. (2015). Containerization and the PaaS Cloud. IEEE Cloud Computing, 2(3), 24-31.
Philip, J., & Bharadi, V. (2016). Signature Verification SaaS Implementation on Microsoft Azure
Cloud. Procedia Computer Science, 79, 410-418.
31 | P a g e
References
Abu Sharkh, M., & Shami, A. (2017). An evergreen cloud: Optimizing energy efficiency in
heterogeneous cloud computing architectures. Vehicular Communications, 9, 199-210.
Banerjee, C., Kundu, A., & Dattagupta, R. (2013). SaaS Oriented Generic Cloud Compiler.
Procedia Technology, 10, 253-261.
Bernstein, D. (2014). Cloud Foundry Aims to Become the OpenStack of PaaS. IEEE Cloud
Computing, 1(2), 57-60.
Clarke, R. (2015). Does SaaS Backup Pass the Fitness-for-Purpose Test?. IEEE Cloud
Computing, 2(6), 58-63.
Grützmacher, M. (2015). „Software as der Datendose" – Outsourcing, Cloud, SaaS & Co.
Computer Und Recht, 31(12).
Hilber, M., & Reintzsch, D. (2014). Cloud Computing and Open Source – Wie groß ist die
Gefahr des Copyleft be SaaS?. Computer Und Recht, 30(11).
Jeong, H., & Choi, H. (2013). The Web Service Framework for SaaS in Cloud Computing
Environment. Applied Mechanics And Materials, 300-301, 664-667.
Pahl, C. (2015). Containerization and the PaaS Cloud. IEEE Cloud Computing, 2(3), 24-31.
Philip, J., & Bharadi, V. (2016). Signature Verification SaaS Implementation on Microsoft Azure
Cloud. Procedia Computer Science, 79, 410-418.
31 | P a g e
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Cloud Computing
Sala-Zárate, M., & Colombo-Mendoza, L. (2012). CLOUD COMPUTING: A REVIEW OF
PAAS, IAAS, SAAS SERVICES AND PROVIDERS. Lámpsakos, (7), 47.
Singh, H. (2015). Profit Maximization Of SAAS By Reusing The Available VM Space In Cloud
Computing. International Journal Of Engineering And Computer Science.
SManjunath, K., & Basu, A. (2012). Effective Technique for VM Provisioning on PaaS Cloud
Computing Platform. International Journal Of Applied Information Systems, 4(6), 44-47.
Szyjewski, G., & Niemcewicz, P. (2016). PaaS Services in Cloud Technology, for IT Project
Execution. Zeszyty Naukowe Uniwersytetu Szczecińskiego. Studia Informatica, 41, 79-89.
Vostokin, S., Artamonov, Y., & Tsarev, D. (2018). Templet Web: the use of volunteer
computing approach in PaaS-style cloud. Open Engineering, 8(1), 50-56.
ZENG, Q., & Wu, S. (2013). A SaaS Development Platform based on Cloud Computing.
TELKOMNIKA Indonesian Journal Of Electrical Engineering, 11(3).
Ajoudanian, S., & Ahmadi, M. (2012). A Novel Data Security Model for Cloud Computing.
International Journal Of Engineering And Technology, 4(3), 326-329.
Behara, D. (2017). Microservices Maturity Model. International Journal Of Engineering And
Computer Science, 6(11).
Chang, H. (2015). Privacy Regulatory Model for the Cloud: A Case Study. IEEE Cloud
Computing, 2(3), 67-72.
32 | P a g e
Sala-Zárate, M., & Colombo-Mendoza, L. (2012). CLOUD COMPUTING: A REVIEW OF
PAAS, IAAS, SAAS SERVICES AND PROVIDERS. Lámpsakos, (7), 47.
Singh, H. (2015). Profit Maximization Of SAAS By Reusing The Available VM Space In Cloud
Computing. International Journal Of Engineering And Computer Science.
SManjunath, K., & Basu, A. (2012). Effective Technique for VM Provisioning on PaaS Cloud
Computing Platform. International Journal Of Applied Information Systems, 4(6), 44-47.
Szyjewski, G., & Niemcewicz, P. (2016). PaaS Services in Cloud Technology, for IT Project
Execution. Zeszyty Naukowe Uniwersytetu Szczecińskiego. Studia Informatica, 41, 79-89.
Vostokin, S., Artamonov, Y., & Tsarev, D. (2018). Templet Web: the use of volunteer
computing approach in PaaS-style cloud. Open Engineering, 8(1), 50-56.
ZENG, Q., & Wu, S. (2013). A SaaS Development Platform based on Cloud Computing.
TELKOMNIKA Indonesian Journal Of Electrical Engineering, 11(3).
Ajoudanian, S., & Ahmadi, M. (2012). A Novel Data Security Model for Cloud Computing.
International Journal Of Engineering And Technology, 4(3), 326-329.
Behara, D. (2017). Microservices Maturity Model. International Journal Of Engineering And
Computer Science, 6(11).
Chang, H. (2015). Privacy Regulatory Model for the Cloud: A Case Study. IEEE Cloud
Computing, 2(3), 67-72.
32 | P a g e
Cloud Computing
Esposito, C., Castiglione, A., & Choo, K. (2016). Challenges in Delivering Software in the
Cloud as Microservices. IEEE Cloud Computing, 3(5), 10-14.
Fazio, M., Celesti, A., Ranjan, R., Liu, C., Chen, L., & Villari, M. (2016). Open Issues in
Scheduling Microservices in the Cloud. IEEE Cloud Computing, 3(5), 81-88.
Gordon, A. (2016). The Hybrid Cloud Security Professional. IEEE Cloud Computing, 3(1), 82-
86.
Hameed, M., Haider, S., & Kantarci, B. (2017). Performance impacts of hybrid cloud storage.
Computing, 99(12), 1207-1229.
Junfeng, T., & Weiping, L. (2016). Design and Research of Hybrid Network Electronic
Forensics Model Based on Cloud Computing. International Journal Of Grid And
Distributed Computing, 9(12), 75-86.
Li, C. (2015). Hybrid cloud service selection strategy: Model and application of campus.
Computer Applications In Engineering Education, 23(5), 645-657.
Linthicum, D. (2016). Practical Use of Microservices in Moving Workloads to the Cloud. IEEE
Cloud Computing, 3(5), 6-9.
Rashidi, A. (2012). A Model for User Trust in Cloud Computing. International Journal On
Cloud Computing: Services And Architecture, 2(2), 1-8.
Sill, A. (2016). Standards for Hybrid Clouds. IEEE Cloud Computing, 3(1), 92-95.
Singleton, A. (2016). The Economics of Microservices. IEEE Cloud Computing, 3(5), 16-20.
33 | P a g e
Esposito, C., Castiglione, A., & Choo, K. (2016). Challenges in Delivering Software in the
Cloud as Microservices. IEEE Cloud Computing, 3(5), 10-14.
Fazio, M., Celesti, A., Ranjan, R., Liu, C., Chen, L., & Villari, M. (2016). Open Issues in
Scheduling Microservices in the Cloud. IEEE Cloud Computing, 3(5), 81-88.
Gordon, A. (2016). The Hybrid Cloud Security Professional. IEEE Cloud Computing, 3(1), 82-
86.
Hameed, M., Haider, S., & Kantarci, B. (2017). Performance impacts of hybrid cloud storage.
Computing, 99(12), 1207-1229.
Junfeng, T., & Weiping, L. (2016). Design and Research of Hybrid Network Electronic
Forensics Model Based on Cloud Computing. International Journal Of Grid And
Distributed Computing, 9(12), 75-86.
Li, C. (2015). Hybrid cloud service selection strategy: Model and application of campus.
Computer Applications In Engineering Education, 23(5), 645-657.
Linthicum, D. (2016). Practical Use of Microservices in Moving Workloads to the Cloud. IEEE
Cloud Computing, 3(5), 6-9.
Rashidi, A. (2012). A Model for User Trust in Cloud Computing. International Journal On
Cloud Computing: Services And Architecture, 2(2), 1-8.
Sill, A. (2016). Standards for Hybrid Clouds. IEEE Cloud Computing, 3(1), 92-95.
Singleton, A. (2016). The Economics of Microservices. IEEE Cloud Computing, 3(5), 16-20.
33 | P a g e
Cloud Computing
Sood, S. (2013). Hybrid Data Security Model for Cloud. International Journal Of Cloud
Applications And Computing, 3(3), 50-59.
Zhou, Z., Wu, L., & Hong, Z. (2013). Context-Aware Access Control Model for Cloud
Computing. International Journal Of Grid And Distributed Computing, 6(6), 1-12.
Abu Sharkh, M., & Shami, A. (2017). An evergreen cloud: Optimizing energy efficiency in
heterogeneous cloud computing architectures. Vehicular Communications, 9, 199-210. d
Cowan, D. (2011). External pressure for internal information security controls. Computer Fraud
& Security, 2011(11), 8-11.
Gluchman, V. (2016). Disaster issues in non-utilitarian consequentialism (ethics of social
consequences)1. Human Affairs, 26(1).
Lang, U., & Schreiner, R. (2011). Analysis of recommended cloud security controls to validate
OpenPMF “policy as a service”. Information Security Technical Report, 16(3-4), 131-
141.
Lang, U., & Schreiner, R. (2011). Analysis of recommended cloud security controls to validate
OpenPMF “policy as a service”. Information Security Technical Report, 16(3-4), 131-
141.
Lin, G., & Huang, F. (2016). Research on Database Remote Disaster Recovery and Backup
Technology Based on Multi-Point and Multi-Hop. International Journal Of Database
Theory And Application, 9(6), 265-274.
34 | P a g e
Sood, S. (2013). Hybrid Data Security Model for Cloud. International Journal Of Cloud
Applications And Computing, 3(3), 50-59.
Zhou, Z., Wu, L., & Hong, Z. (2013). Context-Aware Access Control Model for Cloud
Computing. International Journal Of Grid And Distributed Computing, 6(6), 1-12.
Abu Sharkh, M., & Shami, A. (2017). An evergreen cloud: Optimizing energy efficiency in
heterogeneous cloud computing architectures. Vehicular Communications, 9, 199-210. d
Cowan, D. (2011). External pressure for internal information security controls. Computer Fraud
& Security, 2011(11), 8-11.
Gluchman, V. (2016). Disaster issues in non-utilitarian consequentialism (ethics of social
consequences)1. Human Affairs, 26(1).
Lang, U., & Schreiner, R. (2011). Analysis of recommended cloud security controls to validate
OpenPMF “policy as a service”. Information Security Technical Report, 16(3-4), 131-
141.
Lang, U., & Schreiner, R. (2011). Analysis of recommended cloud security controls to validate
OpenPMF “policy as a service”. Information Security Technical Report, 16(3-4), 131-
141.
Lin, G., & Huang, F. (2016). Research on Database Remote Disaster Recovery and Backup
Technology Based on Multi-Point and Multi-Hop. International Journal Of Database
Theory And Application, 9(6), 265-274.
34 | P a g e
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Cloud Computing
Pahl, C., Jamshidi, P., & Weyns, D. (2017). Cloud architecture continuity: Change models and
change rules for sustainable cloud software architectures. Journal Of Software: Evolution
And Process, 29(2), e1849.
Pathari, V., & Sonar, R. (2012). Identifying linkages between statements in information security
policy, procedures and controls. Information Management & Computer Security, 20(4),
264-280.
Wang, J., & Hou, W. (2011). The Feasibility of Researching Computer Network Data Backup
and Disaster Recovery. Advanced Materials Research, 219-220, 107-111.
Zúñiga-Prieto, M., González-Huerta, J., Insfran, E., & Abrahão, S. (2016). Dynamic
reconfiguration of cloud application architectures. Software: Practice And Experience,
48(2), 327-344.
35 | P a g e
Pahl, C., Jamshidi, P., & Weyns, D. (2017). Cloud architecture continuity: Change models and
change rules for sustainable cloud software architectures. Journal Of Software: Evolution
And Process, 29(2), e1849.
Pathari, V., & Sonar, R. (2012). Identifying linkages between statements in information security
policy, procedures and controls. Information Management & Computer Security, 20(4),
264-280.
Wang, J., & Hou, W. (2011). The Feasibility of Researching Computer Network Data Backup
and Disaster Recovery. Advanced Materials Research, 219-220, 107-111.
Zúñiga-Prieto, M., González-Huerta, J., Insfran, E., & Abrahão, S. (2016). Dynamic
reconfiguration of cloud application architectures. Software: Practice And Experience,
48(2), 327-344.
35 | P a g e
1 out of 35
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.