Network & Cloud Security
VerifiedAdded on 2023/01/11
|12
|3736
|53
AI Summary
This document discusses the security aspects and probable solutions for cloud computing service providers, focusing on Backbone UK. It covers the current status of cloud computing, benefits of cloud computing, security issues related to Backbone UK's cloud services, and a proposal for enhancing security. Find solved assignments, essays, and dissertations on network and cloud security at Desklib.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Network and Cloud Security
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents
Project Title: “Network & Cloud Security”.....................................................................................3
Aim:.............................................................................................................................................3
Purpose.........................................................................................................................................3
Introduction......................................................................................................................................3
Literature Review............................................................................................................................3
Current status of Cloud Computing.............................................................................................3
Benefits of cloud computing........................................................................................................4
Demonstrate security issues related with Backbone UK cloud services.....................................6
Proposal for Backbone UK cloud service provider.....................................................................8
Research Methodology..................................................................................................................10
Ethical Issues.................................................................................................................................10
Project Management......................................................................................................................10
Project Evaluation..........................................................................................................................11
Conclusion.....................................................................................................................................11
Recommendations for Further Improvements...............................................................................11
References......................................................................................................................................12
Project Title: “Network & Cloud Security”.....................................................................................3
Aim:.............................................................................................................................................3
Purpose.........................................................................................................................................3
Introduction......................................................................................................................................3
Literature Review............................................................................................................................3
Current status of Cloud Computing.............................................................................................3
Benefits of cloud computing........................................................................................................4
Demonstrate security issues related with Backbone UK cloud services.....................................6
Proposal for Backbone UK cloud service provider.....................................................................8
Research Methodology..................................................................................................................10
Ethical Issues.................................................................................................................................10
Project Management......................................................................................................................10
Project Evaluation..........................................................................................................................11
Conclusion.....................................................................................................................................11
Recommendations for Further Improvements...............................................................................11
References......................................................................................................................................12
Project Title: “Network & Cloud Security”
Aim: “To identify the security aspects and probable solution for Cloud computing service
provider.” A study on Backbone UK.
Purpose
The rationale of this study is to have insight into different aspects related with cloud
computing by taking into consideration security. Here, a proposal is being furnished for
Backbone UK through which security of their services can be ensured up to desired standards.
Introduction
Cloud computing is defined as availability of on-demand computer resources which are
being used for data storage as well as computing power without having any direct active
management by their users (Attaran and Woods, 2019). Basically, it denotes rendering hosted
services by making use of internet. To understand the concept of network and cloud security,
Backbone UK is taken into consideration which was founded in 1998 which is a respected as
well as successful technology solution provider who emphasis on delivering quality services.
They provide their customers with wide range of cloud solution. Backbone has more than 500
companies as their clients globally. They have technical account managers as well as operations
account management. This report will cover cloud service desktop activity that is being hosted
through usage of cloud. Along with this, benefits, security issues and proposal will be illustrated.
Literature Review
Current status of Cloud Computing
Backbone UK is furnishing their services by making use of HVD (Hosted Virtual Desktop)
which is also referred to as DaaS (Desktop as a service) and it is associated with virtual desktop
infrastructure. Firm has near about 400 dedicated servers which are liable for supporting near
about 2000 users in excess. Backbone virtual desktop is similar to ordinary windows desktop
which is being utilized on laptop or personal computer. This is being stored within highly
secured data centers which can be accessed from any kind of device through the usage internet
connection by logging into it by making use of adequate credentials. Backbone UK renders
hosted exchange services for accessing email for hosting telephony services that enables unified
communication as well as hosted application solution by making use of solution through unique
Aim: “To identify the security aspects and probable solution for Cloud computing service
provider.” A study on Backbone UK.
Purpose
The rationale of this study is to have insight into different aspects related with cloud
computing by taking into consideration security. Here, a proposal is being furnished for
Backbone UK through which security of their services can be ensured up to desired standards.
Introduction
Cloud computing is defined as availability of on-demand computer resources which are
being used for data storage as well as computing power without having any direct active
management by their users (Attaran and Woods, 2019). Basically, it denotes rendering hosted
services by making use of internet. To understand the concept of network and cloud security,
Backbone UK is taken into consideration which was founded in 1998 which is a respected as
well as successful technology solution provider who emphasis on delivering quality services.
They provide their customers with wide range of cloud solution. Backbone has more than 500
companies as their clients globally. They have technical account managers as well as operations
account management. This report will cover cloud service desktop activity that is being hosted
through usage of cloud. Along with this, benefits, security issues and proposal will be illustrated.
Literature Review
Current status of Cloud Computing
Backbone UK is furnishing their services by making use of HVD (Hosted Virtual Desktop)
which is also referred to as DaaS (Desktop as a service) and it is associated with virtual desktop
infrastructure. Firm has near about 400 dedicated servers which are liable for supporting near
about 2000 users in excess. Backbone virtual desktop is similar to ordinary windows desktop
which is being utilized on laptop or personal computer. This is being stored within highly
secured data centers which can be accessed from any kind of device through the usage internet
connection by logging into it by making use of adequate credentials. Backbone UK renders
hosted exchange services for accessing email for hosting telephony services that enables unified
communication as well as hosted application solution by making use of solution through unique
dashboards for critical applications as per requirements. Hosted desktop illustrates entire desktop
experience which is being delivered through the usage cloud to users by making use of internet.
All the software applications are being virtually installed from desktop interface which are being
executed from dedicated server (Attaran, 2017). Thus, classification of Backbone hosted desktop
type of cloud comprises of elements which involves both delivering operating system along with
platform as a service that aids users within installing their own applications.
SaaS (Software as a service) renders online storage to their users as per their
requirements. Backbone engineers makes use of remote desktop support for managing all the
technical problems or issues associated with usage of VDI (Visual desktop infrastructure) for
their probable clients or those making use of services delivered by them. But there are certain
restrictions with respect to cloud services that are being delivered by Backbone UK.
Furthermore, infrastructure as a service is not furnished by them to their clients that denote
minimized control of engineers over OS security aspects of their clients. Along with this, it
enables IT personnel to have enhanced control above operating system for development as well
as deployment of applications on any OS or platform which is being utilized by them. Backbone
UK is liable for justifying their hosted desktop options like a business services with respect to
pre-installed infrastructure. This implies that there is no scope for individual’s user PC or
businesses for looking into additional infrastructure or IaaS (Chang, 2018). But the essential
aspect associated with this is that through the usage of VDI as well as remote desktop must
support influence on activities carried out by Backbone UK.
Benefits of cloud computing
The term which is utilized for storing as well as accessing data via internet is referred to
as cloud computing. Here, data is not being stored on personal hard disk of the computer and it
can be easily accessed from remote servers. The major benefits which are being rendered by
cloud computing are cost savings, strategic edge, high speed, back-up along with restoring data,
automatic software integration and there are many others (Church, Schmidt and Ajayi, 2020).
There are two client teams which are liable for handling technical issues that are being
encountered by Backbone UK. They are technical account managers (with 12 employees) and
operation account management (8 employees). They are liable for handling technical issues of
their clients from remote locations; it aids them to accomplish all the requirements of their
experience which is being delivered through the usage cloud to users by making use of internet.
All the software applications are being virtually installed from desktop interface which are being
executed from dedicated server (Attaran, 2017). Thus, classification of Backbone hosted desktop
type of cloud comprises of elements which involves both delivering operating system along with
platform as a service that aids users within installing their own applications.
SaaS (Software as a service) renders online storage to their users as per their
requirements. Backbone engineers makes use of remote desktop support for managing all the
technical problems or issues associated with usage of VDI (Visual desktop infrastructure) for
their probable clients or those making use of services delivered by them. But there are certain
restrictions with respect to cloud services that are being delivered by Backbone UK.
Furthermore, infrastructure as a service is not furnished by them to their clients that denote
minimized control of engineers over OS security aspects of their clients. Along with this, it
enables IT personnel to have enhanced control above operating system for development as well
as deployment of applications on any OS or platform which is being utilized by them. Backbone
UK is liable for justifying their hosted desktop options like a business services with respect to
pre-installed infrastructure. This implies that there is no scope for individual’s user PC or
businesses for looking into additional infrastructure or IaaS (Chang, 2018). But the essential
aspect associated with this is that through the usage of VDI as well as remote desktop must
support influence on activities carried out by Backbone UK.
Benefits of cloud computing
The term which is utilized for storing as well as accessing data via internet is referred to
as cloud computing. Here, data is not being stored on personal hard disk of the computer and it
can be easily accessed from remote servers. The major benefits which are being rendered by
cloud computing are cost savings, strategic edge, high speed, back-up along with restoring data,
automatic software integration and there are many others (Church, Schmidt and Ajayi, 2020).
There are two client teams which are liable for handling technical issues that are being
encountered by Backbone UK. They are technical account managers (with 12 employees) and
operation account management (8 employees). They are liable for handling technical issues of
their clients from remote locations; it aids them to accomplish all the requirements of their
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
clients. These two teams will handle issues of around 2000 users, in case if they have occurred
remotely then this is being carried out through usage of phone and desktop. Here, most of the
clients make use of VDI rendered by Backbone UK.
Here, clients are being provided with enhanced benefits like Software as a service and
platform as a service which furnishes them with an adequate access from 400 dedicated servers
which are being provided by Backbone UK and they are located within five secured data centers.
To maintain security of their clients, firm keeps locations of their dedicated server secret (Habjan
and Pucihar, 2017). VDI services that are being furnished by Backbone furnish remote desktop
support to their employees that will aid them to render access to client’s desktop of Backbone
UK for fixing issues associated with VDI service platform along with applications. In addition to
this, VDI service user can have access to services from their office and make payments for the
same respectively. The cloud computing is being executed by backbone UK that will assist their
employees for remotely managing their technical issues via dedicated servers. This enables
employees of organization to eliminate delays within time, travelling cost as well as visit to the
site multiple times for solving technical issues (Kaddoumi and et. al, 2018). This leads firm to
have more number of clients as well as amplify their operations.
Cloud computing provides unlimited storage capacities which denotes that as per
requirements clients can have services which can be expanded as well as shrink by paying
reasonable monthly fees. VDI furnishes firms as well as their clients with simplified as well as
centralized management. From central station, functions can be carried out remotely easily.
Along with this, flexibility will be provided to their clients and employees for an instance,
activities such as virtual creation of desktop will be deployed. This will not affect productivity of
end users by troubleshooting procedures along with providing with adequate upgrades. Along
with this, it enables workforce mobility as services can be accessed as well as rendered remotely
as per their requirements (Liu and et. al, 2018). For an example, products like Citrix or VMware
Horizon View on VDI platform aids workforce within making use of their devices for accessing
view of services that are being carried out via their working activities. In addition to this, VDI
platform renders high cost efficiency along with enhanced productivity.
In addition to this, through quick remote access Backbone UK aids their clients by
rendering them with efficient services with minimized technical issues. This leads to manage
remotely then this is being carried out through usage of phone and desktop. Here, most of the
clients make use of VDI rendered by Backbone UK.
Here, clients are being provided with enhanced benefits like Software as a service and
platform as a service which furnishes them with an adequate access from 400 dedicated servers
which are being provided by Backbone UK and they are located within five secured data centers.
To maintain security of their clients, firm keeps locations of their dedicated server secret (Habjan
and Pucihar, 2017). VDI services that are being furnished by Backbone furnish remote desktop
support to their employees that will aid them to render access to client’s desktop of Backbone
UK for fixing issues associated with VDI service platform along with applications. In addition to
this, VDI service user can have access to services from their office and make payments for the
same respectively. The cloud computing is being executed by backbone UK that will assist their
employees for remotely managing their technical issues via dedicated servers. This enables
employees of organization to eliminate delays within time, travelling cost as well as visit to the
site multiple times for solving technical issues (Kaddoumi and et. al, 2018). This leads firm to
have more number of clients as well as amplify their operations.
Cloud computing provides unlimited storage capacities which denotes that as per
requirements clients can have services which can be expanded as well as shrink by paying
reasonable monthly fees. VDI furnishes firms as well as their clients with simplified as well as
centralized management. From central station, functions can be carried out remotely easily.
Along with this, flexibility will be provided to their clients and employees for an instance,
activities such as virtual creation of desktop will be deployed. This will not affect productivity of
end users by troubleshooting procedures along with providing with adequate upgrades. Along
with this, it enables workforce mobility as services can be accessed as well as rendered remotely
as per their requirements (Liu and et. al, 2018). For an example, products like Citrix or VMware
Horizon View on VDI platform aids workforce within making use of their devices for accessing
view of services that are being carried out via their working activities. In addition to this, VDI
platform renders high cost efficiency along with enhanced productivity.
In addition to this, through quick remote access Backbone UK aids their clients by
rendering them with efficient services with minimized technical issues. This leads to manage
their accounts in an efficient manner for driving in growth as well as continuity. As per the
research, which has been carried out, it has been anticipated that HVD (hosted virtual desktop)
has accelerated from 2013. Furthermore, VDI will lead to 40% of PC market worldwide along
with this it will lead to financial profitable applications which are being hosted within desktop
market which implies that Backbone is financially having adequate benefits from services
rendered via cloud computing which reflects strong as well as enhanced employee’s commitment
along with motivating them (Luo and et. al, 2018). Furthermore, their clients can have access to
Backbone VDI through the usage of system (PC or laptop) which is being allied to internet and
in any case if technical issues are being faced by them then they will be resolved remotely via
making use of dedicated servers. For this, they ensure that there are adequate authentication
protocols for their cloud computing services.
Demonstrate security issues related with Backbone UK cloud services
Backbone UK makes use of identical VDI architecture for hosting their desktop as well
as the security is dependent on Citrix XenDesktop and XenApp infrastructure.
Illustration 1: VDI Architecture
research, which has been carried out, it has been anticipated that HVD (hosted virtual desktop)
has accelerated from 2013. Furthermore, VDI will lead to 40% of PC market worldwide along
with this it will lead to financial profitable applications which are being hosted within desktop
market which implies that Backbone is financially having adequate benefits from services
rendered via cloud computing which reflects strong as well as enhanced employee’s commitment
along with motivating them (Luo and et. al, 2018). Furthermore, their clients can have access to
Backbone VDI through the usage of system (PC or laptop) which is being allied to internet and
in any case if technical issues are being faced by them then they will be resolved remotely via
making use of dedicated servers. For this, they ensure that there are adequate authentication
protocols for their cloud computing services.
Demonstrate security issues related with Backbone UK cloud services
Backbone UK makes use of identical VDI architecture for hosting their desktop as well
as the security is dependent on Citrix XenDesktop and XenApp infrastructure.
Illustration 1: VDI Architecture
The security structure is illustrated at bottom within VDI architecture that enables various
regulations for their users along with this there will be 3rd party authentication so that any
unwanted individuals do not have access to their network (Nabi, Jamwal and Padmanbh, 2020).
The cloud service users of Backbone UK only have interaction with hosted desktop via making
use of their credentials through the usage of authentication sessions. At this peculiar level, the
security vulnerabilities take place. Major vulnerabilities include user identity spoofing which
occur due to insufficient authentication of data which is supplied and is being intercepted by
hacker for carrying out malicious activities. Hijacking desktop session of user involves
exploiting computer session of users for gaining access to their secured data. Insecure device,
this occurs due the reason that device of user do not have adequate security measures for their
data to maintain integrity as well as privacy. Windows server default vulnerabilities takes
place when user are connected with customer resource management software over unsecured
network which makes them vulnerable to attacks (Attaran and Woods, 2019).
Data of user is viewed by other user such kind of threats takes place when users share
their credentials with others for making use of cloud services or any other reason. This may also
occur in case if username as well as password are openly entered in their system. Data leakage
due to internal or external cloud intruders, takes place when hacker intercept data of users for
having access to sensitive or confidential information of either any organization or particular
user. Network sniffing, aid third person to intercept information that is exchanged in between
two individuals communicating within the network. If information is in encrypted form then they
will not have information related with conversation that occurs among them but in case weak
password is being utilized then it can be decrypted easily (Attaran, 2017). Man in the middle
attack, illustrate vulnerability due to secured socket layer which is not configured as per
required standards along with this hackers can have a entire conversation which is taking place in
between different parties.
Cross site scripting takes place when relevant URL is being entered by individuals but
hackers redirects them into their website for attaining their (valid users) credentials. Denial of
service (DoS) and denial of IP service, is being utilized by hackers for overflowing network as
well as web server with regular requests of services for damaging the network or overloading it
so that server may get down. HeartBleed, takes place when OpenSSL bug is there, this leads
regulations for their users along with this there will be 3rd party authentication so that any
unwanted individuals do not have access to their network (Nabi, Jamwal and Padmanbh, 2020).
The cloud service users of Backbone UK only have interaction with hosted desktop via making
use of their credentials through the usage of authentication sessions. At this peculiar level, the
security vulnerabilities take place. Major vulnerabilities include user identity spoofing which
occur due to insufficient authentication of data which is supplied and is being intercepted by
hacker for carrying out malicious activities. Hijacking desktop session of user involves
exploiting computer session of users for gaining access to their secured data. Insecure device,
this occurs due the reason that device of user do not have adequate security measures for their
data to maintain integrity as well as privacy. Windows server default vulnerabilities takes
place when user are connected with customer resource management software over unsecured
network which makes them vulnerable to attacks (Attaran and Woods, 2019).
Data of user is viewed by other user such kind of threats takes place when users share
their credentials with others for making use of cloud services or any other reason. This may also
occur in case if username as well as password are openly entered in their system. Data leakage
due to internal or external cloud intruders, takes place when hacker intercept data of users for
having access to sensitive or confidential information of either any organization or particular
user. Network sniffing, aid third person to intercept information that is exchanged in between
two individuals communicating within the network. If information is in encrypted form then they
will not have information related with conversation that occurs among them but in case weak
password is being utilized then it can be decrypted easily (Attaran, 2017). Man in the middle
attack, illustrate vulnerability due to secured socket layer which is not configured as per
required standards along with this hackers can have a entire conversation which is taking place in
between different parties.
Cross site scripting takes place when relevant URL is being entered by individuals but
hackers redirects them into their website for attaining their (valid users) credentials. Denial of
service (DoS) and denial of IP service, is being utilized by hackers for overflowing network as
well as web server with regular requests of services for damaging the network or overloading it
so that server may get down. HeartBleed, takes place when OpenSSL bug is there, this leads
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
https to be vulnerable for long period and all the encryption keys are also being stolen for
decrypting the information. Desktop of users comprises of viruses propagation & transversal,
when users are connected with network there is high probability that virus may impact their
system if they do not have effective anti-virus and anti-malware then systems are more prone to
such kind of attacks (Chang, 2018). These are major vulnerabilities which may occur while
making use of different services by making use of internet. If such kinds of attacks are being
faced by clients of Backbone UK then they must immediately contact with service providers so
that adequate steps can be taken to prevent entire network from being vulnerable.
Proposal for Backbone UK cloud service provider
For enabling effectual robust security via a cloud system, Backbone UK must execute
strong security countermeasures for dealing with vulnerabilities.
Implement physical or virtual firewall: This enables counter as well as detection
against denial of service attacks. Along with this, null route has to be detected as DoS traffic
(Church, Schmidt and Ajayi, 2020). This will enable access for private networks from outside
through the usage of network address translation device such as vShield Edge, VMware. Along
with this, disable actions must be implemented via a logon privilege when number of login
attempts have been failed against denial of service traffic.
Operate real-time cross check: Secured socket layer has to be executed as well as
configured for avoiding interaction among two parties in cloud so that their messages cannot be
intercepted by third person or unauthenticated person.
The other options which can be utilized by Backbone UK for tackling different issues for
evaluation of virtualization at end-point and identification of SaaS security by separating
endpoint as well as server security processes. In addition to this, strong data encryption methods
must be utilized by different people who are involved within communication or while
transferring information to cloud for handling network sniffing threats. Furthermore, for
detecting sniffer within the cloud network, MSDP (malicious sniffing detection platform) is
being utilized which is dependent on ARP (address resolution protocol) along with round trip
time. There are different techniques such as active content filtering as well as content based
technologies for dealing with XSS (cross site scripting site). In addition to this, other powerful
decrypting the information. Desktop of users comprises of viruses propagation & transversal,
when users are connected with network there is high probability that virus may impact their
system if they do not have effective anti-virus and anti-malware then systems are more prone to
such kind of attacks (Chang, 2018). These are major vulnerabilities which may occur while
making use of different services by making use of internet. If such kinds of attacks are being
faced by clients of Backbone UK then they must immediately contact with service providers so
that adequate steps can be taken to prevent entire network from being vulnerable.
Proposal for Backbone UK cloud service provider
For enabling effectual robust security via a cloud system, Backbone UK must execute
strong security countermeasures for dealing with vulnerabilities.
Implement physical or virtual firewall: This enables counter as well as detection
against denial of service attacks. Along with this, null route has to be detected as DoS traffic
(Church, Schmidt and Ajayi, 2020). This will enable access for private networks from outside
through the usage of network address translation device such as vShield Edge, VMware. Along
with this, disable actions must be implemented via a logon privilege when number of login
attempts have been failed against denial of service traffic.
Operate real-time cross check: Secured socket layer has to be executed as well as
configured for avoiding interaction among two parties in cloud so that their messages cannot be
intercepted by third person or unauthenticated person.
The other options which can be utilized by Backbone UK for tackling different issues for
evaluation of virtualization at end-point and identification of SaaS security by separating
endpoint as well as server security processes. In addition to this, strong data encryption methods
must be utilized by different people who are involved within communication or while
transferring information to cloud for handling network sniffing threats. Furthermore, for
detecting sniffer within the cloud network, MSDP (malicious sniffing detection platform) is
being utilized which is dependent on ARP (address resolution protocol) along with round trip
time. There are different techniques such as active content filtering as well as content based
technologies for dealing with XSS (cross site scripting site). In addition to this, other powerful
tools such as blueprint based approach for minimized dependency via web browser for
identification of malicious content that is present within cloud network (Habjan and Pucihar,
2017). Such kind of countermeasures for handling vulnerabilities, in case are executed will
render Backbone UK cloud system with adequate security policies that will enforce unauthorized
connectivity such as network flow between VDI pools for tackling wide range of network
segmentation that are being exploited through hackers. This will also permit effectual access to
shared resources of users, along with this security policies will also be assigned according
different data centre zones. Furthermore, security isolation must be enforced among different
zones for cloud reliability, data integrity along with their confidentiality and their redundancy for
scalability. These security executions will restrict Backbone UK servers scanning port and open
port vulnerabilities which can be exploited by hackers.
Illustration 2: Proposal for Backbone UK Cloud System
With respect to technical security proposal, strong firewall configuration must be
implemented for locking them that will assist local host traffic on 2598 and 1494 ports for
effectual traffic control through the usage of NetScaler which is a additional for traffic hardening
for DMZ (Demilitarized zone) among different user devices as well as desktop applications are
being hosted. NetScaler permits configuration for terminating TLS (transport layer security)
along with this they are liable forwarding traffic towards web interface server through the usage
of TLS and HTTPS to SSL for carrying out traffic hardening (Kaddoumi and et. al, 2018).
identification of malicious content that is present within cloud network (Habjan and Pucihar,
2017). Such kind of countermeasures for handling vulnerabilities, in case are executed will
render Backbone UK cloud system with adequate security policies that will enforce unauthorized
connectivity such as network flow between VDI pools for tackling wide range of network
segmentation that are being exploited through hackers. This will also permit effectual access to
shared resources of users, along with this security policies will also be assigned according
different data centre zones. Furthermore, security isolation must be enforced among different
zones for cloud reliability, data integrity along with their confidentiality and their redundancy for
scalability. These security executions will restrict Backbone UK servers scanning port and open
port vulnerabilities which can be exploited by hackers.
Illustration 2: Proposal for Backbone UK Cloud System
With respect to technical security proposal, strong firewall configuration must be
implemented for locking them that will assist local host traffic on 2598 and 1494 ports for
effectual traffic control through the usage of NetScaler which is a additional for traffic hardening
for DMZ (Demilitarized zone) among different user devices as well as desktop applications are
being hosted. NetScaler permits configuration for terminating TLS (transport layer security)
along with this they are liable forwarding traffic towards web interface server through the usage
of TLS and HTTPS to SSL for carrying out traffic hardening (Kaddoumi and et. al, 2018).
Research Methodology
The peculiar techniques or procedures that are utilised for identification, selection,
processing as well as analysing information related with topic. It allows reader within critical
evaluation of study related with overall validity as well as reliability (Chang, 2018). This report
is conducted by making use of qualitative research method, the reason behind this is that
quantitative methods provides data that is numerical which is being utilised for mathematical as
well as statistical evaluation. Qualitative research is exploratory that is used for gaining
understanding related with opinions and reasons. Survey is carried out for having adequate
information related with cloud computing and on the basis of participants observations
conclusion is drawn. Furthermore, secondary method is used for gathering information from
books, articles, journals, online, academic database, etc.
Ethical Issues
While gathering information and furnishing it all the necessary aspects are considered
that is honesty and integrity so that relevant as well as precise information is collected so thatany
one is not mislead. Confidentiality must be maintained for ensuring that relevant aspects of
organization and topic are not altered as well as its privacy is ensured (Attaran, 2017). From
legal perspectives of research, it has been ensured that appropriate consents have been taken for
carrying out it so that at any stage activities (literature review, data collection, etc.) are not
hampered. Apart from this, there is no discrimination, race or ethnicity considered while carrying
this research through which people may be vulnerable. Along with this, security of information is
being ensured that is collected from different sources by maintaining its integrity.
Project Management
Waterfall process has been followed within this report so that systematic flow of
information can be maintained. It involves different stages and are moved stwp by step to attain
final outcome (Luo and et. al, 2018). In this report the initial step was to decide topic, formulate
aims and objectives, carry out literature review, research methodologies, conclusion and
recommendations by taking into consideration, ethical, social, legal and security perspectives.
The peculiar techniques or procedures that are utilised for identification, selection,
processing as well as analysing information related with topic. It allows reader within critical
evaluation of study related with overall validity as well as reliability (Chang, 2018). This report
is conducted by making use of qualitative research method, the reason behind this is that
quantitative methods provides data that is numerical which is being utilised for mathematical as
well as statistical evaluation. Qualitative research is exploratory that is used for gaining
understanding related with opinions and reasons. Survey is carried out for having adequate
information related with cloud computing and on the basis of participants observations
conclusion is drawn. Furthermore, secondary method is used for gathering information from
books, articles, journals, online, academic database, etc.
Ethical Issues
While gathering information and furnishing it all the necessary aspects are considered
that is honesty and integrity so that relevant as well as precise information is collected so thatany
one is not mislead. Confidentiality must be maintained for ensuring that relevant aspects of
organization and topic are not altered as well as its privacy is ensured (Attaran, 2017). From
legal perspectives of research, it has been ensured that appropriate consents have been taken for
carrying out it so that at any stage activities (literature review, data collection, etc.) are not
hampered. Apart from this, there is no discrimination, race or ethnicity considered while carrying
this research through which people may be vulnerable. Along with this, security of information is
being ensured that is collected from different sources by maintaining its integrity.
Project Management
Waterfall process has been followed within this report so that systematic flow of
information can be maintained. It involves different stages and are moved stwp by step to attain
final outcome (Luo and et. al, 2018). In this report the initial step was to decide topic, formulate
aims and objectives, carry out literature review, research methodologies, conclusion and
recommendations by taking into consideration, ethical, social, legal and security perspectives.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Project Evaluation
While carrying out this project, I gained an insight into various aspects related with cloud
computing and Backbone UK who provides services. Furthermore, I also acknowledged the
ways in which information is being collected along with time management skills. This report
gave me an insight into ways in which research is conducted, in terms of different methods used
for gathering information, kind methods and how they are utilized.
Conclusion
From above, it can be concluded that, Backbone UK is a cloud service provider which
supply hosted desktop like business IT application services. They have operations account
management administration as well as technical account manager. Firm is able to furnish
services from anywhere at any time so that they can access servers as well as can host desktop
for fixing different issues without extra expenditures. This will also eliminate access of CO2
emission from the environment.
Recommendations for Further Improvements
It is recommended that Backbone hosted services may be prone to vulnerabilities but they
can be eliminated by making use of adequate countermeasures. For this firm have opted to make
use of firewall but they can also encrypt information which is being stored within their server s
in order to ensure that even in case third person gets an access to their system then also
information is secured. But for this they need to ensure that strong passwords are being used.
While carrying out this project, I gained an insight into various aspects related with cloud
computing and Backbone UK who provides services. Furthermore, I also acknowledged the
ways in which information is being collected along with time management skills. This report
gave me an insight into ways in which research is conducted, in terms of different methods used
for gathering information, kind methods and how they are utilized.
Conclusion
From above, it can be concluded that, Backbone UK is a cloud service provider which
supply hosted desktop like business IT application services. They have operations account
management administration as well as technical account manager. Firm is able to furnish
services from anywhere at any time so that they can access servers as well as can host desktop
for fixing different issues without extra expenditures. This will also eliminate access of CO2
emission from the environment.
Recommendations for Further Improvements
It is recommended that Backbone hosted services may be prone to vulnerabilities but they
can be eliminated by making use of adequate countermeasures. For this firm have opted to make
use of firewall but they can also encrypt information which is being stored within their server s
in order to ensure that even in case third person gets an access to their system then also
information is secured. But for this they need to ensure that strong passwords are being used.
References
Books and Journal
Attaran, M. and Woods, J., 2019. Cloud computing technology: improving small business
performance using the Internet. Journal of Small Business & Entrepreneurship, 31(6),
pp.495-519.
Attaran, M., 2017. Cloud computing technology: leveraging the power of the internet to improve
business performance. Journal of International Technology and Information
Management, 26(1), pp.112-137.
Chang, V., 2018. An overview, examples, and impacts offered by Emerging Services and
Analytics in Cloud Computing virtual reality. Neural Computing and Applications, 29(5),
pp.1243-1256.
Church, K.S., Schmidt, P.J. and Ajayi, K., 2020. Forecast Cloudy-Fair or Stormy Weather:
Cloud Computing Insights and Issues. Journal of Information Systems.
Habjan, K.B. and Pucihar, A., 2017. The importance of business model factors for cloud
computing adoption: role of previous experiences. Organizacija, 50(3), pp.255-272.
Kaddoumi, T. And et. al, 2018. The impact of knowledge engineering and cloud computing
adoption on Business Driven IT.
Liu, S. and et. al, 2018. Understanding the effect of cloud computing on organizational agility:
An empirical examination. International Journal of Information Management, 43, pp.98-
111.
Luo, X. and et. al, 2018. Cloud computing capability: its technological root and business
impact. Journal of Organizational Computing and Electronic Commerce, 28(3), pp.193-
213.
Nabi, F., Jamwal, S. and Padmanbh, K., 2020. Wireless sensor network in precision farming for
forecasting and monitoring of apple disease: a survey. International Journal of
Information Technology, pp.1-12.
Books and Journal
Attaran, M. and Woods, J., 2019. Cloud computing technology: improving small business
performance using the Internet. Journal of Small Business & Entrepreneurship, 31(6),
pp.495-519.
Attaran, M., 2017. Cloud computing technology: leveraging the power of the internet to improve
business performance. Journal of International Technology and Information
Management, 26(1), pp.112-137.
Chang, V., 2018. An overview, examples, and impacts offered by Emerging Services and
Analytics in Cloud Computing virtual reality. Neural Computing and Applications, 29(5),
pp.1243-1256.
Church, K.S., Schmidt, P.J. and Ajayi, K., 2020. Forecast Cloudy-Fair or Stormy Weather:
Cloud Computing Insights and Issues. Journal of Information Systems.
Habjan, K.B. and Pucihar, A., 2017. The importance of business model factors for cloud
computing adoption: role of previous experiences. Organizacija, 50(3), pp.255-272.
Kaddoumi, T. And et. al, 2018. The impact of knowledge engineering and cloud computing
adoption on Business Driven IT.
Liu, S. and et. al, 2018. Understanding the effect of cloud computing on organizational agility:
An empirical examination. International Journal of Information Management, 43, pp.98-
111.
Luo, X. and et. al, 2018. Cloud computing capability: its technological root and business
impact. Journal of Organizational Computing and Electronic Commerce, 28(3), pp.193-
213.
Nabi, F., Jamwal, S. and Padmanbh, K., 2020. Wireless sensor network in precision farming for
forecasting and monitoring of apple disease: a survey. International Journal of
Information Technology, pp.1-12.
1 out of 12
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.