Technology in Organisations

Verified

Added on  2023/06/10

|15
|4250
|233
AI Summary
This report explains the concept of cloud computing in organizations and covers the role of cloud computing service model in context with Amazon. It also describes the security requirements to ensure security of data and key networking infrastructures that the organization may use for routine business operations.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Technology in
Organisations
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Table of Contents
INTRODUCTION...........................................................................................................................3
Question 1........................................................................................................................................3
(A) Role of cloud computing in modern day organizations........................................................3
(B) Key benefits of cloud computing to Amazon........................................................................7
Question 2........................................................................................................................................8
Security requirement to implement security and control of data in business..............................8
Question 3......................................................................................................................................11
(A) Key networking infrastructures that might be used for everyday business operations.......11
(B) Calculation of different measures from the Sales department of AllTech Group...............12
CONCLUSION..............................................................................................................................12
REFERENCES..............................................................................................................................14
Document Page
INTRODUCTION
Information technology refers to the use and application of computers so as to facilitate
storage , manipulation, transmission and retrieval of information or big data in context with any
business organization. It can be considered as a subset of Information and communications
technology (Chen end et. al.,2022). IT develops innovation in the business that results in
improved data storage, and faster processing. It increases the value as well as productivity of
business. The report will explain the concept of cloud computing in the organizations. Cloud
computing refers to the delivery of computing services i.e. servers, storage, databases,
networking, analytics , softwares etc. on the internet i.e. Cloud to offer flexible resources and
develop innovation and economies of scale for the business organization (Mohanty end et.
al.,2022). The following report will cover the role of cloud computing service model in context
with Amazon. It is an American multinational technology public limited company that is
engaged in E-commerce, cloud computing, artificial intelligence and digital streaming etc. The
report will explain the benefits of cloud computing to Amazon and will also describe the security
requirements to ensure security of data. Further, the report will also cover the key networking
infrastructures that the organization may use for routine business operations.
Question 1
(A) Role of cloud computing in modern day organizations
Cloud computing refers to the on-demand availability of computer system resources ,
particularly the storage and computing power that does not require active engagement or
management by the user. The large clouds contain the functions disbursed at different locations
which are considered as the data centres individually. It can be used as an another word for
internet (Shah, Khan and Ahmad, 2022). A cloud allows access to the communication mediums
like calendars , emails etc. on the basis of accessible network. For example, Whatsapp can be
said as a Cloud-based infrastructure as it facilitates communication based on network-based
access. It ensures that all the messages and information are stored in service providers hardware.
So, basically , cloud is an storage where the information is shared ion the network and is also
managed and controlled therefrom.
Document Page
Figure 1: Whatsapp Cloud , 2021
Cloud computing enables the business organization to communicate and share the
information in a more convenient way through clouds rather than by traditional ways. It
facilitates the businesses by ensuring collaboration among the employees by facilitating different
users to share the data work and files simultaneously (Ram, 2022). It facilitates the big
organizations in keeping the information on virtual servers, databases, storage and networking
services on-demand rather than purchasing or maintaining hardwares on premises. Some of the
examples of cloud computing infrastructure include IBM cloud, Amazon web services and
Google computing engine etc. (Madhumala and Tiwari, 2022).
Figure 2 : IBM Cloud System, 2022
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Figure 3: Google cloud computing services , 2021
In context with Amazon, it uses cloud computing platform in the form of Amazon web
services which is a comprehensive cloud computing platform. This platform facilitates the
company in providing servers, storage , networking, remote computing , mobile development,
email and security as well. As per recent details, AWS has contributed almost 13% of the
Amazon's total revenue of the Quarter 2, 2021. As Amazon operates in many countries, its AWS
system supports various locations of the company. AWS is headquartered in Seattle, USA. This
cloud has almost 24 geographic regions around the world that include the AWS regions in
Australia, Canada, Israel, New Zealand, India, Switzerland, UAE etc.
Figure 4 : AWS Cloud sevices , 2021
Document Page
Different types of cloud computing
 Infrastructure as a service (Iaas) – This cloud computing service provides hardware
resources to the businesses using the virtual interface. It is convenient for use as it does
not have pre-installed applications not even the operating systems due to which it is
preferred by the business organizations (Haidri end et. al.,2022). It provides extra storage
for data backup, network bandwidth for website server of business and allow access to
the required infrastructure that is crucial for supporting the software.
 Platform as a service (Paas) – This cloud computing model delivers the cloud platform to
its users. He users have power and flexibility to develop and manage the applications on
cloud. For this purpose, it offers an operating system, an application suite and some
development tools. Organizations are free to develop their traditional infrastructure on
such cloud models.
 Software as a service (Saas) – It is a Cloud computing service model and a software
licensing that creates and delivers a complete functioning software to business over the
web by using the subscription model. It does not put emphasis on providing the cloud
services from the operating system rather it provides services through the web browser
that is billed against consumption (Goniwada, 2022).
ï‚· Private Cloud - This cloud offers services for an individual organization and facilitates
privacy of information on the cloud and offers different cloud services. It can be installed
at the data centres that are physically available in the organization internally. They can
also be managed remotely by their party vendors.
In context with Amazon, the company uses Amazon web services cloud systems that include a
mixture of Infrastructure as a service, IAAS); Platform as a service (Paas) and Software as a
service (Saas) offerings. Amazon also uses Amazon S3 i.e. Amazon simple storage service that
is a global infrastructure as a service i.e. Iaas offered by AWS. It facilitates the company in
maintaining highly scalable, protected and low-latency data storage from the cloud. AWS of
Amazon is a public cloud that offers the services such as Amazon Elastic Compute cloud that
facilitates the infrastructure and services over the public network. Amazon is also having a
Virtual private cloud (VPC) that is a commercial cloud computing service that provides the users
Document Page
a virtual private cloud and enables to launch AWS resources in the virtual private network
(Sundaram and Murgod, 2022).
Figure 5: Virtual private Network , 2022
(B) Key benefits of cloud computing to Amazon
Amazon uses AWS cloud computing platform that provides many benefits to the
company in terms of storage of large amount of data and managing the workload of websites as
well. Cloud computing helps the business organizations in reducing the cost of managing and
maintaining the IT systems. It helps in reducing the expenditure of purchasing expensive systems
and equipments by providing resources of cloud computing service provider. Some of the
benefits of cloud computing or AWS are explained as under -
 Reduced IT costs – Cloud computing reduces the costs of managing and maintaining the
IT systems as cloud computing provides resources of clod computing service provider
that reduces the cost of buying the costly systems and equipment for the business (Cai
and Wang, 2022). In context with Amazon, by the use of AWS cloud system, it is able to
reduce its operating costs because of avoiding the cost of system upgrades, hardware and
software that might be included in the contract. It also reduces the chances for time
delays.
 Scalability – There can be situations in the business that can increase or decrease the need
of operation and storage for business. For this cloud computing systems allow flexibility
to the businesses according to their needs (Shrmali and Sharma, 2022). Cloud computing
provides Amazon with the service provider and thereby reduce the installation of
expensive upgrades for the business. The managers and CEO of Amazon are free to
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
decide their business concerns as cloud computing facilitates freeing up of time for
running the business.
 Collaboration efficiency – Collaboration facilitates the businesses in communicating and
sharing in more convenient way. Amazon is a multinational organization and is operating
in various countries at different locations, so cloud computing facilitates this company in
making the files available on cloud accessible to its employees, contractors and third
parties. For example, the organizations may require to share accounting records with
accountant or financial adviser as cloud computing serves secure way to share the
confidential information through clouds.
 Flexibility – Cloud computing allows the employees of Amazon to be more flexible in
their work. As the work-related information can be accessed from the cloud system of
company, it makes it easier for the employees to access files while they are working from
home or are on holiday. It helps them in connecting to the virtual office in a convenient
and quick manner when they are off site.
 Access to automatic updates – Cloud computing also provides the benefit of system
update for the IT requirements of business (Alenizi and Al-karawi, 2022). The system of
the Amazon gets regularly updated because of facilitation provided by cloud computing
service provider. The AWS cloud system of Amazon facilitates the company in self
updating the versions software. It also facilitates upgrades to servers and computer
processing powers.
Question 2
Security requirement to implement security and control of data in business
A security requirement refers to the need of security for business organisations to protect the
confidential information and ensure the security functionality that facilitates many properties of
the software. Security requirements have been identified on the basis of industry standards,
applicable laws, and past vulnerabilities to ensure security of data. Business organizations adopt
various practices to ensure safety of their data and to reduce any unauthorised access to the
personal information of employees and confidential information of the company (Madan,
Bhardwaj and Gupta, 2022). To ensure security, the companies use Cloud computing systems to
authorise only the allowed users to access any file or other information from the cloud. It also
Document Page
uses other measures of safety such as setting of passwords for the hardware devices and by
scanning all the new devices.
Business organizations keep their data secured and protected by limiting file sharing,
remote device wiping, scanning for vulnerabilities etc. They create virtual private network for
the organization’s internal operations that is accessed by only the specific Individuals such as
employees, managers or contractors etc. There are different security requirements to ensure
protection of the digital or cloud-based data of company (Moorthy and Gandhi, 2022). There are
different security frameworks available to be used by the business organizations to ensure safety
of their data and develop an authentic approach to facilitate the protection of digital information.
Some of those requirements have been explained below by the use of security requirement
framework in context with different technology organizations –
 CIA Triad – A framework for security of data and information
When it comes to the security of data and information, CIA Triad model serves its best
security measures for the protection of data and information. CIA Triad is an information
security model that comprises of three key components in terms of data security. Those
components include Confidentiality, Integrity and Availability (Sharmila, Aslam and Riswan,
2022). These can also be considered as the security requirement for the data and information of
business organisation. Each component of this model contains the objective of information
security. The components of CIA Triad are explained below –
 Confidentiality – It is associated with secrecy and use of encryption. It means that the
data should be available only to the authorised parties. When the data or information is to
be kept as confidential from third parties, it should not have access to other parties and
should be accessible only to the authorised individuals. It must not be disclosed to those
individuals or organizations that do not require them. Confidentiality of information
refers to the organization of information in terms of its access and sensitivity so as not to
make it available and accessible publicly. For example, Apple (a multinational
technology company engaging in consumer electronics, software, and online services
etc.) ensures its data security by using icloud that secures the information by way of
encryption during the transit of information and by way of storing it in an encrypted
format and protects the encryption keys in Apple data centres.
Document Page
 Integrity – It refers to ensure whether the data is hampered or not, whether it suffers from
any degradation before or after submission. It includes a certainty that the data must not
get unauthorised modification or transformation in intentional or unintentional manner.
organizations must ensure the integrity of data not to be compromised and remain
secured from the unauthorised changes in the data. The integrity od data can be
compromised at two points during the sharing process or transfer process. They can occur
while uploading the data or while it is being transmitted and at the time of storage of data
in any collection or database. For example, Amazon ensures the security of information
by using encryption protocols and softwares during the transmission of information so as
to prevent any unauthorised access to the information being transmitted. It uses the Cloud
computing systems i.e. AWS that ensures data integrity and confidentiality as well. It
AWS service uses FIPS 140-2 validated hardware security modules (HSMs) to secure the
integrity and confidentiality of keys and create them in an AWS ckoudHSMcluster. The
company also uses AWS iot device defender for security management of IOT devices. It
uses AWS network firewall for network security, AWS shield for DDos protection i.e.
Infrastructure protection. The company also uses AWS web application firewall (WAF)
for managing filter malicious web traffic.
 Availability – This safety requirement states that the information must be available to the
authorised users as per their demand and requirement. For ensuring availability, the
organizations must have proper functioning computer systems, communication channels
and security controls as well (Verma, Dhanda and Nagar, 2022). The critical systems i.e.
power generations, safety systems etc. have intense requirements regarding availability.
These systems must be strong enough to avoid cyber threats, and ensure safety as to
power outages and device or hardware failures that may influence the system availability.
For example, Microsoft (an American multinational technology corporation that produces
ad offers computer software , consumer electronics, personal computers and other related
services and best known for software products like Microsoft windows line of operating
system etc.) uses azure network of cloud computing that is one of the largest network in
the world. As the operations of Microsoft are geographically distributed in many
countries and at different locations, the company ensures high availability of data and
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
information through advanced monitoring and immediate incident response, service
support and backup failover capability etc.
So, the above explained components of CIA Triad are the major security requirement for the
business organizations to ensure safety of their personal information and data i.e.
confidentiality, Integrity and availability by the use of emerging technologies and cloud
computing systems and infrastructures.
Question 3
(A) Key networking infrastructures that might be used for everyday business operations
Networking infrastructures consist of hardware as well as software systems and devices.
These infrastructures facilitate the business organizations by ensuring better computing and
communication with the users and related parties, services, processes and applications. The
system’s network infrastructure involves in its network everything from servers to wireless
routers etc. (Zhang, 2022). In context with different multinational technology organizations, their
networking infrastructures are explained below-
 Google Cloud – Google cloud system or platform is the cloud of Google (an American
multinational technology company that engages in artificial intelligence, search engine, computer
software and consumer electronics etc.) It offers the services such as computing, storage,
database, security artificial intelligence, machine learning and virtualization etc. google provides
different services through this cloud that include Internet of thigs, data analytics, API
management, Google maps platform and google hardware etc. the service of google cloud are
available in more than 200 countries, over 60 zones and 20 regions. Its cloud certifications
include professional cloud developer, Architect, security engineer, network engineer etc.
 IBM Cloud – The IBM cloud has been developed by IBM (an American multinational
technology company that engages in computer hardware, middleware and software and provides
consultancy services as well.) It is a set of cloud computing services for business organizations.
Like any other cloud service provider, it also provides the services of IAAS, SAAS, PAAS
through public, private and hybrid cloud models. It facilitates the business organizations in
ensuring safety, storage, transmission, retrieval and access of their data and information on the
IBN cloud. It offers Dev tools, VMware, IOT cloud packs etc.
Document Page
 Microsoft Azure – This cloud is the network infrastructure of Microsoft company. Its
cloud effectiveness is due to the intelligence. Azure provides the advanced and intelligent
products and services. The Microsoft windows operating system and database SQL server are
available in the cloud through Windows Virtual Desktop (Volety and Geethanjali, 2022). Its TFS
and VSTS including its mixed reality technology are available in azure cloud through Azure
developments. Its popular office suite and enterprise products like SharePoint and power BI are
also available as office 365 and powerxxx tools. It also provides the services like analytics,
networking, security and windows virtual desktop etc.
 Amazon web Services – AWS is the most popular cloud service provider in the world. It
is world’s most comprehensive and broad cloud platform or networking infrastructure that offers
over 165 fully-featured services from its global data centres. The services offered by AWS
include Virtual private cloud, EC2, AWS data transfer, Simple storage service (S3), Elastic
compute cloud etc. It puts security on prior basis and meet the safety requirements of security –
sensitive organizations as well as customers. It also provides the benefits of data encryption,
access and control and penetration testing etc.
 Alibaba Cloud – Alibaba is a Chinese multinational technology company engaging in e-
commerce, retail, internet and technology and the related services. This Cloud is a largest cloud
provider or networking infrastructure in China. It offers different products and services in
multiple forms such as Elastic computing, networking, security, monitoring, storage and CDN
etc. prior to this cloud service, it was offering own e-commerce system but now the cloud has
been made public. Its cloud centres are available in 56 availability zones and 19 regions around
the world.
(B) Calculation of different measures from the Sales department of AllTech Group
Refer Excel file in the rar for this part i.e. 3(B).
CONCLUSION
The above report has thrown a reflection on the importance and role of Information systems
and technology on the business organizations. The basic concepts and roe, different types of
cloud computing have been discussed according to their service scale such as IAAS, PAAS,
Document Page
SAAS etc. along with the benefits of cloud computing to the multinational technology company
Amazon. The report has also explains the security requirements for the data and information in
different business organisation in context with different technology companies such as Apple,
Microsoft and Amon etc. through CIA framework. In the end, the key networking infrastructures
or cloud systems o international big companies like Alibaba, IBM, Amazon have been discussed.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
REFERENCES
Books and Journals
Alenizi, A.S. and Al-karawi, K.A., 2022. Cloud Computing Adoption-Based Digital Open
Government Services: Challenges and Barriers. In Proceedings of Sixth International
Congress on Information and Communication Technology (pp. 149-160). Springer,
Singapore.
Cai, B. and Wang, X., 2022. Design and Implementation of Educational Information System
Based on Cloud Computing. In Innovative Computing (pp. 871-878). Springer,
Singapore.
Chen, S., end et. al.,2022. Blockchain applications in PLM towards smart manufacturing. The
International Journal of Advanced Manufacturing Technology, 118(7), pp.2669-2683.
Goniwada, S.R., 2022. Cloud Native Services. In Cloud Native Architecture and Design (pp. 27-
54). Apress, Berkeley, CA.
Haidri, R.A., end et. al.,2022. A deadline aware load balancing strategy for cloud
computing. Concurrency and Computation: Practice and Experience, 34(1), p.e6496.
Madan, S., Bhardwaj, K. and Gupta, S., 2022. Critical Analysis of Big Data Privacy Preservation
Techniques and Challenges. In International Conference on Innovative Computing and
Communications (pp. 267-278). Springer, Singapore.
Madhumala, R.B. and Tiwari, H., 2022. Virtual Machine Selection Optimization Using Nature-
Inspired Algorithms. Applied Soft Computing: Techniques and Applications, pp.121-
133.
Mohanty, S., end et. al.,2022. Mobile Cloud-Based Framework for Health Monitoring with Real-
Time Analysis Using Machine Learning Algorithms. In Contemporary Issues in
Communication, Cloud and Big Data Analytics (pp. 173-183). Springer, Singapore.
Moorthy, U. and Gandhi, U.D., 2022. A survey of big data analytics using machine learning
algorithms. In Research Anthology on Big Data Analytics, Architectures, and
Applications (pp. 655-677). IGI Global.
Ram, D., 2022. An Analysis on the Terms and Conditions of the Clickwrap Agreement and the
Benefits of Maintaining the Click Wrap Agreement in Cloud Computing. In Regulatory
Aspects of Artificial Intelligence on Blockchain (pp. 205-224). IGI Global.
Shah, S.Q.A., Khan, F.Z. and Ahmad, M., 2022. Mitigating TCP SYN flooding based EDOS
attack in cloud computing environment using binomial distribution in SDN. Computer
Communications, 182, pp.198-211.
Sharmila, V.C., Aslam, H.M. and Riswan, M.M., 2022. Analysing and Identifying Harm
Propagation of Cyber Threats in Autonomous Vehicles and Mitigation Through ANN.
In Smart Trends in Computing and Communications (pp. 405-417). Springer,
Singapore.
Shrmali, D. and Sharma, S., 2022. Applications of Deep Learning in Cloud Security. Deep
Learning Approaches to Cloud Security, pp.225-256.
Sundaram, S.M. and Murgod, T.R., 2022. Edge Computing for Secured IoT Analytics on the
Cloud. In Integrating AI in IoT Analytics on the Cloud for Healthcare Applications (pp.
162-175). IGI Global.
Verma, R., Dhanda, N. and Nagar, V., 2022. Security Concerns in IoT Systems and Its
Blockchain Solutions. In Cyber Intelligence and Information Retrieval (pp. 485-495).
Springer, Singapore.
Document Page
Volety, R. and Geethanjali, P., 2022. Smart Home Automation Using Wearable Technology.
In Wearable/Personal Monitoring Devices Present to Future (pp. 259-279). Springer,
Singapore.
Zhang, X., 2022. The Balancing Acts by the Large Industrial Economies. In The Industrial
Processes of Large Economies (pp. 65-74). Springer, Singapore.
chevron_up_icon
1 out of 15
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]