logo

Assignment on Webb Stores and Cloud Computing

13 Pages2905 Words54 Views
   

Added on  2020-04-07

Assignment on Webb Stores and Cloud Computing

   Added on 2020-04-07

ShareRelated Documents
Running head: WEBB’S STORES & CLOUD COMPUTING[Assessment ID & Name][Student Name, ID][Student Email][Professor’s Name Here][Date Here][Name] [Student No.]
Assignment on Webb Stores and Cloud Computing_1
WEBB’S STORES & CLOUD COMPUTINGExecutive SummaryCloud solutions have completely changed the modes of accessing and utilizing IT resourcesthrough the services they offer. In essence, cloud-based solutions provide leased IT resourcesto users through internet connections where on-demand infrastructures are supported bydedicated service providers. In all, a user or subscriber having an internet connection can‘borrow’ any resources they require at a specified fee including components such as storageand computational facilities. Furthermore, because these resources are provided by a partydedicated to cloud solutions, they can be adequately adjusted to fit the need of the user atminimal expenditures. Therefore, a user in need of flexible storage facilities or databasesystems can regularly adjust them based on their immediate demands. Now, Webb’s Stores(a retail store) owns many business locations in Australia and New Zealand. Each one ofthese location requires access to the company’s information which necessitates the need fordata centres, the prevailing challenges for the enterprise where data replication has become aproblem. As a solution, Webb’s Stores aim to integrate cloud solutions into its operations toexpand the reach of its data centres and to improve its business expansion requirements. Thisreport highlights the key components of this endeavour.[Name] [Student No.]2
Assignment on Webb Stores and Cloud Computing_2
WEBB’S STORES & CLOUD COMPUTINGTable of ContentsContents PageTask one: Database migration to IaaS instance....................................................3a. IaaS security in public domain........................................................................3b. Benefits and risks of the security methods......................................................4The benefits:........................................................................................................4The risks:.............................................................................................................4Task two: The risks of a cloud migration..............................................................5a. On the database................................................................................................5b. Risk on the IaaS infrastructure........................................................................5c. Communication risk between Webb’s and IaaS resource...............................6Task three: Cloud resources for backup and restoration requirements............6a. The risks/issues of cloud backups...................................................................6i. Backing up data risks....................................................................................6ii. Data storage.................................................................................................7iii. Data retrieval...............................................................................................7b. How is the DR plan affected?..........................................................................8Task four: Protecting access to the cloud resource..............................................8a. IaaS infrastructure............................................................................................8b. Ms SQL server instance..................................................................................9c. The cloud network infrastructure....................................................................9d. Cloud backup and restoration facility...........................................................10References..............................................................................................................11[Name] [Student No.]3
Assignment on Webb Stores and Cloud Computing_3
WEBB’S STORES & CLOUD COMPUTINGTask one: Database migration to IaaS instancea. IaaS security in public domainConsider the security risk imposed by the internet which is the support environment for thecloud computing resources. The IaaS infrastructure can be compromised using an array ofintrusion methods including interceptions, snooping and malware among many others.Therefore, the users of this service must implement several security measures to protect theacquired IaaS resource.System encryption: A security method that serves as the single most important resource forany publicly deployed resource. In this security feature, the data used by the enterprise isencrypted using certain protocols and access keys. These keys are integrated into theoperating system and provided to the members of the organizations (verified members)which protects the information being used. Furthermore, the channels of communication(networks) are also encrypted using specialized parameters such as VPNs (virtual privatenetworks) which boosts the security of the access environments [ CITATION Mog17 \l 1033 ].IaaS service isolation: The cloud resource will be accessed by different people within theleasing organization. These people will hold different roles within the organization and thuswill require different data and resources. Similarly, the IaaS instance should be isolated basedon a specified access policy. This policy would isolate the structure of the IaaS infrastructurethus enhance its accountability and management.Infrastructure assessment and management: These roles that would be accomplished byusing firewalls and intrusion detection systems. In essence, these security features wouldassess the data packets being transferred between the host organization and the IaaS instancethus filter out all the negative intrusions and content [ CITATION Wal15 \l 2057 ].[Name] [Student No.]4
Assignment on Webb Stores and Cloud Computing_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assignment on Cloud Computing and Webb Store
|13
|2958
|265

(Solved) Assignment on Cloud Computing
|13
|2925
|208

Security Management and Migration Report
|11
|2567
|372

The Hybrid Cloud Approach | Report
|13
|2689
|73

Risk and Security in Cloud Computing | Report
|17
|4058
|59

CMP2808M - Cloud Computing Report || Webb's Stores Strategy
|11
|1922
|38