Analysis of Data as a Service (DaaS) Cloud Offering Research Report

Verified

Added on  2023/01/05

|13
|633
|60
Report
AI Summary
This report provides a comprehensive analysis of Data as a Service (DaaS) cloud offerings, focusing on research aims, objectives, and associated vulnerabilities. It begins by outlining the research's primary objective: to analyze vulnerabilities in DaaS cloud offerings. The report details the research methodology, including ethical considerations related to data protection and the use of secondary data. A Gantt chart outlines the project plan, and the report identifies hacking as a primary threat and vulnerability in cloud computing. The report also proposes a framework for managing DaaS applications, including steps for data finding, storing, processing, and moving. It highlights the advantages of DaaS, such as cost savings and scalability, while addressing security challenges. The report also recommends measures for data protection, including regular backups, strong passwords, and up-to-date software. The report concludes with a list of references.
Document Page
DATA AS A SERVICE (DAAS) CLOUD OFFERING
Computing and Information technology with advanced practice
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
THE RESEARCH AIMS AND OBJECTIVES
The research main objective is:
To analyse vulnerabilities associated with Cloud offering of Data as a Service (DaaS)”
To obtain the primary aim of this study the following objectives should be achieved:
To analyse importance of cloud computing
To analyse different kinds of cloud computing services
To evaluate ways in which Data as a Service (DaaS) Cloud offering is used.
To analyse importance of DaaS in Higher education
To evaluate vulnerabilities associated with Data as a Service cloud offering and their impact on
organizations.
To identify ways in which vulnerabilities associated with Data as a Service (DaaS) Cloud
offering can be reduced.
1
Document Page
RESEARCH
PHILOSOPHY AND
APPROACH
Interpretivism Philosophy
Deductive Approach
2
Document Page
ETHICAL CONSIDERATION
3
in order to collect secondary data, it is important for researcher to adhere data
protection act, 2018. It further helps in collecting and using secondary data in
an ethical manner. None of the data of other researcher were used without
citing or it can also be said that data of any researcher used in this dissertation
have been cited and referenced properly. None of the secondary data from
unauthorised sources have been used within this research. Proper Harvard
referencing style was adopted for referencing and citing sources of data. It is
also been analysed that researcher has been engaged in making sure that ethical
code of conduct is being followed.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
PROJECT PLAN (GANTT CHART)
Document Page
HACKING
it is one of the most commonly threat, vulnerability that are directly associated with cloud
computing. A hacker can access the information with cloud network which can possible
when gaining authorised access to network. There are different way that hacker gain
access to cloud network and other as guessing or cracking user’s password, installing a
key loggers.
4
Document Page
THE PROPOSED FRAMEWORK
Planning
Analysing
Implement
ing
protecting
5
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
CONT.
It has analysed that delineate a possible framework for handling the tools and
service for application migration on the cloud services. That’s why, it has been
processing data or information by DaaS application. Afterwards, it has been
proposed the different steps when using DaaS and composed by different steps
such as finding, storing, processing and moving data.
Document Page
SECURITY
7
Web Server
Email Filter
Endpoint Endpoint
Web Filter
Threat
management
The primary advantage of
DaaS that are promoted as
capital advantage, benefits. In
particularly, preserve monthly
cash flow of enterprise.
Another advantage include
ability to easily swap out
certain machine as per
demand. Afterwards, it quickly
replace outdated system with
French devices. Sometimes,
this is where identifying the
challenges regarding security
which directly impact on the
overall performance of
network.
Document Page
T H E I M P O RTA N C E
O F D A A S
Reduce IT complexity
Cut purchasing and operating costs
Anytime, anywhere access the information or data
9
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
PROTECTION
Decryption
tools
Regula
r Data
back-
ups
Strong
passwords
Keep
OS and
softwar
e
update
d
Antivirus
with
ransomwa
re
remediatio
n tools
Sanb
ox
and
VM
10
Document Page
REFERENCES
Yang, C., and et.al., 2017. Big Data and cloud computing: innovation
opportunities and challenges. International Journal of Digital Earth, 10(1),
pp.13-53.
Varghese, B. and Buyya, R., 2018. Next generation cloud computing: New
trends and research directions. Future Generation Computer
Systems. 79. pp.849-861.
Document Page
THANK YOU
chevron_up_icon
1 out of 13
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]