ICT Cloud Assignment: Hybrid Cloud Solutions and Security

Verified

Added on  2022/10/18

|7
|1335
|130
Homework Assignment
AI Summary
This assignment delves into the realm of ICT cloud computing, presenting solutions to two key assignments. The first assignment explores the core components of System Center Operations Manager (SCOM), including the operational database, management server, console, data warehouse, and various server and agent types. It also examines the different user profiles with varying levels of access within the operation manager. The second assignment focuses on hybrid cloud solutions, discussing the benefits such as security, cost efficiency, scalability, and investment preservation. It also analyzes the vital issues when adopting hybrid cloud solutions, emphasizing security risks, the need for skilled professionals, and the challenges of application transfer and cloud management. Finally, the assignment addresses the understanding of cloud-specific threats, including ransomware, BEC attacks, and data breaches, highlighting that threats can occur in both cloud and traditional environments.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: ICT CLOUD
ICT CLOUD
Name of the Student:
Name of the University:
Author Note:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1ICT CLOUD
Table of Contents
Assignment 1...................................................................................................................................2
Answer (a)...................................................................................................................................2
Answer (b)...................................................................................................................................3
Assignment 2...................................................................................................................................4
Answer (a)...................................................................................................................................4
Answer (b)...................................................................................................................................4
Answer (c)...................................................................................................................................5
Document Page
2ICT CLOUD
Assignment 1
Answer (a)
There are twelve core components of SCOM (Systems Centre Operations Manager)
(MVP, 2015). They are as follows:
1. Operational Database: Every information of the cloud in the environment will be stored
in a central database which stores all the information of the organization. This allow the
operational manager to handle all the data with a security plan.
2. Management Server: It is the main part of the environment. It communicates with the
clients and also give access to consoles. The management server can be single or
multiple. The multiple management server is collectively known as Resource pool.
3. RMS Role: The Root Management Server or RMS is dynamically located in Resource
pools and Management Servers.
4. Console: All operations are conducted in the consoles of SCOM.
5. Data Warehouse: It handles all the installation part of the environment.
6. Reporting server: Reporting side of the Operation manager by employing the database
side (Hernantes, Gallardo & Serrano, 2015).
7. Web Console Server: This server provides the access to the data through web.
8. Agent: There are many agents like Linux agents, Windows agents which states the
information of the working environment.
9. Gateway Server: it helps to overcome latency in the environment.
10. Audit Collector: It collects all the data
11. Audit Database: It stores all the collected data to the database.
Document Page
3ICT CLOUD
12. Audit Forwarder: It helps to transfer the store data from one part to other part of the
environment.
Answer (b)
The User profiles which provides access to the operation manager are as follows
(Nedelcu et al., 2015):
Administrator: Full privileges to the Operations Manager
Advanced Operator: Comprises of the list of privileges developed for the clients who
require access to the limited adjustment to monitor configurations with the operator
privileges.
Application Monitoring Operator: Comprises of list of privileges developed for users
who require access to the Application diagnostics. It allow to view or display all the
Application Monitoring activities (Dutta et al., 2013).
Author: Comprises of a list of the privileges developed for authoring configurations.
Operator: Comprises of list of the privileges developed for users who want access to the
tasks, views and alerts.
Read Only Operator: Comprises the list of privileges developed for the users who
require read only access to the views and alerts. The members of Read Only operator are
not assigned to the task directly.
Report Operator: Comprises of the list of privileges developed for the clients who
require access to Reports.
Report Security Administrator: Allows addition of the SQL server Reporting Services
security along with the user roles of Operation manager.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4ICT CLOUD
Assignment 2
Answer (a)
Security: Involving the private cloud into the mix is seen to be providing reassurance
whenever it comes to the security of all the several operations which are very much sensitive and
hence can make it very much easier to meet all the requirements of storage (Lu, Xu & Xu, 2014).
Efficiency of cost: All the adopters of the hybrid cloud can help a lot in balancing all of their
requirements for being efficient of cost.
Scalability: By moving all the workloads that highly benefits from the scalability to the cloud
which will be public and this will be reducing all the demands upon the private cloud.
Investment Preservation: A strategy of hybrid cloud will be enabling a lot in continuing utilizing
all the existing investments of IT, whether upon all the premises or rather collocated.
Answer (b)
The most vital issue when adopting hybrid cloud solution is the security risk that comes
with it. When talking about private cloud, it provides the required level of security that is needed
in order to give protection to the sensitive information but in case of hybrid cloud a unique and
distinct type of management is required. It becomes essential for any organization to properly
manage the process in which the data moves in between the private and the public clouds (Goyal,
2014). There is a need to find out the sensitive data that cannot go into public cloud as it is
important to recognize those data that requires access to private cloud in order to complete the
work. As it is an emerging technology integrating the clouds requires skilled professionals.
Those employees who are highly qualified and are able to understand the related complexities of
the hybrid cloud infrastructure need to manage the system. Applications transfer in between
Document Page
5ICT CLOUD
clouds is easy but establishment of metadata and related configurations in between the clouds is
not that easy. There exists may such applications which are effective in managing the integration
that is required in between the private and the public clouds and this in case requires technicians
who are skilled and trained to handle this structure. Businesses are required to create efficient
strategies of cloud management so that it is easy to manage the cloud services comprising of
numerous providers. Each of the providers of the cloud can possibly have distinct infrastructure
and thus the person handling the same must be well acquainted to this.
Answer (c)
This is because it has been observed that with regard to that of the cloud, it is really very
much essential to properly understand that all the threats are not always cloud specific. There
may be a number of threats like the ransom ware, BEC attacks and also all the breaches of data
that can be occurring in all the several environments of the cloud and also all the traditional ones.
Breaches of data can be happening because of the all the attachments of malware or rather they
can also be resulting of all the attacks which will be main in the middle upon the cloud.
Document Page
6ICT CLOUD
References
Dutta, S., Pal, S. K., Mukhopadhyay, S., & Sen, R. (2013). Application of digital image
processing in tool condition monitoring: A review. CIRP Journal of Manufacturing
Science and Technology, 6(3), 212-232.
Goyal, S. (2014). Public vs private vs hybrid vs community-cloud computing: a critical review.
International Journal of Computer Network and Information Security, 6(3), 20.
Hernantes, J., Gallardo, G., & Serrano, N. (2015). IT infrastructure-monitoring tools. IEEE
Software, 32(4), 88-93.
Lu, Y., Xu, X., & Xu, J. (2014). Development of a hybrid manufacturing cloud. Journal of
Manufacturing Systems, 33(4), 551-566.
MVP, S. B., Horner, J., Odika, C., & Ryan, R. (2015). Microsoft System Center 2012 R2
Operations Manager Cookbook. Packt Publishing Ltd.
Nedelcu, B., Stefanet, M. E., Tamasescu, I. F., Tintoiu, S. E., & Vezeanu, A. (2015). Cloud
Computing and its Challenges and Benefits in the Bank System. Database Systems
Journal, 5(1), 45-58.
chevron_up_icon
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]