Cloud Computing Strategy for Smith Security Ltd's IT Infrastructure

Verified

Added on  2023/06/10

|10
|665
|480
Report
AI Summary
This report evaluates the potential of cloud computing for Smith Security Ltd, an Australian company with diverse security businesses. The report assesses the company's existing IT infrastructure, which includes Active Directory domain controllers, SQL servers, Lotus Notes email servers, print servers, IIS web servers, and business application servers across multiple data centers. It examines three cloud service models—Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS)—and determines the most suitable options for Smith Security Ltd. The report recommends IaaS as the primary cloud model due to its security and collaboration benefits, despite the potentially higher cost. It also suggests PaaS for the business application servers running custom software. The analysis considers factors such as cost-effectiveness, security, ease of migration, scalability, and collaboration. The report concludes with a recommendation for a phased approach to cloud migration, prioritizing security and business continuity.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Cloud Computing
Smith Security Ltd
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Cloud computing enables compute resource
consuming.
Cloud computing is based on demand service
models (Dinh et al., 2013).
It does not incur upfront costs.
Cloud computing produces quality service.
Cloud Computing
(Source: Hashem et al., 2015)
Document Page
Cloud service models are as follows:
Infrastructure as a Service or IaaS
Platform as a Service or PaaS
Software as a Service or SaaS
Concepts of Cloud
Computing
(Source: Hashizume et
al., 2013)
Document Page
Cost Effective
Lack of Complexities
Extremely secured (Dinh et al., 2013).
Easy to Migrate
High Scalability and Flexibility
Increased Collaboration
Why cloud is good for Smith
Security??
(Source: Arora,
Parashar &
Transforming, 2013)
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Smith Security has Active Directory domain controller on
Windows Server 2003.
Windows Server 2003 running IIS Web servers, which connect to
the SQL backend (Fernando, Loke & Rahayu, 2013).
In this case, IaaS would be the best solution, since it will be
providing virtualized infrastructure.
Infrastructure as a Service
(Source: Hashem et al.,
2015)
Document Page
Smith Security Ltd also has other server
infrastructure like Lotus Notes email server and 2
Business Application Servers running custom software
to manage their staffs (Hashizume et al., 2013).
In this case, PaaS would be better for them since the
server are running custom software.
Platform as a Service
(Source:
Rittinghouse &
Ransome, 2016)
Document Page
Smith Security Ltd. has server infrastructures of Windows
Server 2003 Print Server and SQL Server 2003 database server
on Windows Server 2003 (Fernando, Loke & Rahayu, 2013).
However, SaaS is not suitable in this case, since the servers
are running custom software.
Software as a Service
(Source: Dinh et al., 2013)
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
The recommended cloud model for Smith
Security Ltd is IaaS or infrastructure as a service.
Although, the cost is high, IaaS is extremely safe
and secured and thus there is no chance of data
loss. Moreover, it helps in easy collaboration.
Recommended Cloud
Model
(Source:
Rittinghouse &
Ransome, 2016)
Document Page
Arora, R., Parashar, A., & Transforming, C. C. I. (2013). Secure user data
in cloud computing using encryption algorithms. International journal
of engineering research and applications, 3(4), 1922-1926.
Dinh, H. T., Lee, C., Niyato, D., & Wang, P. (2013). A survey of mobile
cloud computing: architecture, applications, and
approaches. Wireless communications and mobile computing, 13(18),
1587-1611.
Fernando, N., Loke, S. W., & Rahayu, W. (2013). Mobile cloud
computing: A survey. Future generation computer systems, 29(1), 84-
106.
Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan,
S. U. (2015). The rise of “big data” on cloud computing: Review and
open research issues. Information Systems, 47, 98-115.
Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernandez, E. B.
(2013). An analysis of security issues for cloud computing. Journal of
internet services and applications, 4(1), 5.
Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud computing:
implementation, management, and security. CRC press.
References
Document Page
chevron_up_icon
1 out of 10
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]