Webb's Store: Cloud Migration, Security, and Risk Analysis Report
VerifiedAdded on 2020/04/01
|15
|2948
|171
Report
AI Summary
This report provides an executive summary of Webb's Store's decision to migrate to the cloud, focusing on various aspects of cloud computing and its implementation using Amazon Web Services (AWS). The report addresses the migration of their MS SQL Server 2012 R2 database to an IaaS instance, detailing security deployment strategies, benefits, and issues. It analyzes risks associated with database migration, including data breaches, account hijacking, and malware attacks, while also examining risks related to the IaaS infrastructure and communication. Furthermore, the report considers cloud-based backup and archival solutions, assessing associated risks such as bandwidth limitations and data security during transmission and storage. Finally, the report provides recommendations for protecting access to IaaS infrastructure, the MS SQL Server cloud instance, cloud network infrastructure, and cloud backup and restore infrastructure, offering a comprehensive guide for Webb's Store's cloud adoption strategy.

CLOUD COMPUTING STUDENT NAME: , STUDENT ID:
Cloud Computing
Assignment No.:
Student Name:
Student ID:
Student Email:
University Name:
Cloud Computing
Assignment No.:
Student Name:
Student ID:
Student Email:
University Name:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

CLOUD COMPUTING STUDENT NAME: , STUDENT ID:
Executive Summary
Webb's Store, the retail store in Australia has decided to migrate to the cloud. Various
aspects associated with cloud will be discussed in the report. Webb Store can be facilitated
by the advanced cloud solutions provided by Amazon. The risks, threats associated with
cloud platform has been detailed and as well as the risk mitigation has been detailed in the
report has been elaborated.
1 STUDENT NAME: , STUDENT ID:
Executive Summary
Webb's Store, the retail store in Australia has decided to migrate to the cloud. Various
aspects associated with cloud will be discussed in the report. Webb Store can be facilitated
by the advanced cloud solutions provided by Amazon. The risks, threats associated with
cloud platform has been detailed and as well as the risk mitigation has been detailed in the
report has been elaborated.
1 STUDENT NAME: , STUDENT ID:

CLOUD COMPUTING STUDENT NAME: , STUDENT ID:
Table of Contents
Introduction................................................................................................................................3
Question 1..................................................................................................................................3
1. Webb’s decision to migrate their MS SQL Server 2012 R2 database to IaaS instance.........3
1. a. Security deployment to protect this migration of database to IaaS instance...............3
1. b. Benefits and issues related to deployment of these security measures.......................4
Question 2..................................................................................................................................5
2. Risks associated with migrating database to the cloud with respect to-................................5
2. a. The database..................................................................................................................5
2. b. The IaaS infrastructure...................................................................................................6
2. c. Communications between Webb’s and their IaaS database in the cloud.....................6
Question 3..................................................................................................................................7
3. Webb’s consideration for the use of the Cloud for backup and possibly also for archival of
records........................................................................................................................................7
3. a. Risks associated to..........................................................................................................7
I. Backing up data to the Cloud..........................................................................................7
II. Storage of data in the Cloud..........................................................................................7
III. Retrieval of data from the cloud...................................................................................8
3. b. Webb’s use of a Cloud backup and its impact on the company and DR plan...............8
Question 4..................................................................................................................................8
4. Recommendations to Webb for protecting access to the following services that they want
to move to the Cloud..................................................................................................................8
4.a. Their IaaS infrastructure..................................................................................................8
4.b. Their Ms SQL Server 2012 R2 cloud instance..................................................................9
4.c. Their Cloud network infrastructure.................................................................................9
4.d. Their Cloud backup and restore infrastructure..............................................................9
Conclusion..................................................................................................................................9
References................................................................................................................................11
2 STUDENT NAME: , STUDENT ID:
Table of Contents
Introduction................................................................................................................................3
Question 1..................................................................................................................................3
1. Webb’s decision to migrate their MS SQL Server 2012 R2 database to IaaS instance.........3
1. a. Security deployment to protect this migration of database to IaaS instance...............3
1. b. Benefits and issues related to deployment of these security measures.......................4
Question 2..................................................................................................................................5
2. Risks associated with migrating database to the cloud with respect to-................................5
2. a. The database..................................................................................................................5
2. b. The IaaS infrastructure...................................................................................................6
2. c. Communications between Webb’s and their IaaS database in the cloud.....................6
Question 3..................................................................................................................................7
3. Webb’s consideration for the use of the Cloud for backup and possibly also for archival of
records........................................................................................................................................7
3. a. Risks associated to..........................................................................................................7
I. Backing up data to the Cloud..........................................................................................7
II. Storage of data in the Cloud..........................................................................................7
III. Retrieval of data from the cloud...................................................................................8
3. b. Webb’s use of a Cloud backup and its impact on the company and DR plan...............8
Question 4..................................................................................................................................8
4. Recommendations to Webb for protecting access to the following services that they want
to move to the Cloud..................................................................................................................8
4.a. Their IaaS infrastructure..................................................................................................8
4.b. Their Ms SQL Server 2012 R2 cloud instance..................................................................9
4.c. Their Cloud network infrastructure.................................................................................9
4.d. Their Cloud backup and restore infrastructure..............................................................9
Conclusion..................................................................................................................................9
References................................................................................................................................11
2 STUDENT NAME: , STUDENT ID:
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

CLOUD COMPUTING STUDENT NAME: , STUDENT ID:
Introduction
Webb's Store, the retail store in Australia has decided to move to the cloud. Various
aspects associated with cloud will be discussed in the report (Beck, Hao & Campan, 2017).
The report will also highlight the risks, threats associated with the SQL database and risk
mitigation procedures will also be showcased in the report as well.
Question 1
1. Webb’s decision to migrate their MS SQL Server 2012 R2 database to IaaS instance
1. a. Security deployment to protect this migration of database to IaaS instance
Webb wants to migrate to the cloud and for this, they must be ready to face the issues
and consequences associated with it. The general issues associated with cloud are illicit
access to APIs, the virus, malware attack to the system and the database by the hacktivist
(Shufeng & Xu, 2012). That is why Webb must follow these principles to stay safe as well as
protected on the cloud platform.
Follow-through: The database administrators of the Webb Store must be
knowledgeable about all the files of the database and they mark them all so that the
administrators can recognise the files very easily that are stored in the database (Azam et
al., 2013). This approach can be convenient for them when trying to acquire those files for
future needs.
Security associated with network information: Certain policies must be established
for the customers and the employees and must limit them to use data from the database to
a considerable amount and not beyond that (Sadooghi et al., 2017).
3 STUDENT NAME: , STUDENT ID:
Introduction
Webb's Store, the retail store in Australia has decided to move to the cloud. Various
aspects associated with cloud will be discussed in the report (Beck, Hao & Campan, 2017).
The report will also highlight the risks, threats associated with the SQL database and risk
mitigation procedures will also be showcased in the report as well.
Question 1
1. Webb’s decision to migrate their MS SQL Server 2012 R2 database to IaaS instance
1. a. Security deployment to protect this migration of database to IaaS instance
Webb wants to migrate to the cloud and for this, they must be ready to face the issues
and consequences associated with it. The general issues associated with cloud are illicit
access to APIs, the virus, malware attack to the system and the database by the hacktivist
(Shufeng & Xu, 2012). That is why Webb must follow these principles to stay safe as well as
protected on the cloud platform.
Follow-through: The database administrators of the Webb Store must be
knowledgeable about all the files of the database and they mark them all so that the
administrators can recognise the files very easily that are stored in the database (Azam et
al., 2013). This approach can be convenient for them when trying to acquire those files for
future needs.
Security associated with network information: Certain policies must be established
for the customers and the employees and must limit them to use data from the database to
a considerable amount and not beyond that (Sadooghi et al., 2017).
3 STUDENT NAME: , STUDENT ID:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

CLOUD COMPUTING STUDENT NAME: , STUDENT ID:
Security Intelligence techniques and procedures: The defence system must be
checked and verified to find out any defect and fault and it is the duty of the Security
Intelligence to keep an eye on the defence system constantly (Dinh et al., 2013). Along with
that, they must apply proper cryptographic methods to embellish the security of the system
and the database.
1. b. Benefits and issues related to deployment of these security measures
Benefits of security -
i. Secured from the DDoS attack- The security and privacy can be well assured by the
cloud solutions, thus authentication can be guaranteed and along with that, the threat DDoS
can be mitigated as well.
ii. Security assurance of the information- The information residing within the
database and the system can be provided advanced cloud security solutions thus Webb can
stay protected from various kinds of threats (Varia & Mathew, 2014).
iii. Regulatory compliance- The financial data of the Webb Store along with the
customers' sensitive information like bank details, the customers' purchase records can be
managed in a secure manner with the help of cloud security solution.
iv. Probable solutions- The server that Webb is using can crash at any times and
Webb has the opportunity to scale back to diminish the heavy expenses when the cloud
traffic gets rectified (Dillon & Vossen, 2015).
v. Allowing 24x7 services- The cloud has the capability to cater 24x7 communication
services to the clients all day long.
4 STUDENT NAME: , STUDENT ID:
Security Intelligence techniques and procedures: The defence system must be
checked and verified to find out any defect and fault and it is the duty of the Security
Intelligence to keep an eye on the defence system constantly (Dinh et al., 2013). Along with
that, they must apply proper cryptographic methods to embellish the security of the system
and the database.
1. b. Benefits and issues related to deployment of these security measures
Benefits of security -
i. Secured from the DDoS attack- The security and privacy can be well assured by the
cloud solutions, thus authentication can be guaranteed and along with that, the threat DDoS
can be mitigated as well.
ii. Security assurance of the information- The information residing within the
database and the system can be provided advanced cloud security solutions thus Webb can
stay protected from various kinds of threats (Varia & Mathew, 2014).
iii. Regulatory compliance- The financial data of the Webb Store along with the
customers' sensitive information like bank details, the customers' purchase records can be
managed in a secure manner with the help of cloud security solution.
iv. Probable solutions- The server that Webb is using can crash at any times and
Webb has the opportunity to scale back to diminish the heavy expenses when the cloud
traffic gets rectified (Dillon & Vossen, 2015).
v. Allowing 24x7 services- The cloud has the capability to cater 24x7 communication
services to the clients all day long.
4 STUDENT NAME: , STUDENT ID:

CLOUD COMPUTING STUDENT NAME: , STUDENT ID:
vi. Costing- Webb do not have to spend heavy purchasing hardware, software and
application programs, even they do not have to spend money purchasing operating system
and also they do not have to worry about the updates and upgrades of the operating
system. They will have to pay a minimal amount to Amazon to hire their cloud platform
(Muthui & SISAT, 2013).
vii. Integrity- The data integrity highlights that the data should be stored safely and
securely and the cloud vendor must be loyal, thus, in this case, Amazon should take the
responsibility to provide advanced security solutions and data integrity solutions to the
Webb.
The primary issue is that Webb will have to pay the cloud vendor an annual revenue
or monthly revenue for hiring the cloud architecture framework (Muthui & SISAT, 2013).
The cloud architecture framework consists of latest hardware, latest software, latest
software programs and advanced security features. Webb needs it to conduct their business
activities in safe and secure manner.
5 STUDENT NAME: , STUDENT ID:
vi. Costing- Webb do not have to spend heavy purchasing hardware, software and
application programs, even they do not have to spend money purchasing operating system
and also they do not have to worry about the updates and upgrades of the operating
system. They will have to pay a minimal amount to Amazon to hire their cloud platform
(Muthui & SISAT, 2013).
vii. Integrity- The data integrity highlights that the data should be stored safely and
securely and the cloud vendor must be loyal, thus, in this case, Amazon should take the
responsibility to provide advanced security solutions and data integrity solutions to the
Webb.
The primary issue is that Webb will have to pay the cloud vendor an annual revenue
or monthly revenue for hiring the cloud architecture framework (Muthui & SISAT, 2013).
The cloud architecture framework consists of latest hardware, latest software, latest
software programs and advanced security features. Webb needs it to conduct their business
activities in safe and secure manner.
5 STUDENT NAME: , STUDENT ID:
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

CLOUD COMPUTING STUDENT NAME: , STUDENT ID:
Fig 1: SQL Server and its features
(Source: Tsai et al., 2014, pp-1-15)
Question 2
2. Risks associated with migrating database to the cloud with respect to-
2. a. The database
The risks associated with the database are-
Data breaches- Data breaches is a huge risk and threat for any organisation and
Webb Store is no exception. Due to the attack of the hacktivist Webb can lose reputation
and can lose the vital data and information. Even Webb can face severe loss for this data
breach.
Account hijacking of customers and employees- Webb's database holds the
customers' personal and sensitive information, so there is a risk if those data get breached
6 STUDENT NAME: , STUDENT ID:
Fig 1: SQL Server and its features
(Source: Tsai et al., 2014, pp-1-15)
Question 2
2. Risks associated with migrating database to the cloud with respect to-
2. a. The database
The risks associated with the database are-
Data breaches- Data breaches is a huge risk and threat for any organisation and
Webb Store is no exception. Due to the attack of the hacktivist Webb can lose reputation
and can lose the vital data and information. Even Webb can face severe loss for this data
breach.
Account hijacking of customers and employees- Webb's database holds the
customers' personal and sensitive information, so there is a risk if those data get breached
6 STUDENT NAME: , STUDENT ID:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

CLOUD COMPUTING STUDENT NAME: , STUDENT ID:
then Webb will face severe loss (Tsai et al., 2014). This data breach generally occurs by
means of phishing, DDoS attacks.
Malware attack- The malware attack makes one’s system vulnerable and the
malware attack includes virus attack and worm attack.
2. b. The IaaS infrastructure
The risks correlated with IaaS Cloud are-
Misconfigure issues- Webb must use the latest hardware and software and latest
operating system and latest application programs so that Webb's architecture can comply
with the Amazon AWS cloud framework.
Threat issues- The IaaS framework elements that are responsive to risks and threats
can be predicted by the Remediate, Prioritize and Scan method (Manvi, & Shyam, 2014).
Shadow-IT- This Shadow-IT is basically the assets which have not been used for long.
In the case of Webb due to the advent of Amazon AWS, Webb will use the cloud server
provided by the cloud vendor, so the database server which they are utilising now will not
be used anymore. This unused database is the asset which they will not go to use in mere
future.
7 STUDENT NAME: , STUDENT ID:
then Webb will face severe loss (Tsai et al., 2014). This data breach generally occurs by
means of phishing, DDoS attacks.
Malware attack- The malware attack makes one’s system vulnerable and the
malware attack includes virus attack and worm attack.
2. b. The IaaS infrastructure
The risks correlated with IaaS Cloud are-
Misconfigure issues- Webb must use the latest hardware and software and latest
operating system and latest application programs so that Webb's architecture can comply
with the Amazon AWS cloud framework.
Threat issues- The IaaS framework elements that are responsive to risks and threats
can be predicted by the Remediate, Prioritize and Scan method (Manvi, & Shyam, 2014).
Shadow-IT- This Shadow-IT is basically the assets which have not been used for long.
In the case of Webb due to the advent of Amazon AWS, Webb will use the cloud server
provided by the cloud vendor, so the database server which they are utilising now will not
be used anymore. This unused database is the asset which they will not go to use in mere
future.
7 STUDENT NAME: , STUDENT ID:

CLOUD COMPUTING STUDENT NAME: , STUDENT ID:
Fig 2: SQL Server risks and their detection
(Source: Gai, & Steenkamp, 2014, pp-28)
2. c. Communications between Webb’s and their IaaS database in the cloud
Amazon AWS is very popular among the masses and is known to cater best solutions
to the organisations and along with that the best security solutions (Gai, & Steenkamp,
2014). Webb, in order to comply with Amazon AWS cloud architecture, has to prepare
hardware, software and application programs so that it can comply with the cloud
framework of Amazon AWS. That is why they require just minimal changes in their
hardware, software configuration
8 STUDENT NAME: , STUDENT ID:
Fig 2: SQL Server risks and their detection
(Source: Gai, & Steenkamp, 2014, pp-28)
2. c. Communications between Webb’s and their IaaS database in the cloud
Amazon AWS is very popular among the masses and is known to cater best solutions
to the organisations and along with that the best security solutions (Gai, & Steenkamp,
2014). Webb, in order to comply with Amazon AWS cloud architecture, has to prepare
hardware, software and application programs so that it can comply with the cloud
framework of Amazon AWS. That is why they require just minimal changes in their
hardware, software configuration
8 STUDENT NAME: , STUDENT ID:
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

CLOUD COMPUTING STUDENT NAME: , STUDENT ID:
Question 3
3. Webb’s consideration for the use of the Cloud for backup and possibly also for archival
of records
3. a. Risks associated to
I. Backing up data to the Cloud
The threats and the security risks associated with backup of data are-
i. A high bandwidth is required to both upload and downloads data from the web server, to
keep a backup of their server's data they need a strong bandwidth and thus Webb will have
to spend a lot for the fast bandwidth.
ii. The sensitive personal data can be hacked or can be breached while the data is being
transacted (Manvi, & Shyam, 2014).
iii. The sudden breakdown of the server can also cost too much, there remains a high chance
for personal information loss also.
II. Storage of data in the Cloud
i. The chances are more for the data breach if gets transacted through the insecure network
which is not deciphered as well.
ii. The execution of the file must be done properly and also along with that file must be
processed and stored in the database well otherwise the sensitive information will get
breached and will get lost (Manvi, & Shyam, 2014).
III. Retrieval of data from the cloud
i. The high bandwidth is necessary to download files and to acquire files which are
absolutely necessary.
9 STUDENT NAME: , STUDENT ID:
Question 3
3. Webb’s consideration for the use of the Cloud for backup and possibly also for archival
of records
3. a. Risks associated to
I. Backing up data to the Cloud
The threats and the security risks associated with backup of data are-
i. A high bandwidth is required to both upload and downloads data from the web server, to
keep a backup of their server's data they need a strong bandwidth and thus Webb will have
to spend a lot for the fast bandwidth.
ii. The sensitive personal data can be hacked or can be breached while the data is being
transacted (Manvi, & Shyam, 2014).
iii. The sudden breakdown of the server can also cost too much, there remains a high chance
for personal information loss also.
II. Storage of data in the Cloud
i. The chances are more for the data breach if gets transacted through the insecure network
which is not deciphered as well.
ii. The execution of the file must be done properly and also along with that file must be
processed and stored in the database well otherwise the sensitive information will get
breached and will get lost (Manvi, & Shyam, 2014).
III. Retrieval of data from the cloud
i. The high bandwidth is necessary to download files and to acquire files which are
absolutely necessary.
9 STUDENT NAME: , STUDENT ID:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

CLOUD COMPUTING STUDENT NAME: , STUDENT ID:
ii. The information that has been downloaded from the web server may contain the
malware that is threatening and they must be checked and assured.
3. b. Webb’s use of a Cloud backup and its impact on the company and DR plan
The benefits that Webb is about to get-
i. The database of Webb can be improved to gain more throughputs and along with that
cost-effective service can be acquired from the cloud solutions.
ii. Amazon AWS caters the services to manage the database and also to update the
database; Webb Store does not have to consider the hardware and software maintenance
and the update (Sharma et al., 2017).
iii. Amazon is also famous to provide advanced cloud security solutions that are why Webb
can securely conduct their business activities peacefully.
They must have a disaster recovery plan ready for them, they must back up their
data in the external hard disk so that they can receive those files offline and do not require
an Internet connection. In that case, they do not have to worry about the security breaches
while they are conducting business activities offline.
10 STUDENT NAME: , STUDENT ID:
ii. The information that has been downloaded from the web server may contain the
malware that is threatening and they must be checked and assured.
3. b. Webb’s use of a Cloud backup and its impact on the company and DR plan
The benefits that Webb is about to get-
i. The database of Webb can be improved to gain more throughputs and along with that
cost-effective service can be acquired from the cloud solutions.
ii. Amazon AWS caters the services to manage the database and also to update the
database; Webb Store does not have to consider the hardware and software maintenance
and the update (Sharma et al., 2017).
iii. Amazon is also famous to provide advanced cloud security solutions that are why Webb
can securely conduct their business activities peacefully.
They must have a disaster recovery plan ready for them, they must back up their
data in the external hard disk so that they can receive those files offline and do not require
an Internet connection. In that case, they do not have to worry about the security breaches
while they are conducting business activities offline.
10 STUDENT NAME: , STUDENT ID:

CLOUD COMPUTING STUDENT NAME: , STUDENT ID:
Fig 3: Securing Cloud Data
(Source: Manvi, & Shyam, 2014, pp-424-440)
Question 4
4. Recommendations to Webb for protecting access to the following services that they
want to move to the Cloud
4.a. Their IaaS infrastructure
Webb Store if adopt the Amazon's AWS cloud services can get the best features can
conduct their business activities in the agile and effective way. They can conduct the
business activities in agile and efficient. Plus, they do not have to pay heavily for the
software, they do not have to pay for the hardware (Dillon & Vossen, 2015. The existing
hardware and software must be compliant with the Amazon AWS and they have to make
11 STUDENT NAME: , STUDENT ID:
Fig 3: Securing Cloud Data
(Source: Manvi, & Shyam, 2014, pp-424-440)
Question 4
4. Recommendations to Webb for protecting access to the following services that they
want to move to the Cloud
4.a. Their IaaS infrastructure
Webb Store if adopt the Amazon's AWS cloud services can get the best features can
conduct their business activities in the agile and effective way. They can conduct the
business activities in agile and efficient. Plus, they do not have to pay heavily for the
software, they do not have to pay for the hardware (Dillon & Vossen, 2015. The existing
hardware and software must be compliant with the Amazon AWS and they have to make
11 STUDENT NAME: , STUDENT ID:
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 15
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.