Wednesday, December 4, 2019
Migrating Business Critical Applications â⬠Free Samples to Students
Question: Discuss about the Migrating Business Critical Applications. Answer: Introduction As said by the Zhang, Cheng, Boutaba, (2010), Technology is improving being used by the several organizations across the business to improve and enable their organization performance. Krutz, Vines, (2010) suggested that One of the most effective technological innovations that have revolutionized the way business and people work in todays world in cloud computing. Implementation of the cloud computing technologies within the organization can facilities collaborative platforms from learning and research, improved services and flexibility capabilities, high efficiencies, better compliance and security and access to leading technology. As per the evaluation and findings, it is seen that the organization Commonwealth bank is presently suffered from the issues associated with the data handling and security. The observation also shows that organization functions its operations in all overall the world and most of the users are presently accessing the services through mobile devices; there fore, data theft related problems also considered the main problems for the organization. Thereby, the present report is mainly focused upon the effectiveness of the mitigation of the application and data sources into external computing in organization. Moreover the report also empathized on the security policies that could computing technology; uses to secure data or information. Apart from that the findings provides the effective conclusion and recommendation to solve the existence problems. With context to financial services Stakeholders of the organization are mainly investors in business whose actions are determined the result of the organization decisions. The stakeholders of the organizations are governments, customers, employers, investors etc. The main roles and responsibilities of the stakeholders is to make decision regarding the investment and providing the detailed requirements about the financial plan; that helps the organization to sustain in market and achieve set of objective in successful manner (Krutz, Vines, 2010).. Apart from that stakeholder of the organization also committing the necessary resources and determining the issues and risks associated with the organization. As per the findings and evaluation of the organization present scenario it is seen that the organization is not be able to provide effective security to data that hampered the organization performance in upcoming years. Interface between business stakeholders and technologist is done with the help of communication mode such as face to face communication, meeting, telephonic communication, etc. Before the implementation of the technologies within the organization main roles and reponsiblteis of the technologist to provide the all information to stakeholders regarding the project and how it assist the organization to perform effectively. Therefore the interface between the organization stakeholders and technologist is illustrated using stakeholder communication chart that is shown in below table; Stakeholders Impact stake the project what needs to be communicated risks CEO high Procedures and polices owners who find out institutional administrator procedures and policies Benefits of the implementation of the cloud computing technology and costs associated with the project (Takabi, Joshi, Ahn, 2010). Lack of clarity regarding preferred procedures. Financial management high Manage the organization financial system cost associated with the project and all of the devices, benefits in terms of finance associated with the costs Lack of budget planning Admin staffs Operate the organization new system moderate It helps the organization in order to contributes to process design as well as system and testing Worried about the workload increases and what training they will receive. Technical team They mainly helps to develop the system high how the system is developed and how testing is performed lack of knwonelge regarding the project As per the above communication chart it is seen that cost and benefits related to the project is most vital. Moreover, use of the cloud computing technology organization offers its services from anywhere and anytime. Cloud computing technology provides the office anywhere on demand delivery environment that changes the way infrastrure, desktop, LOB and storage applications are delivered to the clients (So, 2011; Chen et al., 2010; Chen, Zhao, 2012). Apart from that use of the cloud computing technology within the organization uses can simply access their data and information from anywhere via internet. The technology offers the cloud storage backup, which means the organization can stored its information in cloud and access them from anywhere at any time. As said by the Catteddu, (2010), Cloud storage and backup also provides simplicity, costs effective, removal of burden in house management and maintenance. The technology is deliver the data storage as services from the cloud provi der with the help of internet as well as billing computed on capability used in certain features. There are several benefits associated with the cloud computing technologies; Therefore, from the analysis and findings it is said that the stakeholders make an effective decision regarding the improvement of the services and incorporation of the cloud computing technology. Apart from that to implement the cloud computing technologies at workplace organization need to implements cloud computing regulatory stock take that provide an overviews of the country existing rules and regulations that implements to cloud services in Australia. The regulations cover the range of the contractual agreements, consumers protection, data protection and primary act. Security postures Security is the most vital elements for the organization and helps them to protect consumers data and information in successful manner. As said by the Catteddu, (2010), in present era most of the organization uses the past data and information to make decision in critical situations. As per the company scenario it is seen that access of the information of the organization done by the users suffering problems from accessing their own information from the organization. Moreover the observation also observed that network security also concerned one of the vital issues of the organization because the organization offers its services and products to users in both national and international market. Apart from that it is seen that the organization is suffered from the data storage issues that means to store huge amount of the data the organization needs to require extra hardware system that create high budget problems in front of the organization. Data breaches is one of the main component and organization security professionals believed that their organizations security measurements to safe data on physical devices i.e. server are low. Evaluating the scenario it is concluded that data breaching issues was more likely to occur for bank that uses the server. Hijacking of account also considered the main security issues of the organization and it is done mainly by attackers (So, 2011). Hackers or attackers continuously monitor the organizations network scenario and use of the malware code they can easily access the organization information and application software. After accessing the organization application software they modify and access the users personal information for his purpose. If the organization suffered from the security issues problems that they lose market confidence and customers satisfaction. Moreover, the analysis shows that if an organization not implements better security policies within the organization then they can hamper their organization performance and lose customers trust. Migrating organization critical application and their associated data source to an eternal cloud computing helps the organization to achieve high security, collaboration and mobility. As said by the Takabi, Joshi, Ahn, (2010), cloud computing technogly offers the organization to provide high level of the security protocol and to make sure data protection. The cloud computing technology implements high security protocols including strong access controls, data encryption technique, security intelligence. Apart from that cloud computing offers the virtualization security to the organization that means it provides the virtual server and application and it is not easy from the attackers or hackers to determine the exact location where data is stored. Apart from that the main security of the cloud computing technology is to enhance security software maintenance and mechanism. According to the Krutz, Vines, (2010), Cloud computing technology has an effectively ability to develop more soph isticated security procedures that helps the organization to secure users personal information and data. Costs associated with the cloud computing technogly are very less as compared to the physical data storage. Moreover, cloud computing technology provide application programming interface that provides organization the opportunities to customize their cloud expense better manner. Implementation of the cloud computing technology at workplace helps the organization to recover data, long term viability, investigated support, lower maintenance costs, redundancy and resilience. As per the evaluation and findings it is seen that the organization must have to implement migrate its application and data store in cloud computing technology because it not only helps them to secure its data but also achieve high users experience. In organization perspective, if they incorporate this technology at workplace then they reduces its extra hardware costs, maintenance problems and data security related problems. Apart from that accessing of the information is also done in easy manner as it provides huge amount of storage capability. Vulnerabilities, threats and consequences Risk assessment plan based on the vulnerabilities, threats and consequence Risk no Vulnerabilities threats consequences Risks summery Recommendation R001 Wet pipe sprinklers System in organization data base or data center Fire All the stored data in the database may be destroyed Fire should be activated causing water damage To check the fire system in regal basis R002 Organization users indentifies identification number no longer removed from the data center Users uses data in own purpose Integrity as well as confidentiality of organization data not authorized uses of not needed user identification could compromise integrity and confidentiality of organization data (Feng et al., 2011) in order to solve this problem in most effective and successful manner organization needs to update its data base in regular basis. On the other hand organization needs to change users password in every days. R003 Organization not updated its firewall system unauthorized users access the data and information Confidentiality and integrity of the data is hampered If the organization not implemented its firewall system in regular manner then attackers easily access the information In order to solve this problems in most effective and successful manner organization needs to implement dual firewall system in the database R004 Organization TCP packets directed at the port 1521 will hamper to stop responding Computer crime using malicious code Data integrity and confidentiality is hampered (Popovi?, Hocenski, 2010) Attackers attacks the computer network using denial of service attacks with the help of sending large amount of the package using port no 1521 could slow down the database In order to solve these problems, organization needs to impalements new updated antivirus system at workplace. R005 Password and user name are in initialization file and scripts Computer crime using malicious code Data integrity and confidentiality is hampered Password exploitation in initialization file and script could result in compromise of integrity and confidentiality of the organization data Update install antivirus system in regular manner R005 sensitive organization data is stored on USB drive Computer crime using malicious code Data integrity and confidentiality is hampered Loss of the data or information theft from USB drives could outcomes in compromise of data confidentiality Organization needs to implement high security password system in database and disable USB seating. Existing industry risk recommendations for the project As per the above risk assessment framework it is seen that risks R001 i.e. Wet pipe sprinklers System in organization data base or data center and risk R005 i.e. sensitive organization data is stored on USB drive might be occurred in the Australian multinational bank. Therefore in order to solve these problems in more effective and successful manner it is recommended that organization needs to update and monitor its security system in regular manner. From the findings it is also recommended that organization needs to implement up to date antivirus system at workplace that would helps them from the attackers attack. Data security The data flows associated with the project Identified rinks, Assess risks policies and risks mitigates Flow of the data from one end to other is shown in above diagram. With the help of cloud computing technology organization effectively send data from one end to others ends. Risks assessment and mitigation is explained in below table; Risks identification risk assessment Risk mitigation Data breach Data breach can be outcomes to loss the information and data of the organization. Implementation of the two factor authentication techniques and critical protection such as prohibiting the sharing account information (Krutz, Vines, 2010). Service or account traffic hijacking Use of this techniques in cloud computing it is too easy for attackers to hack the data and information of users accounts Implement a single sign on, end to end encryption techniques denial of service attacks accessing users information Upgrade system and in house applications Insecure APIs Manipulation of the users information and accounts done easy manner Implement SSL and TLS communication protocols Abuse of cloud services Access organization and users information easy manner (Krutz, Vines, 2010). Scope immediate services and implement dual firewall techniques Conclusion As per the above findings and analysis, it is seen that flexible costs, always on availability, high security, improved performance, improve coloration are the main features associated with the cloud computing that helps the organization to solve its existence issues in better manner (Takabi, Joshi, Ahn, 2010).. The findings shows that cloud computing have an ability to secure computer network and provide data to uses in easy manner at anytime and anywhere. Therefore, use of this techniques at workplace organization not only achieve better customers satisfaction but also reduces the complexity of the existence configuration. Moreover, from the observation it is seen that cloud computing is cost effective; therefore if an organization implement this techniques than they do not spend much amount in maintenance problems. Therefore from the findings and observation it is said that migrating business critical application and their associated data source to an external cloud hosting solut ion is the best approach for the organization. References Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., ... Zaharia, M. (2010). A view of cloud computing.Communications of the ACM, 53(4), 50-58. Carlin, S., Curran, K. (2011). Cloud computing security. Carroll, M., Van Der Merwe, A., Kotze, P. (2011, August). Secure cloud computing: Benefits, risks and controls. InInformation Security South Africa (ISSA), 2011 (pp. 1-9). IEEE. Catteddu, D. (2010). Cloud Computing: benefits, risks and recommendations for information security. In Web application security (pp. 17-17). Springer, Berlin, Heidelberg. Chen, D., Zhao, H. (2012, March). Data security and privacy protection issues in cloud computing. In Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on (Vol. 1, pp. 647-651). IEEE. Chen, Y., Paxson, V., Katz, R. H. (2010). Whats new about cloud computing security. University of California, Berkeley Report No. UCB/EECS-2010-5 January, 20(2010), 2010-5. Feng, D. G., Zhang, M., Zhang, Y., Xu, Z. (2011). Study on cloud computing security. Journal of software, 22(1), 71-83. Krutz, R. L., Vines, R. D. (2010). Cloud security: A comprehensive guide to secure cloud computing. Wiley Publishing. Krutz, R. L., Vines, R. D. (2010). Cloud security: A comprehensive guide to secure cloud computing. Wiley Publishing. Krutz, R. L., Vines, R. D. (2010). Cloud security: A comprehensive guide to secure cloud computing. Wiley Publishing. Li, H., Dai, Y., Tian, L., Yang, H. (2009). Identity-based authentication for cloud computing. Cloud computing, 157-166. Popovi?, K., Hocenski, Ã
½. (2010, May). Cloud computing security issues and challenges. In MIPRO, 2010 proceedings of the 33rd international convention (pp. 344-349). IEEE. Qian, L., Luo, Z., Du, Y., Guo, L. (2009). Cloud computing: An overview. Cloud computing, 626-631. So, K. (2011). Cloud computing security issues and challenges.International Journal of Computer Networks, 3(5), 247-55. So, K. (2011). Cloud computing security issues and challenges.International Journal of Computer Networks, 3(5), 247-55. Takabi, H., Joshi, J. B., Ahn, G. J. (2010). Security and privacy challenges in cloud computing environments. IEEE Security Privacy, 8(6), 24-31. Takabi, H., Joshi, J. B., Ahn, G. J. (2010). Security and privacy challenges in cloud computing environments. IEEE Security Privacy, 8(6), 24-31. Zhang, Q., Cheng, L., Boutaba, R. (2010). Cloud computing: state-of-the-art and research challenges. Journal of internet services and applications, 1(1), 7-18. commbank. (2017). commbank.. [online] Available at: https://www.commbank.com.au/ [Accessed 26 Sep. 2017].
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.