Manufacturing And Services Sectors Security Essay

Question:

Discuss about the Manufacturing and Services Sectors Security.

Answer:

Introduction

Cloud computing is one of the most used technologies at present days. Using the services with the explanations of predefined service is discussed in the report. However, an organization needs to reap completed advantages from cloud servers, as well as organizational changes. Moreover, the study deals with different types of cloud architecture and selection of architecture suitable for the organizations. Implementing of hybrid cloud approach is discussed in the report along with the steps for migrating to Amazon AWS service.

The Cloud computing really has several rages with respect to Infrastructure as a service or Platform as a service (Rittinghouse & Ransome, 2016). The actual architectures have the types of cloud coalesced into the basic two types such as dedicated server slices as well as fully abstracted computing resources. Hence, understanding about the process would help to make the proper selection for cloud deployment in SoftArc Engineering.

In this aspect, the earliest as well as largest cloud services that include Amazon as well as Rackspace; that are based on the dedicated server slices. In addition, the basic idea nned to give a server that has RAM or CPU, disk as well as network connection like collocated leased dedicated servers (Lian et al. 2014). It has been dominated by web hosting from 10 years ago. These types of clouds are sold as instances of menu of fixed-size since trying to pack the servers optimally. In addition, usually it does not including the solid performance provide guarantees as well as persistence that have no guarantees for having limited control of provider over the servers. In addition, the providers include ENKI and Terremark and iLand using the VMWare as technological basis. The architecture of hardware includes diskless servers’ along with centralized SAN or NAS. On the other hand, the providers need to sell the instance sizes, which are fully customizable and persistent instances. It offers guarantees of performance and controlling three bins of the resources in SoftArc Engineering.

Reasons for using the architecture

It is important to have proper reasons for using abstracted resource model I SoftArc Engineering. In order to provide overview of the advantages of cloud, it is difficult to have innovations, which is relentlessly pushing the particular boundaries of underlying technology as well as architecture (Gangwar, Date & Ramaswamy, 2015). The virtual machines are generally created with the size needed for diskless servers with storage centralized on SAN. On the other hand, there is fixed and variable size examples are relied on it. The process depends on the architecture and has higher value for having premium hardware as well as software licenses. Moreover, the service is guaranteed with instances and stating the information kept for centralized SAN (Hashem et al. 2015). The scales instances and resizing of the existing ones can be included in the cases and allows the instances to move new hardware in the case of failure.

There are several advantages along with limitation of adopted cloud architecture in SoftArc Engineering that can be explained as followed.

Cost: It is easier to get approval for operational expenditure than the capital expenditure that is related to the following points. There is no hardware and computing resources that is lingering on the specific balance sheet. In addition, no depreciation and need for the lengthy justification is required for the process. No monthly review of using the system and no requirements to the refractor of computing resources after completion of the project. In addition, cost of the cappuccino in a day and accessing own dedicated server is one of the major procedures involved with it (Oliveira, Thomas & Espadanal, 2014). Choice is an advantage that shows that there are no boundaries, and limited by the OPEX budget. Hence, it is important to select effective and suitable software service for the organization. The software service models are as followed.

  • Software as a service (SaaS)
  • Infrastructure as a service (IaaS)
  • Platform as a service (PaaS)
  • Business Process as a service (BPaaS)

In addition, Flexibility and elasticity for connecting more customers connecting to the web sites compared to the regular months is advantage for using the service. Speed is one of the key differentiators for SoftArc Engineering that is associated to relate to the market, like differentiators can correlate to the speed of making execution for providing the examples. The virtual resources can adapt easily to the objective of business requirements and rapid expansion of the bandwidth speed as required in SoftArc Engineering.

Risks in cloud hybrid strategy

Hybrid IT infrastructure is becoming as the biggest trends of present decade and the strategy can include deployments of the hybrid cloud. As per the RightScale 2015 and the State of the Cloud Report, there are 82 percent of the surveyed organizations were running with hybrid cloud strategy as well as Data Center Knowledge stated for adoption of the technologies expected to triple by 2018 (Chou, 2015). The advantages of embracing the hybrid cloud are quite clear. The companies capable to enhance the IT flexibility as well as select solutions fit for specific requirements. Maximizing cost efficiency along with the asset use need to be achieved according to FierceCIO contributor in SoftArc Engineering.

Loss of control: The job of CIO in SoftArc Engineering is managing risk within the organization. There are many views that has total control over the each part of technology strategy of SoftArc Engineering is essential. On the other hand, cloud-based tools are used to the software along with the application changes that occurs on side of the provider. The meaning of IT executive is involved in the process (Son et al. 2014). Hence, according to the contributor there is one of the most vital risks of hybrid cloud computing. It is included in the perceived loss of controlling on the part of the CIO as well as members of the executive board. The applications are changed all the time, and the applications are outside the control of the organization is unprepared when sudden software update.

Cloud security: The cloud as well as its apparent inherent to the risks as far as the security is concerned. In addition, the market for cloud security tools needs to keep going up by day. It is expected that organization can reach a total value of $8.71 billion by 2019.

There are several security challenges for the organizations need to deploy hybrid cloud strategies, according to SoftArc Engineering (Hashizume et al. 2013). It includes risk management and security management as well as poorly constructed of the service-level agreements.

Compliance: It is one of the issues that are aforementioned for making security challenge. The Businesses of SoftArc Engineering needs to ensure that all parts of cloud strategy are compliant with regulations of the industry.

Recommendations for Security steps and controls

It is important to provide recommendation for securing the control for the organization. Adopting the effective and suitable method and following the protocols would be helpful for the organization. Having specific versions of Windows XP that have a built-in remote administration package is called as Remote Desktop Connection. Hence, a free cross-platform alternative offers same type of functionality (Modi et al. 2013). In addition, maximization as well as increased of the market share and achieve the objective have various challenges for dynamic nature of organization. Adoption goes up to the companies that look into implementing the hybrid strategies within IT departments that has number of issues (Fernando, Loke, & Rahayu, 2013). These are arising to deal with new technologies, which has hybrid cloud brings

It is important to identify the requirements required for remote server administration, resource management as well as SLA management.

Internet connection: An Internet connection with TCP/IP or on the Local Area Network that can be remotely administered required for remote server administration (Garrison, Wakefield & Kim, 2015). Moreover, for the non-malicious administration and user need to install server software on the host system in SoftArc Engineering in order to be viewed by the users.

Connecting: Connecting with the host computer in a window that showing the Desktop of the host appearing needs to have proper control. The client may control the host as the major requirements for the process.

Cloud environment: The SaaS provider uses the shared infrastructure as well as several types of the organization involve with the process. A possibility of loss of the existing customers as well as potential for new customers is required for the process.

Steps to moving AWS cloud service

In order to migrate to SQL database of SoftArc Engineering to Amazon RDS utilizing SQL Azure Migration Wizard, it is important to follow some steps.

Step 1: Downloading the SQLAzureMW Tool: It is required to extract the SQLAzureMW.exe file for the service. Using SQL Server Management Studio to connect local SQL server as well as Amazon Web Service RDS instance would be helpful to complete the process.

Step 2: Beginning with the Migration: It is required to double click on the SQLAzureMW.exe file (Ga & Steenkamp, 2014). The page appearing on the screen as well as requirements to select the Database as an option under analysis is second step.

Step 3: Sourcing the Database Tasks: Entering the Source of details of SQL Server Database connection as well as click on the Connect button is the next step.

Step 4: Creating Scripts: Creating the scripts for selected SQL server objects are required for the process.

Step 5: Destination Database Process: It is required to create a script of the database. Entering into the RDS SQL Server connection credentials as well as connection is the next step.

Step 6: Selection of the Target Database: Selecting the target database that likes to migrate. Creating of database earlier and after that creation of new Database option is involved with the process.

Step 7: The Grand Finale: Verification of SQL Server Management Studio as well as checking of all migrated date is the final step.

Conclusion

From the above discussion it can be concluded that the theoretical basis for cloud is found as bins of the resources that comprise compute, storage as well as networking and flexibility in order to allocate amount from each of the bins for creating custom computing environment. The providers implementing the type of cloud "abstract" for resources are generated from underlying hardware. It provides the user according to their needs. It is more technically challenging for the users in SoftArc Engineering that offers better performance as well as flexibility that would be helpful for the organization.

References

Chou, D. C. (2015). Cloud computing: A value creation model. Computer Standards & Interfaces, 38, 72-77.

Fernando, N., Loke, S. W., & Rahayu, W. (2013). Mobile cloud computing: A survey. Future generation computer systems, 29(1), 84-106.

Gai, K., & Steenkamp, A. (2014). A feasibility study of Platform-as-a-Service using cloud computing for a global service organization. Journal of Information System Applied Research, 7, 28-42.

Gangwar, H., Date, H., & Ramaswamy, R. (2015). Understanding determinants of cloud computing adoption using an integrated TAM-TOE model. Journal of Enterprise Information Management, 28(1), 107-130.

Garrison, G., Wakefield, R. L., & Kim, S. (2015). The effects of IT capabilities and delivery model on cloud computing success and firm performance for cloud supported processes and operations. International Journal of Information Management, 35(4), 377-393.

Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. (2015). The rise of “big data” on cloud computing: Review and open research issues. Information Systems, 47, 98-115.

Hashizume, K., Rosado, D. G., Fern?ndez-Medina, E., & Fernandez, E. B. (2013). An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 4(1), 5.

Lian, J. W., Yen, D. C., & Wang, Y. T. (2014). An exploratory study to understand the critical factors affecting the decision to adopt cloud computing in Taiwan hospital. International Journal of Information Management, 34(1), 28-36.

Modi, C., Patel, D., Borisaniya, B., Patel, A., & Rajarajan, M. (2013). A survey on security issues and solutions at different layers of Cloud computing. The Journal of Supercomputing, 63(2), 561-592.

Oliveira, T., Thomas, M., & Espadanal, M. (2014). Assessing the determinants of cloud computing adoption: An analysis of the manufacturing and services sectors. Information & Management, 51(5), 497-510.

Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud computing: implementation, management, and security. CRC press.

Son, I., Lee, D., Lee, J. N., & Chang, Y. B. (2014). Market perception on cloud computing initiatives in organizations: An extended resource-based view. Information & Management, 51(6), 653-669.

How to cite this essay: