The case study presents that Webb’s Stores is a successful retailer. The two main warehouses for the company are Melbourne and Sydney. The report suggests that there are two key issues or business challenges for the organization. The first issue is the operational complexity and the second issue is the management of data. Therefore, it is important that the suggested issue of cloud computing should solve these two business challenges for the company. The management of the company should understand that any migration is a difficult task that must be handled strategically. However, there would be long term benefits of migration. The case study suggests that the organization should focus on hybrid cloud. It means that part of the infrastructure would be on cloud and the part of the infrastructure would be on premise. The high level logical diagram of hybrid cloud can be shown as:
This report is divided into various sections. The various sections of this report can be discussed as:
One of the critical step for Webb’s would be migration of MS SQL Server 2012 R2 database to IaaS instance in the cloud. This migration would be a three-step process. These three steps can be discussed as:
Step 1: Data Extraction – Extraction of data from the current SQL database. This step is the easiest of all the three steps. However, the migration activity should ensure that all the data is extracted and any data is not missed (Ghosh & Ghosh, 2015).
Step 2: Data Massaging – This step includes the formatting of the data as per the target database (Varia, 2010). In this case, the target database could be Amazon Web Services or Microsoft Azure.
Step 3: Deployment – Once the data format is set, the next step is the deployment in the new of targeted server. It is suggested that the deployment should first happen in development environment and they it should be moved to production environment. The diagrammatic representation of IaaS can be shown as:
There are various security controls that should be implemented as a part of IaaS infrastructure. There are various global security control standards that should be followed by and Cloud Service provider. Some of the measures and suggestions can be discussed as:
There are various advantages and disadvantages or limitations of above security controls. It is important that the management of Webb’s should analyse all the benefits and challenges. The key advantages and disadvantages can be discussed as:
The tight security of the system is the biggest benefit. With this system in place it is not possible for intruders or hackers to hack into the system (Dlodlo, 2011). With this system in place users cannot access the information because the data is encrypted. It would ensure that that confidential data and information of the organization is not leaked.
One of the biggest challenge or disadvantage is that the establishment of this system is a costly affair. Webb’s may have to invest a lot to develop this kind of system. Moreover, the company would need to give two-way authenticator token to all the employees. In certain cases, the efficiency of system can also suffer as there are multiple layers in between (Ramachandran & Chang, 2016).
The database migration is a difficult task and there are various risks involved across the process of data migration. There are risks associated at different levels. For example, some of the risks exist at the migration level and some risks exist at infrastructure level. Some of the risks can be discussed as:
At the migration level, there are two key risks that exists. These two risks can be discussed as:
At IaaS infrastructure level, there are three key risks that must be addresses. These risks can be discussed as:
The third aspect of the risk is the risk that exist between the communication channel. There are two major risks that can occur in the communication channel. These risks can be discussed as:
It would be correct to say that data backing should be a strategic pillar of IT strategy of Webb’s. It is recommended that the organizations should also have a back-up copy maintained that they can access in case of any failure. The certain part of this section can be discussed as:
Cloud backup, also known as online backup, is a strategy for backing up data that involves sending a copy of the data over a proprietary or public network to an off-site server It is highly recommended that Webb’s should back up the data on cloud. Both Microsoft Azure and AWS offers good data back features. A good CSP is one that can provide the provision of real time data backup (Claycomb & Nicoll, 2012). It is important to mention that backing the data in the cloud is different than the storing the data in the cloud. The real-time data backing means that the stored data is getting backed up on real time. Today, most of the CSPs provide this facility where the backup copy is created on real time.
With the use of CPS, storage of data on cloud comes naturally. However, there are few risks associated with storage of data in the cloud that should be addresses. These issues can be discussed as:
The retrieval of data form cloud may not be a difficult task. However, there exists a dependency on the cloud service provider. Clouds systems must ensure that the retrieval requests are coming from the authentic sources and users are authorized for that information (Kandukuri, & Rakshit, 2009). It is suggested that the employees of Webb’s should be trained on the method to retrieve the data for the cloud.
In case of any loss of data, recovery is the key. Therefore, it is important that the organization must have good recovery plan in place (Ristov, Gisev, & Kostoska, 2012). Webb’s store must have a contingency plan in place that would also cover the data recovery plan. It has to conduct pilot methods for replicating the backups and also regular conduct drills so as to check if the RTO (Recovery time objective) promised by the cloud vendor is feasible or not. There should also be proper escalation and penalty mechanism (Alhazmi, & Malaiya, 2013) in place in case something goes wrong.
This section would discuss the way Webb’s store protect access to the services that they are now moving to the Cloud. The key themes under this section can be discussed as:
It is important that Webb’s should have a full control over their IaaS infrastructure (Dahbur, Mohammad, & Tarakji, 2011). The organization can protect the infrastructure using device, location and user: This means that person can access the data as long as he is in one country but not able to access data if he is in another country. Also, devices that belongs to organization should be able to access documents and download however this is not possible thought the devices belonging to the organization or there are different privileges like downloading of data is not allowed from outside systems due to insider threat
It is suggested that the SQL cloud instance should be encrypted in nature. The use of encryption would ensure that the access is limited to authorized user only. The two way authentication process and user profiling of users across different levels would ensure that encrypted cloud instance is strong in nature.
It is recommended that Webb’s They must use virtual machine and DLP programs which means even if data is loss, it can’t be comprehended or readable making it useless. Cloud service providers must keep their security systems up to date with latest tools and techniques and must monitor the malicious attacks on a constant basis (Dahbur, et al., 2011).
As discussed above, backup is the key across any cloud set up. The real time back up strategy should be used to back up the data (Jarvelainen, 2012). Another thing it must have service level agreements beyond which CSPs will be liable for penalty.
Conclusion
The above paper discusses the case study of Webb’s store. With the above discussion, it can be said that organization and decision holder should have a strong involvement in the implementation of cloud. The above paper discusses various risks and mitigation strategies that should be used. The risks are mainly technical in nature that could be overcome. The key thing for Webb’s is to have a strong data back-up strategy in place.
References
Alhazmi, O. H., & Malaiya, Y. K. (2013, January). Evaluating disaster recovery plans using the cloud. In Reliability and Maintainability Symposium (RAMS), 2013 Proceedings-Annual (pp. 1-6). IEEE.
Claycomb, W. R., & Nicoll, A. (2012, July). Insider threats to cloud computing: Directions for new research challenges. In Computer Software and Applications Conference (COMPSAC), 2012 IEEE 36th Annual (pp. 387-394). IEEE.
Dahbur, K., Mohammad, B., & Tarakji, A. B. (2011, April). A survey of risks, threats and vulnerabilities in cloud computing. In Proceedings of the 2011 International conference on intelligent semantic Web-services and applications (p. 12). ACM.
Dlodlo, N. (2011, April). Legal, privacy, security, access and regulatory issues in cloud computing. In Proceedings of the European Conference on Information Management & Evaluation (pp. 161-168).
Ghosh, N., Ghosh, S. K., & Das, S. K. (2015). SelCSP: A framework to facilitate selection of cloud service providers. IEEE transactions on cloud computing, 3(1), 66-79.
Järveläinen, J. (2012). Information security and business continuity management in interorganizational IT relationships. Information Management & Computer Security, 20(5), 332-349.
Kandukuri, B. R., & Rakshit, A. (2009, September). Cloud security issues. In Services Computing, 2009. SCC’09. IEEE International Conference on (pp. 517-520). IEEE.
Rahumed, A., Chen, H. C., Tang, Y., Lee, P. P., & Lui, J. C. (2011, September). A secure cloud backup system with assured deletion and version control. In Parallel Processing Workshops (ICPPW), 2011 40th International Conference on (pp. 160-167). IEEE.
Ramachandran, M., & Chang, V. (2016). Towards performance evaluation of cloud service providers for cloud data security. International Journal of Information Management, 36(4), 618-625.
Ristov, S., Gusev, M., & Kostoska, M. (2012). Cloud computing security in business information systems. arXiv preprint arXiv:1204.1140.
Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of network and computer applications, 34(1), 1-11.
Tang, Y., Lee, P. P., Lui, J. C., & Perlman, R. (2012). Secure overlay cloud storage with access control and assured deletion. IEEE Transactions on dependable and secure computing, 9(6), 903-916.
Varia, J. (2010). Migrating your existing applications to the aws cloud. A Phase-driven Approach to Cloud Migration.
Wang, F. K., & He, W. (2014). Service strategies of small cloud service providers: A case study of a small cloud service provider and its clients in Taiwan. International Journal of Information Management, 34(3), 406-415.
We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.
Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.
Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.
Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.
Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.
Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.
We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.
Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.
You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.
Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.
Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.
You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.
You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.
Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.
We create perfect papers according to the guidelines.
We seamlessly edit out errors from your papers.
We thoroughly read your final draft to identify errors.
Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!
Dedication. Quality. Commitment. Punctuality
Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.
We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.
We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.
We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.
We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.