The final paper is a compilation of your research from weeks 2, 4, and 6. Ensure that you have made any necessary changes, based on comments you received from your instructor. Combine these three pap

Week_2

For this project, select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage. Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges. Once you have chosen an organization, this will be the organization you use throughout the remainder of the course. This paper should be written in third-person. The third-person point of view belongs to the person (or people) being talked about. The third-person pronouns include he, him, his, himself, she, her, hers, herself, it, its, itself, they, them, their, theirs, and themselves (Not I, we, us, our).

 

Write a one-page organizational overview using APA (7th Edition) formatting.  The Title and Reference pages do not count towards the page count requirements. The organizational overview should include:

  • A brief history

  • Mission (If you quote the mission directly, be sure to follow APA for direct quotes)

  • Goals

  • Achievements

 

The paper must adhere to APA guidelines including Title and Reference pages (no abstract).  There should be at least one scholarly source listed on the reference page.  Each reference cited in the text must appear in the reference list, and each entry in the reference list must be cited in text. APA requirements for this class include:

  • 12-point Time New Roman font

  • Your paper should be typed and double-spaced with 1" margins on all sides

  • The first sentence of each paragraph should be indented one tab space

  • All papers should contain the page number, flush right, in the header of every page. Use the automatic page-numbering function of your word-processing program to insert page numbers in the top right corner; do not type page numbers manually.


Today every organization wants to use cloud technology in their business processes in order to expand its business across the world. Small organizations cannot afford it because it needs investment to purchase infrastructures and equipment. The cloud technology with less investment allows small companies to achieve their goals. It is like an umbrella for the small organizations that have the capacity to grow but does not have a budget.

Moreover, the biggest threat to confidential data is the cyber attacks that also concern the organizations. The cloud technology helps the organizations to solve these problems by protecting the confidential data from cybercriminals. Many organizations are working remotely to retain their employees that make the employees work from anywhere.

Work from anywhere means they need to have access to the confidential data from their location and this give a chance to an attacker if care not taken while transactions. The confidential data transfer, communication means data must be protected to reduce the attacks. The maintenance cost of infrastructures and to run the business effectively by meeting the changed needs of the market and customers.

Importance of Cloud Computing

Many organizations face difficulties to invest in the infrastructure of the organization. Then another problem is the maintenance of the infrastructures. These are expenditures makes the organizations be in the same position as they were in the past. The organizations cannot go with the market changes.

But today with the help of cloud technology organizations can achieve this by reducing the cost of maintenance and purchase as the cloud provides infrastructure as a service, platform as a service, and many other services that can be used by the organizations in their business operations. The management no need to update manually rather the cloud will automatically update the applications they use.

The cloud technology uses the internet for providing services to organizations. Some of its services are storage, server, networking, prediction, software, hardware and so on. There are cloud providers present who will provide all these services with less investment. Some of the service providers are Google, Amazon and many more. The cloud providers charge only when the customer or the organization uses the cloud for the day. This feature helps small organizations to use cloud technology.

With these cloud features, employees can work remotely and many organizations have started virtual projects where different organizations make a group to complete a particular project by communicating for a period of time. This helps the organizations to explore new opportunities and expand their business operations worldwide. It enables the users to create applications and websites by accessing the resources on the cloud to increase the performance of the applications, to backup and restore the data that is it can be used as a recovery plan that helps during the disaster situations, it also helps to test the applications and to analyze the data.




Reference

What is cloud computing? A beginner's guide | Microsoft Azure. (n.d.). Retrieved from https://azure.microsoft.com/en-in/overview/what-is-cloud-computing/

What is cloud computing? - Definition from WhatIs.com. (n.d.). Retrieved from https://searchcloudcomputing.techtarget.com/definition/cloud-computing

Week-4

Most users today manage their content on a variety of devices. Dropbox is a cloud-based storage facility for photos, documents, and other digital content. Dropbox provides a convenient folder, as shown in Figure 6-7 of you Jamsa (2013) textbook. In one page, discuss the benefits of having web-based access to a cloud storage area.

 

The paper must adhere to APA guidelines including Title and Reference pages.  There should be at least one source listed on the reference page.  Each reference cited in the text must appear in the reference list, and each entry in the reference list must be cited in text. APA requirements for this class include:

  • A title page

  • 12-point Time New Roman font

  • Your paper should be typed and double-spaced with 1" margins on all sides

  • The first sentence of each paragraph should be indented one tab space

  • All papers should contain the page number, flush right, in the header of every page. Use the automatic page-numbering function of your word-processing program to insert page numbers in the top right corner; do not type page numbers manually.

  • APA 7th edition in-text citations

  • Reference page

The Title and Reference pages do not count towards the page count requirement. This paper should be written in third-person. The third-person point of view belongs to the person (or people) being talked about. The third-person pronouns include he, him, his, himself, she, her, hers, herself, it, its, itself, they, them, their, theirs, and themselves (Not I, we, us, our).

Cloud computing is an online service for storing data other than locally storing them on devices like hard drives. It has become popular since website browsers have become increasingly dependable because network coverage is broadly available. For as long as there is a web connection in a particular range, cloud storage has been increasingly used using native web applications on desktops, tablets, or smartphones (Sether, 2016). The following are benefits of using cloud computing as a storage solution.

  1. Cost-saving in data classes – numerous vendors in cloud storage services will provide various data tiers. Users are requested to select the service based on how one can frequently and easily access the data during restoring, Also they should consider how long they need to store the information

  2. Data replication and redundancy – cloud storage vendors normally keep the clients’ data in multiple copies even at a single data center and this makes the data to be objected to great durability in case of any loss occurrences.

  3. Malware and ransomware protection – most of the vendors assist in protecting against ransomware by providing back services up security merits since it’s very hard to have permission without clear authentication.

  4. Regulatory compliance – one of the best regulatory compliance is maintaining the data backups in the same or similar regions as where the information is sourced. Vendors will provide options for data centers around the world. Also moving information to cloud storage in the same region is regarded as best for performance, thus this is also an added benefit (Walters, 2016).

  5. Cost-saving – cloud storage is responsible for saving costs to customers. They purchase bulk storage which they pass it to the customers. Also, it reduces costs for management by reduction of software and on-premise hardware management, reducing the need for planning extensive capacity and monitoring simplification.

References

Chang, V., Walters, R. J., & Wills, G. B. (2016). Cloud computing and frameworks for organizational cloud adoption. In Web-Based Services: Concepts, Methodologies, Tools, and Applications (pp. 683-707). IGI Global.

Chatzithanasis, G., & Michalakelis, C. (2018). The Benefits of Cloud Computing: Evidence from Greece. International Journal of Technology Diffusion (IJTD), 9(2), 61-73.

Sether, A. (2016). Cloud computing benefits. Available at SSRN 2781593.

Week-6

Write a 1 - 2 page description of the types of threats that could be launched, or have been launched, against your organization. Describe what measures you would recommend for cloud security and disaster recovery.

 

Use APA (7th Edition) format.  In addition, include a Cover Page and a Reference Page.  Please use a minimum of three References.

Types of threats

Different attackers attack an organization’s system for the reason that is meant to accomplish their target goals. The company faced two types of threats launched by what was discovered later as an external attack. The two classes were Spyware and Ransomware attacks, which coincided. They both affected the company for three days, which meant that vital operations had to be stored.

A Spyware attack involves software that is stored in the computer system without the knowledge of the user so that to track their browsing activities. The attacker does this to monitor and harvest important account information such as logins or financial data. This attack targeted accessing the login passwords of vital departments within the organization.

After the attacker had accessed the login details, they then launched a Ransomware attack. They threatened to lick out all vital data if the organization failed to comply with their demands on managing the situation. All that is remembered was that losses were incurred for the three days that the system had failed.

Measures for cloud security

They are Determining what type of data has been stored in the cloud to develop different security levels of protecting the data. Firewalls and other vital strategies should be used in ensuring that the most critical data is kept safe within the institution so that to prevent it from getting to the wrong people. (Kumar & Goyal, 2019)

The next step is to ensure a backup of the vital data if it has been tampered with or lost. This ensures that in case one destroys the information that has been stored in the cloud, the organization can easily retrieve the data that has been backed up. This will ensure that the operations of the organization have not been affected by the unexpected event.

The employees within the organization comply with all measures of safety while accessing the data that has been stored in the cloud. This includes limiting the number of devices that are inserted in the computer systems. Through this, the organizations determine attacks that might happen due to simple mistakes that might be committed by the employees.

Measures for disaster recovery

The first measure is creating a disaster recovery team and allocating all the members with responsibilities that they will take during disaster recovery. This way, they will save more time to reduce the amount of damage that might occur. (Sadaqa, 2019). It is also essential to identify disaster risks that might affect the systems once the systems are under attack to determine the best strategies for solving them.

It is also essential to determine the most critical documents and data that should be restored first during the recovery phase. It is also necessary to specify backup storages that should be used while recovered from the disaster.









Reference:

Tamimi, A. A., Dawood, R., & Sadaqa, L. (2019, April). Disaster Recovery Techniques in Cloud Computing. In 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT) (pp. 845-850). IEEE.

Kumar, R., & Goyal, R. (2019). On cloud security requirements, threats, vulnerabilities and countermeasures: A survey. Computer Science Review33, 1-48.