Sie sind auf Seite 1von 6

FACULTY OF INFORMATION TECHNOLOGY & MULTIMEDIA COMMUNICATION

OCTOBER/2015

CDCT2203

INFORMATION TECHNOLOGY AND ENVIRONMENT

MATRICULATION NO : 960607045271001
IDENTITY CARD NO. : 960607-04-5271
TELEPHONE NO. : 016-6998817
E-MAIL : ryan_960607@hotmail.com
LEARNING CENTRE : Melaka
Cloud services is a very great way to help businessman to save time and place to reduce the
usage of flash drive that can be some time forgettable during went for meeting or group
discussion. As cloud service can not only save time and place but it could also help to
enhance the knowledge of non-techie crowd. Cloud services still seem to be mysterious and
confusing the non-techie crowd. So here are the five main essential characteristics of cloud
computing.

First, on demand capabilities make a business secure cloud-hosting services through a cloud
host provider which could be our usual software vendor. We will have access to our services
and have the power to change cloud services through an online control panel or directly with
the provider. We can add or delete users and change storage networks and software as
needed. Typically, We are billed with a monthly subscription or a pay for what you use
scenario. Terms of subscriptions and payments will various with each software provider.

Next, Broad network access will make our team access business management solutions using
their smartphones, tablets, laptops, and office computers. They can use these devices
wherever they are located with a simple online access point. This mobility is particularly
attractive for businesses so that during business hours or on off-times, employees can stay on
top of projects, contracts, and customers whether they are on the road or in the office. Broad
network access includes private clouds that operate within a company’s firewall, public
clouds, or a hybrid deployment.

Besides, resource pooling is very important because as the cloud enables our employees to
enter and use data within the business management software hosted in the cloud at the same
time, from any location, and at any time. This is an attractive feature for multiple business
offices and field service or sales teams that are usually outside the office.

Cloud services also provide a rapid elasticity that the cloud is flexible and scalable to suit our
immediate business needs. we can quickly and easily add or remove users, software features,
and other resources
Lastly, cloud service also provide a measured service that are going back to the affordable
nature of the cloud, we only pay for what we use. We and the cloud provider can measure
storage levels, processing, bandwidth, and the number of user accounts and you are billed
appropriately. The amount of resources that we may use can be monitored and controlled
from both our side and our cloud provider’s side which provides transparency.
To many enterprise organizations cloud computing looks – appropriately enough – heaven
sent. When a company has a business opportunity that demands more processing capacity, or
new applications, or adding hundreds of new users, they can dial it up through their cloud
computing service provider with slightly more effort than it takes to get lunch delivered. No
capital expenses, no vast spikes in maintenance costs, no resource and skill requirements. The
cloud is an IT service that helps business move faster, cheaper and smarter.
ADVERTISING
So persuasive is cloud computing that companies have been known to plunge into it with
gusto while turning a deaf ear to warnings from information security officers, who see gaping
holes in the corporate data security fabric where business managers see agility and economic
benefit. The security officers are usually right. Then again, so are the business managers.
Companies can plow into cloud computing as aggressively as business managers want and
with the necessary security – as long as they understand two things. The first is that cloud
computing is just one part of a much bigger concern, and needs to be managed as such. The
second is that they need a system of control to effectively manage and monitor who has
access to their data and what they’re using it for. Without that knowledge, they’re almost
advertising for a catastrophic loss of vital information like intellectual property (product data,
launch plans, etc.), medical records, personally identifiable information and customer data.
Long before cloud computing, companies were sharing vital information with customers,
partners, vendors, and contractors to make business processes run more efficiently and
economically. They started with Web commerce, then moved into mobile applications and
social networking. Each new information-sharing program opened up another hole in the
corporate information security armor. While traditional security was focused on keeping
people out of the data center, new security processes needed to be implemented to ensure that
only the appropriate people were getting in. Cloud computing is another step on the
continuum, and it also raises the stakes. Hosting vital data and applications on a cloud
provider’s infrastructure puts vital information outside the corporate wall. Even more
importantly, it creates a new set of users who have full access privileges to your data and
applications — namely the cloud service administrators.
Between those two factors, organizations are ceding a risky amount of control over vital
information.
Too often, without realizing it, they rely on nothing more than trust to keep their data safe.
They trust that the right people have the right access to vital information and will use it for
the right things, yet they don’t really know who they’re trusting because they don’t know
who all of those users are. Their service provider tells them to trust that they are managing
user access effectively. Trust, in this context, is a flimsy defense.
Regaining control over vital data means focusing on an often-overlooked aspect of data
access – identity and access management. IAM encompasses the business processes and
technology automation systems used to provision access, calculate risks to information
resources, and eliminate those risks quickly and efficiently. It approaches data security from
the perspective of ensuring appropriate user access policy is set; understanding and
identifying who your users are; and granting them access appropriate to their roles in the
organization.
Policies and roles are central to an effective IAM program. Roles, defined by business
managers, enable organizations to classify users in groups and assign them appropriate access
privileges based on what they need to do their jobs. A role for front-line retail employees, for
example, might include an e-mail account, access to their wage and benefit information, POS
systems, file servers hosting relevant documents and remote access privileges. Their
manager’s role would include all of those privileges, plus access to time and accounting
systems, employee evaluation files, customer and inventory databases and more. The
company might create a role for suppliers to allow them to see inventory information and the
ordering system. A role for partners might give them access to the project management
system to check on the status of joint ventures. Classifying users according to their roles takes
the unknown out of user access equation. The organization “knows” its users according to
their roles.
Technology can be a significant asset to help organizations with this challenging process.
IAM software systems automate key functions such as role definition and management,
provisioning access privileges, access verification and certification, and password
management. Automation makes IAM fast, agile and scalable, compared to ponderous and
expensive manual systems. Combined with data analytics applications, they can identify
associations and patterns that might violate compliance guidelines and company policies, or
indicate hidden risks. Organizations that build this kind of infrastructure can implement any
kind of information sharing program without creating unreasonable risk to their vital
information assets.
As a final point, it is interesting to note that while cloud contracts continue to evolve at a
rapid pace in response to factors such as competitive positioning, customer and regulatory
demands, and judicial intervention, the European Commission, in its September 2012
communication paper ‘Unleashing the Potential of Cloud Computing in Europe has called for
model SLAs for “professional cloud users” and model contracts for consumers of cloud
computing service’s by the end of 2013.

Das könnte Ihnen auch gefallen