Cloud Computing and Cloud Management Plan Research
Planning Process Before Adopting Cloud Computing
Cloud computing plays a critical role in improving the scalability of an internet-based database. It mitigates risks and reduces the cost of running the systems. As a result, organizations seek to adopt the various cloud computing models in the best way possible. The adoption process is proactively informed by planning procedures that begin by emphasizing what cloud computing means to the company. This step is primarily facilitated by the cloud users/consumers as they are the most affected parties by the change. Cloud specialists can enlighten the users about the various types, including public, private, hybrid, or community cloud (Pise, 2019). The second step is all about examining the current applications to sample out those that suit the cloud. This stage requires an inventory of all the present applications to determine their architecture in relation to the cloud. The cloud auditor can come in at this instance to help set the record straight about the existing infrastructure.
The third phase involves the selection of an application to test out the cloud. At this juncture, the organization considers potential software that can illustrate the potential benefits of the intended technology. The stakeholders involved include the cloud broker, who steers the demonstration of the cloud to determine whether it’s suitable for the firm. The next step encompasses planning the migration, and by now, a company is delighted about the reasonable expectations of benefits acquired from the transition. This phase comprises a wide array of stakeholders, especially the executives. Once the planning is complete, the applications are eventually migrated to the cloud. The cloud service provider comes via the cloud broker to implement the plan. A successful plan should ensure that cost, performance, and end-users have been positively impacted (Rittinghouse & Ransome, 2016).
Advantages and Disadvantages of Cloud Computing
Pise (2019) suggests that cloud computing is advantageous as it enables a company to recover from disasters. This is because data stored in the cloud is safe, sustainable, and can always be retrieved at the user’s convenience. Second, cloud computing is irreplaceable in corporate houses’ operational costs. The service is relatively cheap and does not require extensive physical infrastructure within the organization. This implies that the firm does not have to spend an unnecessary budget to cater to databases. Besides, unlike conventional systems, the technology is preferred due to its high-standard security features. It is highly protected from hackers, Distributed Denial of Services (DDOS), malware, and unauthorized access, among other risks. In addition, cloud computing promotes the swift deployment of services as a strategic way of speeding up data operations. Finally, it provides a business with a competitive edge and provides flexibility due to offsite access.
However, cloud computing is equally faced with a range of drawbacks that constrain its application within a business context. For instance, it depends highly on network connections even if the firm opts for Infrastructure as a Service (IaaS). In case of an outage, the technology may experience unplanned downtime. Second, cloud computing has limited features, such as storage space. Software as a Service (SaaS) begins as a free trial and eventually goes premium. Rittinghouse and Ransome (2016) add that relying on cloud computing is like trusting another party with your data; thus, one loses control of the same. Furthermore, it becomes stressful to keep contacting the provider whenever there are technical issues. This is because such cloud computing challenges cannot be solved in-house. The problem becomes more pronounced when the support team does not work 24/7. Data mobility is yet another con if a company wishes to discontinue using cloud services.
Methodology to Select Cloud Computing Service Model
Ahmed (2019) suggests three major cloud computing service models: IaaS, SaaS, and Platform as a Service (PaaS). Each model has distinct characteristics and is selected based on the company’s needs and preferences. If I chose a specific approach, I would begin by looking at the currently available resources within the organization. This step would set the pace for the subsequent procedures to ensure the selection does not exceed the budget. I would then gather users’ opinions on the best model to ensure it addresses their concerns. The next step would be considering key aspects such as user interface, scalability, workflow engine capability, and access control. I would then check the platform management overhead and eventually implement the one with the best-fit characteristics for the company.
Security Risks and Mitigation Activities Before Adopting Cloud Computing
Adopting cloud computing comes with a set of security risks that deserve ultimate mitigation strategies. According to Patel and Alabisi (2019), the first security risk pertains to the customers, such as downtime, fault elimination, business migration, and exposure to commercial secrets. The second category of risks touches on the service providers, who must meet customers’ demands. They also have to sustain security against hackers and isolate probable faults. The final category of risks falls to the government as it has to secure mass-scale data centers and rank the security levels of providers. The security risk can be averted by ensuring adequate preparedness for the events. There should also be mechanisms to protect credentials and data before implementing the system. In addition, it is imperative to have a secure infrastructure to accommodate the intended cloud computing technology. Finally, assessments such as traffic flow analysis and network exposure should be carried out regularly.
Ahmed, I. (2019). A brief review: security issues in cloud computing and their solutions. Telkomnika, 17(6).
Patel, K., & Alabisi, A. (2019). Cloud computing security risks: Identification and assessment. The Journal of New Business Ideas & Trends, 17(2), 11-19.
Pise, V. H. (2019). Cloud Computing-Recent Trends in Information Technology. Anwesh, 4(1), 27.
Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud computing: implementation, management, and security. CRC press.
We’ll write everything from scratch
Cloud Computing and Cloud Management Plan Research
Many organizations have adopted cloud computing. In this assignment, you will research cloud computing and explore its advantages and disadvantages. You will also consider best practices for adopting cloud computing, selecting a particular cloud computing service model, and assessing and mitigating security risks.
For your research, please consult Chapters 13 and 14 of your textbook and these articles:
- “A Brief Review: Security Issues in Cloud Computing and Their Solutions.”
- “Cloud Computing Security Risks: Identification and Assessment.”
- “Cloud Computing – Recent Trends in Information Technology.”
Note: If you wish you may consult additional articles, but this is not required.
Specifically, you will write a 3–4-page paper in which you:
- Outline the planning process that needs to be in place before adopting cloud computing.
- Be sure to identify the stakeholders who need to be involved and the discussions that need to take place.
- Evaluate the advantages and disadvantages of cloud computing.
- Describe the methodology you would use to select a cloud computing service model.
- Review the security risks and mitigation activities that need to take place before adopting cloud computing.
- Go to Basic Search: Strayer University Online Library to locate and integrate into the assignment at least three quality, peer-reviewed academic resources, written within the past five years.
- Include your textbook as one of your resources.
- Wikipedia and similar Websites do not qualify as quality resources.