Friday, May 1, 2020

Security Management and Migration for Safely- MyAssignmenthelp

Question: Discuss about theSecurity Management and Migration for Safely. Answer: Introduction With rapid growth of information and communication technology, it becomes essential to emphasize on deployment of the ICT applications in the organization. However, security issues are increasing in the organizations for deploying the applications. Thus, the organizations require protecting their information in order to smoothly conduct their business. In the present report, cloud architectures are employed in SoftArc Engineering. Therefore, risks generated for hybrid cloud strategy as well as security steps for controlling and securing hybrid cloud are explained in the report. In addition, requirements for remote server administration as well as steps for mitigating from SQL server 2012 database to AWS cloud service are discussed in the report. Cloud Architectures for SoftArc Engineering Barthel and Isendahl (2013) stated that cloud computing architecture is considered as important elements and sub-elements required for cloud computing. The components consist of front end platform such as fat client, thin client as well as mobile device. Moreover, back end platforms like servers, storage along with cloud strategy and network such as internet as well as inter-cloud are involved in cloud computing architecture. There are different types of cloud computing architecture are available. Amongst those, platform as a service and infrastructure as a service are deployed in the organization. Causes for Deploying IaaS and PaaS Platform as a Service is usually recognized as next step down from Software as a Service. It is important and required to adopt the cloud architecture for having several advantages that are suitable for the organization in order to have migration the web service to AWS. Bigo (2016) commented that the maintenance as well as upgrading tools, database systems are underlying in the responsibility of Platform as a Service. There are several pricing models in the cloud architecture that can allow paying only for use. In addition, it can allows people and organizations in order to utilize sophisticate development of software, which could not afford for installing internal as well as dedicated server. Some of the Platform as a Service providers offer development options for several platforms such as mobile and browser. The PaaS Cloud providers provide better security compared to the existing software. On the other hand, in terms of in-house security, the main business of the organization can be benefitted for adopting the cloud computing architecture. In addition, adoption of this architecture provides advantages as there is no need for managing underlying data center. Advantages and Issues Related to the Architecture Implementation of cloud computing infrastructure has several advantages for the organization. The organization has responsibility to upgrade the software (Rittinghouse Ransome, 2016). Maintenance and upgrades of tools as well as database systems are consisted of as the responsibility of SoftArc Engineering. However, the particular architecture allows the pricing models, which can be utilized in the organization. Adoption of the architecture allows using sophisticated development of software (Boutaba, Zhang Zhani, 2013). On the other hand, as the particular organization is responsible to upgrade the service as well as maintenance tool along with database system, these are considered also as limitation for the organization. Along with these, there are several legal causes, which might be precluded the use of off-premise data storage. Risks Associated with Hybrid Cloud Strategy Neary and Shaw (2015) stated that hybrid cloud strategy becomes as one of the biggest trends at present days. According to RightScale 2015 report, there are 82 % of the organizations run on hybrid surveyed organizations, which are running hybrid cloud strategy. On the other hand, various risks are included with the plan of adoption of hybrid cloud strategy. Loss of control is considered as a major risk engaged with implementing hybrid cloud strategy in SoftArc Engineering. The applications are changing and upgrading sudden update of software, Furthermore, inherent risks as well as security are usually concerned with the adoption strategy. There are also few areas where security challenges might be faced by the organization (Considine et al. 2015). The process of deploying hybrid cloud strategy consists of security management and poorly constructed agreements as a service level. It is required to ensure travelling of data between public and private environment. Security Steps and Controls for Hybrid Cloud Dsouza, Ahn and Taguinod (2014) commented that adoption of hybrid cloud in the organization produces several security issues in the organization. Thus, it is crucial to take security steps, which can be able to reduce security issues as well as control over the system. The security team of the organization has lack of good cloud computing skill (Aiash, Mapp Gemikonakli, 2014). Thus, it is needed to fulfill the gaps. Moreover, following the steps as per the guidelines of cyber security needs to be included as compulsory work (Michalas, Paladi Gehrmann, 2014). Cloud automation as well as orchestration is one of the vital parts of cloud computing architecture. The specified techniques are recognized as antithetical for security. In addition, cloud computing tends to go hand-in-hand with agile growth along with DevOps orchestration. However, the step is designed for accelerating the delivery of the applications (Sudmeier-Rieux et al. 2016). Moreover, it maximizes the performances of de signing rather than enough security protection with the oversight. The traditional security requires of monitoring as well as control that is aligned with SDDC and cloud. Te controls are usually designed to reside on networks and servers as for investigating packets and detect anomalous activities and need to block actions that are based on the set of rules (Feng Harwood, 2015). Hence, non alignment with the platforms of cloud is useful for securing hybrid cloud. Recommendation to BCP of SoftArc Engineering It is required to take some measures in order to make the process smooth for deploying cloud computing architecture. The issues regarding hybrid clouds security such as data redundancy requires to overcome by SoftArc Engineering. The private cloud providers are vital resources in order to make sure that the infrastructure is available and accessible at the time of needs. Thus, it is needed to take proper actions, which are needed to take proper actions useful for overcoming the issue. Poorly construction of SLAs require overcoming by SoftArc Engineering. Detailed service level agreements can live up with the same SL A. Compliance is an important issue faced by the enterprise. Thus, maintaining as well as demonstration of compliance requires being effective as well as making easy in the organization. Demonstration of internal system along with cloud provider is needed to be compliant with the standard of payment card data security. The organization requires to be focused on the procedure of risk management. Information security is considered as managing risks consisted as recommendation for SoftArc Engineering. In addition, configuration of complicated network requires to be simplified with reducing threats associated with the risks. Requirements for Remote Server Administration It is crucial to have appropriate information about adoption of remote server administration. There are several features of Remote Server Administration available in Windows Server 2008. The process enables the remote management of Windows Server 2008 (Ferris, 2015). Thus, the management tools consist of Windows Server 2008 R2. Moreover, Remote Server Administration tools are secured by default. Hence, the configuration opens the ports and enables the service required for remote server management (Crpeau Purkey, 2016). On the other hand, Active Directory Certificate Tools have the authority of certification, certificate template as well as online responder management snap-ins. The Active Directory Domain Services are also needed for the process of remote server administration and server for NIS tools and Active Directory Powershell. It is needed for the particular process (Geiger, 2016). Furthermore, DHCP Server Tools and Fax Server Tools are considered as vital requirements for the organization. The File Service Tools as well as Hyper V tools are consisted as the needs for Remote Server Administration and Windows Deployment Service Tools. Steps to Move SQL Server Database to AWS Service Ferris (2015) asserted that Amazon RDS is a large cloud service that offers the functionalities of cloud database for the developers in order to have cost-effective and simple way for managing database. However, there are several steps for moving SQL server database to Amazon AWS service that can be listed as followed. At the first stage, it is needed take snapshots of RDS instance sources. Next, disabling the automatic backups on the origin of RDS instance is needed for migration. Creating the target database by disabling the foreign key constraints is included as a vital step for moving. Creating schema of DDL with producing and publishing scripts wizard in SSMS. Use of bulk copy and importing as well as exporting wizard is required to achieve for migration. In addition, cleaning up target database by re-enabling the foreign key constraints and triggers is achieved as next step. In the next step, it is needed to re-enable the process of auto backups on the source of RDS instance is required for the migration to Amazon RDS. Critical Points as Well as Issues in Migration It is vital to detect the issues for the plan of migration. The organization may face several issues in the selection process as well as instance of provisioning elastic computing cloud (Geiger Pcoud, 2014). The type of storage is required for the migration in SoftArc Engineering. Admin may face several issues as remediate issues of imperfect provision using the capacity of Amazon cloud service as well as toolsets considered as major problems in the organization. However, error in networking can bring the process of migration and user access process for halting the process (Fernandez et al. 2016). Furthermore, it is needed to detect the performance issues as well as carrying the financial impact. On contrary, it is difficult to adopt the functions as well as steps for the plan of migration. Texas based clear measurement is a critical point that requires overcoming by the organization. The staffs and management of SoftArc Engineering needs to take effective steps in order to overcome the issues and achieve target of the organization. Conclusion The above discussion concludes that security management as well as migration is one of the important segments of an organization. It helps to safely restore the databases and allows taking secured backups. In addition, information security is one of the systems utilized by the organization. Information security acts an important role in migrating database and web services of the organization. Thus, migration to AWS database can be helpful to the organization for having several benefits over the traditional database system. Thus, it is required to have proper requirements for remote server management. In addition, appropriate and effective steps towards migration Amazon RDS cloud service would provide competitive advantages for the organization. References Aiash, M., Mapp, G., Gemikonakli, O. (2014, May). Secure live virtual machines migration: issues and solutions. InAdvanced Information Networking and Applications Workshops (WAINA), 2014 28th International Conference on(pp. 160-165). IEEE. Barthel, S., Isendahl, C. (2013). Urban gardens, agriculture, and water management: Sources of resilience for long-term food security in cities.Ecological Economics,86, 224-234. Bigo, D. (2016). Frontiers of fear: immigration and insecurity in the United States and Europe. Boutaba, R., Zhang, Q., Zhani, M. F. (2013). Virtual machine migration in cloud computing environments: Benefits, challenges, and approaches.Communication Infrastructures for Cloud Computing, 383-408. Considine, J. F., Curtis, P. M., Dixit, S. G., Oliveira, F., Rousseau, J. R., Whitney, J. N. (2015).U.S. Patent No. 9,189,294. Washington, DC: U.S. Patent and Trademark Office. Crpeau, F., Purkey, A. (2016). Facilitating Mobility and Fostering Diversity: Getting EU Migration Governance to Respect the Human Rights of Migrants. CEPS Paper in Liberty and Security in Europe No. 92/May 2016. Dsouza, C., Ahn, G. J., Taguinod, M. (2014, August). Policy-driven security management for fog computing: Preliminary framework and a case study. InInformation Reuse and Integration (IRI), 2014 IEEE 15th International Conference on(pp. 16-23). IEEE. Feng, J., Harwood, A. (2015, May). BrowserCloud: A Personal Cloud for Browser Session Migration and Management. InProceedings of the 24th International Conference on World Wide Web(pp. 1491-1496). ACM. Fernandez, E. B., Monge, R., Hashizume, K. (2016). Building a security reference architecture for cloud systems.Requirements Engineering,21(2), 225-249. Ferris, J. M. (2015).U.S. Patent No. 9,052,939. Washington, DC: U.S. Patent and Trademark Office. Ferris, J. M. (2015).U.S. Patent No. 8,977,750. Washington, DC: U.S. Patent and Trademark Office. Geiger, M. (2016). Identity Check: Smart Borders and Migration Management as Touchstones for EU-Readiness and-Belonging. InAn Anthology of Migration and Social Transformation(pp. 135-149). Springer International Publishing. Geiger, M., Pcoud, A. (2014). International organisations and the politics of migration.Journal of Ethnic and Migration Studies,40(6), 865-887. Michalas, A., Paladi, N., Gehrmann, C. (2014, October). Security aspects of e-health systems migration to the cloud. Ine-Health Networking, Applications and Services (Healthcom), 2014 IEEE 16th International Conference on(pp. 212-218). IEEE. Neary, P. P., Shaw, T. B. (2015).U.S. Patent No. 9,104,461. Washington, DC: U.S. Patent and Trademark Office. Rittinghouse, J. W., Ransome, J. F. (2016).Cloud computing: implementation, management, and security. CRC press. Sudmeier-Rieux, K., Fernndez, M., Penna, I. M., Jaboyedo, M., Gaillard, J. C. (2016). Identifying Emerging Issues in Disaster Risk Reduction, Migration, Climate Change and Sustainable Development.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.