Module 1: Facilitated e-learning
|
|
|
- Katherine Stone
- 10 years ago
- Views:
Transcription
1 Module 1: Facilitated e-learning CHAPTER 3: OVERVIEW OF CLOUD COMPUTING AND MOBILE CLOUDING: CHALLENGES AND OPPORTUNITIES FOR CAs... 3 PART 1: CLOUD AND MOBILE COMPUTING... 3 Learning Objectives Introduction Cloud Computing Understanding Cloud Computing Characteristics of Cloud Computing Features of Cloud Computing Types of Cloud Computing Cloud Service Models Benefits and risks in Cloud Computing... 6 Benefits... 7 Risks Impact of Cloud Computing on CAs... 7 Assurance Services in Cloud Computing... 7 Consulting In Cloud Computing Mobile Computing Technology Components Mobile communication Mobile hardware Mobile software Advantages and Security Concerns of Mobile Computing Advantages of Mobile Computing Security Issues in Mobile Computing Controls in Mobile Computing Opportunities for CAs Using Mobile computing in CA firm: Consulting on mobile technology implementation: Assurance services on Mobile technology implementation
2 1.4 Summary References Questions Answers
3 Chapter 3, Part 1: Cloud and Mobile Computing CHAPTER 3: OVERVIEW OF CLOUD COMPUTING AND MOBILE CLOUDING: CHALLENGES AND OPPORTUNITIES FOR CAS PART 1: CLOUD AND MOBILE COMPUTING Learning Objectives To gain an overview of Cloud Computing To gain an overview of Mobile Computing To Understand risks and controls in Cloud and Mobile Computing To gain an overview of opportunities for CAs in Cloud and Mobile computing 1.1 Introduction Using and embracing technology is not an option but mandatory for Chartered Accountants to perform their jobs effectively and efficiently. Chartered Accountants in their roles as consultants or auditors have to deal with Data/ Information for analysis and decision making. This data could be coming from computer systems of client which are now-a-days rapidly shifting to the Cloud. Cloud computing has its inherent business benefits but it also has its own risk, security and control issues. As Chartered Accountants we have to ensure that these inherent risks have been properly mitigated by implementing the right level of security and controls. Cloud computing exposes organisations and those who provide assurance on data which is processed and available on the cloud. These are new challenges which need to be addressed but at the same time these challenges also provide new opportunities. The biggest challenge is the inherent risks involved and the impact it has on services offered. The opportunity is that Chartered Accounts could provide consulting and assurance services to clients in the areas of Cloud Computing. Chartered Accountants have to understand concepts of cloud computing, service offerings, deployment models and the related risks and controls from two perspectives: 1. Impact on services provided to clients by accessing relevant data at clients offices or remotely; 2. Impact on how services are/ will be provided within their own offices using cloud computing. Another emerging technology trend which has changed the way a Chartered Accountant works is Mobile Computing. Today a CA is using Smartphone, Tablet with Internet connectivity for personal uses, but there is an urgent need to expand it so that the same could be used for its professional purposes. A network of mobile devices could be given to staff for efficient execution of work, but at 3
4 Module 1: Facilitating e-learning the same time a more mobile work force requires new levels of security and security administration. Apart from that many organisations have started offering mobile based computing like banks who adopt multi-delivery channels in response to customer demands for greater convenience and lower costs. The wireless channel has seen growing acceptance in the retail payments. Yet another big adoption has come from E-Commerce sites, most of whom have launched their mobile applications. All these areas of Mobile computing have their fair share of risks and security concerns. Chartered Accountants as control expert can offer consulting and assurance services to these organisations to help mitigate these risks. 1.2 Cloud Computing Understanding Cloud Computing Cloud computing is a model for enabling, on demand networked access to a shared pool of computing resources - network/ bandwidth, servers, storage, applications, services etc. Cloud computing refers to computing power in all its totality or specified components (infrastructure, platform or service) being offered in the cloud as a utility to users, to be paid by the meter on consumption basis. As Internet connection s speeds increase and wireless Internet access broadens, more computing activities are being delivered on the Internet. In the Cloud Architecture, the front end includes the client's computer (or computer network) and the Client application required to access the cloud computing system. This could be a Web browser or unique applications that provide network access to clients. On the back end of the system are the various computers, servers and data storage systems that create the "cloud" of computing services. In theory, a cloud computing system could include practically any computer program we can imagine, from data processing to video games. Usually, each application will have its own dedicated server. Any mid-sized business like cooperative banks, Regional Rural Banks or any Marketing company would be benefited by cloud services as their needs could be met by services offered by the Cloud Service providers Characteristics of Cloud Computing 1. On-demand self-service: Automatic provisioning of computing capabilities as needed, 2. Network Access: Network should be accessible anywhere by any device - PC/laptop, PDA, smart phone. 4
5 Chapter 3, Part 1: Cloud and Mobile Computing 3. Resource Pooling: Serving multiple clients using multi-tenant model with different physical and virtual resources 4. Rapid Elasticity: Capabilities to meet clients' increasing requirements at any time. 5. Measured Services: Capability to monitor resource usage for each process and client Features of Cloud Computing Cloud computing typically entails the following important features: 1. High Scalability: Enables servicing of business requirements for larger audiences. 2. Agility: Works in distributed mode environment. Shares resources among users and tasks, while improving efficiency and responsiveness. 3. High Availability and Reliability: Chances of infrastructure failure are minimal. 4. Multi-sharing: Multiple users and applications can work more efficiently with cost reductions by sharing common infrastructure. 5. Virtualisation: Allows servers and storage devices to increasingly share and utilize applications Types of Cloud Computing The Cloud Computing Environment can consist of multiple types deployment models such as: Public Cloud: Refers to service providers that offer their cloud based services to the general public. Private Cloud: Refers to use of cloud computing concepts use within the confines of a private network. Some businesses like private cloud computing because it provides more control over infrastructure and security than public cloud computing. Hybrid Cloud: Businesses may decide to combine public cloud and private cloud services to create a hybrid cloud. Community Cloud: Several businesses share cloud computing resources Cloud Service Models There are three dominant cloud computing models: 1. Infrastructure as a Service (IaaS) 2. Software as a Service (SaaS) 3. Platform as a Service (PaaS). 5
6 Module 1: Facilitating e-learning Infrastructure as a Service (IaaS): This has the capability to provision processing, storage, networks and other fundamental computing resources that offer the customer the ability to deploy and run arbitrary software, which can include operating systems and applications. Users are not required to manage the infrastructure as they do not possess the ownership of the underlying Cloud infrastructure. Software as a Service (SaaS): This provides the capability to use the provider s applications that run on the cloud infrastructure. The applications are accessible from various client devices. Users are freed from the possession and maintenance issues of software and hardware. Platform as a Service (PaaS): This provides the user organisation s application developers access the hardware and operating system platform allowing them to simply code and deploy applications on the platform without directly interacting with the underlying infrastructure. Source: Benefits and risks in Cloud Computing Though cloud computing offers a lot of advantages to the organisation, yet there are a lot of associated risks. The benefits and risks are outlined below: 6
7 Chapter 3, Part 1: Cloud and Mobile Computing Benefits Risks Gain competitive advantage. Reach new markets. Improve existing products and services. Retain existing customers. Increase productivity. Contain cost. Develop products or services that could not be possible without cloud services. Break geographic barriers. Greater dependency on third parties, wherever third party services used. Computing services do fail, leaving users unable to access programs or data. Computing services can lose customer data. Increased complexity of compliance with laws and regulations. The dynamic nature of cloud computing may result in confusion as to where information actually resides. When information retrieval is required, this may create delays. Due to the dynamic nature of the cloud, information may not immediately be located in the event of a disaster Impact of Cloud Computing on CAs Cloud computing is the new way to do business in our profession. There is absolutely nothing mystical or overly complicated about this model. Technology has and continues to change the way we function within our practices. Think about the changes that we have witnessed over the past 15 years ing, document management, electronic filing, dual monitors, the scanning of source documents, the proliferation of mobile computing technologies and use of smaller, more powerful handheld devices, as well as the use of social networking as a new way to interact with prospective and existing clients and employees, and other professionals. The opportunities lie in the areas of assurance, consulting and implementation. Assurance Services in Cloud Computing In the realm of assurance services, the auditor is required to assess, How much security is enough? Criticality of the application being sent to the cloud. Outsourcer s experience with SLA and vendor management Does the present security model have to be altered? 7
8 Module 1: Facilitating e-learning Cloud vendor s policy on vulnerability management reporting (beyond basic Contact Us links), commitment to following up, promptly responding to reports etc. Is there an independent auditor s report? What is the impact on the auditor when client has used cloud computing and the data to be audited is with the cloud service provider? How will the auditor access and audit this data? What is the impact on compliances? What is the impact on security? Who is responsible for security of data? Who owns the data? Where does the data reside? What business continuity and disaster recovery measures are in place in the cloud infrastructure? Does the cloud provider have a backup in place? How do I audit or evaluate security controls placed on the cloud-based infrastructure? Consulting In Cloud Computing A Chartered Accountant can provide consulting to clients in the areas of Cloud Computing and can even help a client move to cloud. Following are the steps involved in moving to cloud where a Chartered Accountant can provide consulting service at perhaps every step. 1. Understand the mission. 2. Identify the culture. 3. Determine the value. 4. Understand your data. 5. Understand your services. 6. Understand your processes. 7. Understand the cloud resources. 8. Identify candidate data. 9. Identify candidate services 10. Identify candidate processes. 11. Create a governance strategy. 8
9 Chapter 3, Part 1: Cloud and Mobile Computing 12. Create a security strategy. 13. Bind candidate services to data and processes. 14. Relocate services, processes, and information. 15. Implement security. 16. Implement governance. 17. Implement operations 1.3 Mobile Computing Technology Components Mobile Computing is a technology that allows transmission of data, voice and video via a computer or any other wireless enabled device without having to be connected to a fixed physical link. Mobile computing is not just about using mobile phones but it is about computing on the move using wireless connectivity. Mobile computing is enabled by use of mobile devices (portable and hand held computing devices) such as PDA, laptops, mobile phones, MP3 players, digital cameras, tablet PC and Palmtops on a wireless network. The key components of mobile computing are: 1. Mobile communication 2. Mobile hardware 3. Mobile software 1. Mobile communication Mobile communication refers to the infrastructure put in place to ensure that seamless and reliable communication goes on. This would include devices such as Protocols, Services, Bandwidth, and Portals necessary to facilitate and support the stated services. The data format is also defined at this stage. This ensures that there is no collision with other existing systems offering the same services. 2. Mobile hardware Mobile hardware includes mobile devices or device components that receive or access the service of mobility. They would range from Portable laptops, Smartphones, Tablet PC's, Personal Digital Assistants. These devices use an existing and established network to operate on. In most cases, it would be a wireless network. At the back end, there are various servers like Application Servers, Database Servers and Servers with wireless support, WAP gateway, a Communications Server and/or MCSS (Mobile communications server switch) or a wireless gateway embedded in wireless carrier's network (this server provides communications functionality to allow the handheld device to communicate with the Internet or Intranet infrastructure). 9
10 Module 1: Facilitating e-learning 3. Mobile software Mobile software is the actual program that runs on the mobile hardware. It deals with the characteristics and requirements of mobile applications. It is the operating system of that appliance. It's the essential component that makes the mobile device operate. Mobile applications popularly called Apps are being developed by organisations for use by customers but these apps could represent risks, in terms of flow of data as well as personal identification risks, introduction of malware and access to personal information of mobile owner Advantages and Security Concerns of Mobile Computing Advantages of Mobile Computing Location flexibility: Mobile Computing enables user to work from anywhere as long as there is a connection established. A user can work without being in a fixed position. Saves time: Time reduced as there is no travel required from different locations such as office and back. Enhanced productivity: Employees can work efficiently and effectively from any location they are comfortable with and at any time they want. Ease of research: Research is made easier, since users in the field searching for facts can feed data back to the system. Entertainment- Video and audio recordings can be streamed on the go using mobile computing. It makes it easy to access a wide variety of movies, educational and informative material. Security Issues in Mobile Computing Following are some of the major security issues in Mobile Computing: It is not easy to monitor the proper usage. Improper and unethical practices such as hacking, industrial espionage, pirating, online fraud and malicious destruction are some problems experienced due to mobile computing. The problem of identity theft is very difficult to contain or eradicate. Unauthorized access to data and information by hackers. Physical damage to devices, data corruption, data leakage, interception of calls and possible exposure of sensitive information. Lost devices or unauthorized access to unsecured devices allows exposure of sensitive data, resulting in loss to the enterprise, customers or employees. Mobile Apps could also represent a big security risk Controls in Mobile Computing Some of the practices to mitigate these security concerns are: Developing and implementing a Mobile computing security policy. 10
11 Chapter 3, Part 1: Cloud and Mobile Computing Use of encryption technology such as virtual private networks. Use of power-on passwords. Use of encryption for stored information. Installing security software. Educating the users on proper mobile computing ethics. Enforcing proper access rights and permissions. Auditing mobile security policy and implementation Opportunities for CAs As with any IT, CAs have to understand mobile computing technology from three perspectives: Using Mobile computing within a CA firm. Provide consulting services on mobile computing for clients. Provide assurance services on mobile computing for clients. Using Mobile computing in CA firm: Mobile computing can be used by CAs in their own offices for enhancing overall efficiency and effectiveness of services rendered by the firm. However, implementation has to be based on the overall IT Strategic plan of the firm and should take into consideration the current technology deployed, organisation structure, technical competency of the staff, services offered currently and planned in the future, client profile, usage of technology by clients, cost benefit analysis, etc. A detailed project plan with specific milestones and timelines has to be prepared and implemented considering all the above factors rather than just buying mobile devices with connectivity. Consulting on mobile technology implementation: The areas where Chartered Accountants can add value and provide consultancy services are: 1. Business strategy/business process transformation. 2. Risk Assessment, risk mitigating strategy and security at different layers of technology. 3. Designing security policy for the enterprise. 4. Access controls at different layers of technology and for devices/employees. 5. Application and business process controls to be implemented. 6. Training to users on risks, security and controls. Assurance services on Mobile technology implementation Some of the areas where auditors can have a significant role in providing assurance services: 1. Information systems audit of all/any aspect of security policy, business continuity, environmental access, physical access, logical access and application security. 2. Compliance with enterprise policies, procedures, standards and practices as relevant. 3. Physical verification or confirmation of usage of mobile devices. 11
12 Module 1: Facilitating e-learning 4. Compliance with regulations as applicable. 5. Network security, Database security and Penetration testing as required. 1.4 Summary Accelerated adoption of emerging technologies like Cloud Computing and Mobile Computing has provided a lot of advantages to organisations. However; at the same time the technology implementation has inherent risks which have to be properly understood and mitigated. Chartered accountants have to understand the inherent risks in these technologies so that these could be considered while auditing. An understanding of these technologies will also open new opportunities to the Chartered Accountants in providing related assurance and consulting Services. 1.5 References Questions 1. Which of the following is not a service model for cloud? A. IaaS (Infrastructure as a service) B. Paas (Platform as a Service) C. SaaS (Software as a Service) D. DaaS (Display as a Service) 2. Which of the following would not be a reason to move to cloud computing? A. Agility B. Scalability C. Security 12
13 Chapter 3, Part 1: Cloud and Mobile Computing D. Resource Pooling 3. Which of the following is not a benefit of cloud computing? A. Vendor lock in B. Ability to access the application & data from anywhere C. Reduce Hardware Costs D. Reduce need for physical space 4. Which of the following is not an advantage of Mobile Computing? A. Saves time B. Entertainment C. Health hazard D. Location flexibility 1.7 Answers 1 D 2 C 3 A 4 C 13
The cloud - ULTIMATE GAME CHANGER ===========================================
The cloud - ULTIMATE GAME CHANGER =========================================== When it comes to emerging technologies, there is one word that has drawn more controversy than others: The Cloud. With cloud
Chapter 7: Trends in technology impacting SDLC... 2 7.1 Learning objective... 2 7.1 Introduction... 2 7.2 Technology Trends... 2 7.2.
Chapter 7: Trends in technology impacting SDLC... 2 7.1 Learning objective... 2 7.1 Introduction... 2 7.2 Technology Trends... 2 7.2.1 Virtualization... 2 Characteristics of virtualizations affecting SDLC...
Cloud Computing. What is Cloud Computing?
Cloud Computing What is Cloud Computing? Cloud computing is where the organization outsources data processing to computers owned by the vendor. Primarily the vendor hosts the equipment while the audited
Data Protection Act 1998. Guidance on the use of cloud computing
Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered
Bringing the Cloud into Focus. A Whitepaper by CMIT Solutions and Cadence Management Advisors
Bringing the Cloud into Focus A Whitepaper by CMIT Solutions and Cadence Management Advisors Table Of Contents Introduction: What is The Cloud?.............................. 1 The Cloud Benefits.......................................
See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.
Cloud Strategy Information Systems and Technology Bruce Campbell What is the Cloud? From http://csrc.nist.gov/publications/nistpubs/800-145/sp800-145.pdf Cloud computing is a model for enabling ubiquitous,
Managing Cloud Computing Risk
Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. [email protected] Learning Objectives Understand how to identify
How To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device
Ten Tips for Managing Risks on Convergent Networks The Risk Management Group April 2012 Sponsored by: Lavastorm Analytics is a global business performance analytics company that enables companies to analyze,
BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT
BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT www.intivix.com (415) 543 1033 HELP TEAM MEMBERS TO COLLABORATE MORE EASILY FROM ANYWHERE. People are starting to expect the ability to connect
Everything You Need To Know About Cloud Computing
Everything You Need To Know About Cloud Computing What Every Business Owner Should Consider When Choosing Cloud Hosted Versus Internally Hosted Software 1 INTRODUCTION Cloud computing is the current information
Cloud Computing; What is it, How long has it been here, and Where is it going?
Cloud Computing; What is it, How long has it been here, and Where is it going? David Losacco, CPA, CIA, CISA Principal January 10, 2013 Agenda The Cloud WHAT IS THE CLOUD? How long has it been here? Where
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
Cloud Computing for SCADA
Cloud Computing for SCADA Moving all or part of SCADA applications to the cloud can cut costs significantly while dramatically increasing reliability and scalability. A White Paper from InduSoft Larry
OWASP Chapter Meeting June 2010. Presented by: Brayton Rider, SecureState Chief Architect
OWASP Chapter Meeting June 2010 Presented by: Brayton Rider, SecureState Chief Architect Agenda What is Cloud Computing? Cloud Service Models Cloud Deployment Models Cloud Computing Security Security Cloud
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing
AskAvanade: Answering the Burning Questions around Cloud Computing
AskAvanade: Answering the Burning Questions around Cloud Computing There is a great deal of interest in better leveraging the benefits of cloud computing. While there is a lot of excitement about the cloud,
Mapping Your Path to the Cloud. A Guide to Getting your Dental Practice Set to Transition to Cloud-Based Practice Management Software.
Mapping Your Path to the Cloud A Guide to Getting your Dental Practice Set to Transition to Cloud-Based Practice Management Software. Table of Contents Why the Cloud? Mapping Your Path to the Cloud...4
Bring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com
Bring Your Own Device (BYOD) and Mobile Device Management tekniqueit.com Bring Your Own Device (BYOD) and Mobile Device Management People are starting to expect the ability to connect to public networks
Bring Your Own Device (BYOD) and Mobile Device Management. www.cognoscape.com
Bring Your Own Device (BYOD) and Mobile Device Management www.cognoscape.com Bring Your Own Device (BYOD) and Mobile Device Management People are starting to expect the ability to connect to public networks
EXIN Cloud Computing Foundation
Sample Questions EXIN Cloud Computing Foundation Edition April 2013 Copyright 2013 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored in a data processing
Cloud Computing. Karan Saxena * & Kritika Agarwal**
Page29 Cloud Computing Karan Saxena * & Kritika Agarwal** *Student, Sir M. Visvesvaraya Institute of Technology **Student, Dayananda Sagar College of Engineering ABSTRACT: This document contains basic
Bring Your Own Device (BYOD) and Mobile Device Management
Bring Your Own Device (BYOD) and Mobile Device Management Intivix.com (415) 543 1033 PROFESSIONAL IT SERVICES FOR BUSINESSES OF ALL SHAPES AND SIZES People are starting to expect the ability to connect
Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.
Public Clouds Krishnan Subramanian Analyst & Researcher Krishworld.com A whitepaper sponsored by Trend Micro Inc. Introduction Public clouds are the latest evolution of computing, offering tremendous value
The Key Components of a Cloud-Based Unified Communications Offering
The Key Components of a Cloud-Based Unified Communications Offering Organizations must enhance their communications and collaboration capabilities to remain competitive. Get up to speed with this tech
Choose Your Own Device (CYOD) and Mobile Device Management. gsolutionz.com
Choose Your Own Device (CYOD) and Mobile Device Management gsolutionz.com Choose Your Own Device (CYOD) and Mobile Device Management 2 gsolutionz.com People are starting to expect the ability to connect
The Key Components of a Cloud-Based UC Offering
The Key Components of a Cloud-Based UC Offering Organizations must enhance their communications and collaboration capabilities to remain competitive. Get up to speed with this tech primer and find new
How To Protect Your Cloud From Attack
A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to
Session 11 : (additional) Cloud Computing Advantages and Disadvantages
INFORMATION STRATEGY Session 11 : (additional) Cloud Computing Advantages and Disadvantages Tharaka Tennekoon B.Sc (Hons) Computing, MBA (PIM - USJ) POST GRADUATE DIPLOMA IN BUSINESS AND FINANCE 2014 Cloud
About me & Submission details
About me & Submission details Parveen Yadav Security Researcher aka Ethical Hacker. Working as a Freelancer. White Hat Hacking work. Few Recognitions :- Got listed my name in Google Hall of fame,amazon,paypal,adobe
Cloud models and compliance requirements which is right for you?
Cloud models and compliance requirements which is right for you? Bill Franklin, Director, Coalfire Stephanie Tayengco, VP of Technical Operations, Logicworks March 17, 2015 Speaker Introduction Bill Franklin,
Electronic Records Storage Options and Overview
Electronic Records Storage Options and Overview www.archives.nysed.gov Objectives Understand the options for electronic records storage, including cloud-based storage Evaluate the options best suited for
Making the leap to the cloud: IS my data private and secure?
Making the leap to the cloud: IS my data private and secure? tax & accounting MAKING THE LEAP TO THE CLOUD: IS MY DATA PRIVATE AND SECURE? Cloud computing: What s in it for me? The more you know about
20 th Year of Publication. A monthly publication from South Indian Bank. www.sib.co.in
To kindle interest in economic affairs... To empower the student community... Open YAccess www.sib.co.in [email protected] A monthly publication from South Indian Bank 20 th Year of Publication Experience
CA Enterprise Mobility Management MSO
SERVICES DESCRIPTION CA Enterprise Mobility Management MSO At a Glance Today, your customers are more reliant on mobile technologies than ever. They re also more exposed by mobile technologies than ever.
STRONGER AUTHENTICATION for CA SiteMinder
STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive
Capturing the New Frontier:
Capturing the New Frontier: How Software Security Unlocks the Power of Cloud Computing Executive Summary Cloud computing is garnering a vast share of IT interest. Its promise of revolutionary cost savings
Internet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
White Paper on CLOUD COMPUTING
White Paper on CLOUD COMPUTING INDEX 1. Introduction 2. Features of Cloud Computing 3. Benefits of Cloud computing 4. Service models of Cloud Computing 5. Deployment models of Cloud Computing 6. Examples
The Cloud in Regulatory Affairs - Validation, Risk Management and Chances -
45 min Webinar: November 14th, 2014 The Cloud in Regulatory Affairs - Validation, Risk Management and Chances - www.cunesoft.com Rainer Schwarz Cunesoft Holger Spalt ivigilance 2014 Cunesoft GmbH PART
Cloud Computing Guide & Handbook. SAI USA Madhav Panwar
Cloud Computing Guide & Handbook SAI USA Madhav Panwar Background 2010 WGITA approved the cloud computing project with SAI USA as lead and Canada & India as members 2011 A status report was presented and
How cloud computing can transform your business landscape.
How cloud computing can transform your business landscape. This whitepaper will help you understand the ways cloud computing can benefit your business. Introduction It seems like everyone is talking about
Enhancing Operational Capacities and Capabilities through Cloud Technologies
Enhancing Operational Capacities and Capabilities through Cloud Technologies How freight forwarders and other logistics stakeholders can benefit from cloud-based solutions 2013 vcargo Cloud Pte Ltd All
Technology & Business Overview of Cloud Computing
Your Place or Mine? In-House e-discovery Platform vs. Software as a Service Technology & Business Overview of Cloud Computing Janine Anthony Bowen, Esq. Jack Attorneys & Advisors www.jack-law.com Atlanta,
Secure Cloud Computing through IT Auditing
Secure Cloud Computing through IT Auditing 75 Navita Agarwal Department of CSIT Moradabad Institute of Technology, Moradabad, U.P., INDIA Email: [email protected] ABSTRACT In this paper we discuss the
Enterprise Computing Solutions
Business Intelligence Data Center Cloud Mobility Enterprise Computing Solutions Security Solutions arrow.com Security Solutions Secure the integrity of your systems and data today with the one company
A Comparative Study of cloud and mcloud Computing
A Comparative Study of cloud and mcloud Computing Ms.S.Gowri* Ms.S.Latha* Ms.A.Nirmala Devi* * Department of Computer Science, K.S.Rangasamy College of Arts and Science, Tiruchengode. [email protected]
Cloud Infrastructure Security
Cloud Infrastructure Security Dimiter Velev 1 and Plamena Zlateva 2 1 University of National and World Economy, UNSS - Studentski grad, 1700 Sofia, Bulgaria [email protected] 2 Institute of Control and
Introduction to Cloud Services
Introduction to Cloud Services (brought to you by www.rmroberts.com) Cloud computing concept is not as new as you might think, and it has actually been around for many years, even before the term cloud
Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer What is Cloud Computing A model for enabling convenient, on-demand network access to a shared pool of configurable
Commercial Software Licensing
Commercial Software Licensing CHAPTER 12: Prepared by DoD ESI January 2013 Chapter Overview Most software licenses today are either perpetual or subscription. Perpetual licenses involve software possession
security in the cloud White Paper Series
security in the cloud White Paper Series 2 THE MOVE TO THE CLOUD Cloud computing is being rapidly embraced across all industries. Terms like software as a service (SaaS), infrastructure as a service (IaaS),
Refresher on cloud computing
Refresher on cloud computing Cloud computing is a form of outsourcing where the organization outsources data processing to computers owned by the vendor. Outsourcing may also include utilizing the vendor
Creating Dynamic IT Infrastructure at Reduced Cost with Cloud Computing
Creating Dynamic IT Infrastructure at Reduced Cost with Cloud Computing White Paper Date: 12/9/2011 Version: 0.4 (Final) Author: Matt Baker, Clarity Business and IT Solutions Creating Dynamic IT Infrastructure
How To Protect Your Cloud Computing Resources From Attack
Security Considerations for Cloud Computing Steve Ouzman Security Engineer AGENDA Introduction Brief Cloud Overview Security Considerations ServiceNow Security Overview Summary Cloud Computing Overview
[email protected] [email protected]
1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work
CLOUD COMPUTING CUSTOMER RELATIONSHIP MANAGEMENT FOR SMALL AND MEDIUM ENTERPRISES
RADOSŁAW URBAŃSKI KRZYSZTOF BZDYRA E-mail: [email protected], [email protected] Koszalin University of Technology, Sniadeckich 2, 75-453 Koszalin, Poland CLOUD COMPUTING CUSTOMER
SaaS, PaaS & TaaS. By: Raza Usmani
SaaS, PaaS & TaaS By: Raza Usmani SaaS - Introduction Software as a service (SaaS), sometimes referred to as "on-demand software. software and its associated data are hosted centrally (typically in the
Cloud Computing Technology
Cloud Computing Technology The Architecture Overview Danairat T. Certified Java Programmer, TOGAF Silver [email protected], +66-81-559-1446 1 Agenda What is Cloud Computing? Case Study Service Model Architectures
Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India [email protected]
IJCSIT, Volume 1, Issue 5 (October, 2014) e-issn: 1694-2329 p-issn: 1694-2345 A STUDY OF CLOUD COMPUTING MODELS AND ITS FUTURE Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India
Private & Hybrid Cloud: Risk, Security and Audit. Scott Lowry, Hassan Javed VMware, Inc. March 2012
Private & Hybrid Cloud: Risk, Security and Audit Scott Lowry, Hassan Javed VMware, Inc. March 2012 Private and Hybrid Cloud - Risk, Security and Audit Objectives: Explain the technology and benefits behind
Quattra s Cloud Vision & Framework Value
Quattra s Cloud Vision & Framework Value Data centers provide the foundation for the applications and services that organizations deliver, and companies need their IT facilities to be reliable, compliant
Managing PHI in the Cloud Best Practices
Managing PHI in the Cloud Best Practices Executive Whitepaper Recent advances in both Cloud services and Data Loss Prevention (DLP) technology have substantially improved the ability of healthcare organizations
Cloud Database Storage Model by Using Key-as-a-Service (KaaS)
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah
Securing Corporate Email on Personal Mobile Devices
Securing Corporate Email on Personal Mobile Devices Table of Contents The Impact of Personal Mobile Devices on Corporate Security... 3 Introducing LetMobile Secure Mobile Email... 3 Solution Architecture...
Cloud Computing. Course: Designing and Implementing Service Oriented Business Processes
Cloud Computing Supplementary slides Course: Designing and Implementing Service Oriented Business Processes 1 Introduction Cloud computing represents a new way, in some cases a more cost effective way,
The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing
Your Platform of Choice The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing Mark Cravotta EVP Sales and Service SingleHop LLC Talk About Confusing? Where do I start?
Running head: TAKING A DEEPER LOOK AT THE CLOUD: SOLUTION OR 1
Running head: TAKING A DEEPER LOOK AT THE CLOUD: SOLUTION OR 1 Taking a Deeper Look at the Cloud: Solution or Security Risk? LoyCurtis Smith East Carolina University TAKING A DEEPER LOOK AT THE CLOUD:
Session 2. The economics of Cloud Computing
Session 2. The economics of Cloud Computing Cloud computing is the next step in the on-going evolution of Information Technology. From a technical standpoint, very little that currently is done on cloud
How cloud computing can transform your business landscape
How cloud computing can transform your business landscape Introduction It seems like everyone is talking about the cloud. Cloud computing and cloud services are the new buzz words for what s really a not
The Cloud at Crawford. Evaluating the pros and cons of cloud computing and its use in claims management
The Cloud at Crawford Evaluating the pros and cons of cloud computing and its use in claims management The Cloud at Crawford Wikipedia defines cloud computing as Internet-based computing, whereby shared
Kent State University s Cloud Strategy
Kent State University s Cloud Strategy Table of Contents Item Page 1. From the CIO 3 2. Strategic Direction for Cloud Computing at Kent State 4 3. Cloud Computing at Kent State University 5 4. Methodology
Desktop Virtualization. The back-end
Desktop Virtualization The back-end Will desktop virtualization really fit every user? Cost? Scalability? User Experience? Beyond VDI with FlexCast Mobile users Guest workers Office workers Remote workers
Your complete guide to Cloud Computing
Your complete guide to Cloud Computing 1 Doc V1.0 Dec 2013 Table of Contents Hosted Desk- 3 The Cloud and Cloud Computing... 4 The benefits of Cloud Solutions 6 The Cloud is Growing - Rapidly 7 Resolving
{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com
{ipad Security} plantemoran.com for K-12 Understanding & Mitigating Risk Plante Moran The ipad is in K-12. Since its debut in April 2010, the ipad has quickly become the most popular tablet, outselling
A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services
A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services Ronnie D. Caytiles and Byungjoo Park * Department of Multimedia Engineering, Hannam University
Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems... 3. Improve Processes...
Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems... 3 Improve Processes... 3 Innovation... 4 IT Planning & Alignment
PART I: The Pros and Cons of Public Cloud Computing
PART I: The Pros and Cons of Public Cloud Computing Pros 1. Efficiently use the resource through sharing Users from companies or enterprises can access to the centralized servers where data are stored
How to Turn the Promise of the Cloud into an Operational Reality
TecTakes Value Insight How to Turn the Promise of the Cloud into an Operational Reality By David Talbott The Lure of the Cloud In recent years, there has been a great deal of discussion about cloud computing
MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES
MOBILITY & INTERCONNECTIVITY Features SECURITY OF INFORMATION TECHNOLOGIES Frequent changes to the structure of enterprise workforces mean that many are moving away from the traditional model of a single
Cisco WAAS Optimized for Citrix XenDesktop
White Paper Cisco WAAS Optimized for Citrix XenDesktop Cisco Wide Area Application Services (WAAS) provides high performance delivery of Citrix XenDesktop and Citrix XenApp over the WAN. What ou Will Learn
What Cloud computing means in real life
ITU TRCSL Symposium on Cloud Computing Session 2: Cloud Computing Foundation and Requirements What Cloud computing means in real life Saman Perera Senior General Manager Information Systems Mobitel (Pvt)
VALUE PROPOSITION FOR SERVICE PROVIDERS. Helping Service Providers accelerate adoption of the cloud
VALUE PROPOSITION FOR SERVICE PROVIDERS Helping Service Providers accelerate adoption of the cloud Partnership with Service Providers Enabling Your Cloud Services in Complex Environments Today s challenge
The Benefits of Cloud Computing to the E-Commerce Industry July 2011 A whitepaper on how hosting on a cloud platform can lower costs, improve
The Benefits of Cloud Computing to the E-Commerce Industry July 2011 A whitepaper on how hosting on a cloud platform can lower costs, improve productivity and stability and remove issues around scalability.
What Is The Cloud And How Can Your Agency Use It. Tom Konop Mark Piontek Cathleen Christensen
What Is The Cloud And How Can Your Agency Use It Tom Konop Mark Piontek Cathleen Christensen Video Computer Basics: What is the Cloud What is Cloud Computing Cloud Computing Basics The use of the word
PULSE SECURE FOR GOOGLE ANDROID
DATASHEET PULSE SECURE FOR GOOGLE ANDROID Product Overview In addition to enabling network and resource access for corporate managed mobile devices, many enterprises are implementing a Bring Your Own Device
Hexaware E-book on Q & A for Cloud BI Hexaware Business Intelligence & Analytics Actionable Intelligence Enabled
Hexaware E-book on Q & A for Cloud BI Hexaware Business Intelligence & Analytics Actionable Intelligence Enabled HEXAWARE Q & A E-BOOK ON CLOUD BI Layers Applications Databases Security IaaS Self-managed
Cloud Computing An Elephant In The Dark
Cloud Computing An Elephant In The Dark Amir H. Payberah [email protected] Amirkabir University of Technology (Tehran Polytechnic) Amir H. Payberah (Tehran Polytechnic) Cloud Computing 1394/2/7 1 / 60 Amir
Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security
Strategic Compliance & Securing the Cloud Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security Complexity and Challenges 2 Complexity and Challenges Compliance Regulatory entities
