Importance of Cloud Computing for Storage and Data Security
Question:
Discuss about the Future Technology for Expert Systems with Applications.
This report is about on of the leading global oil field which is facing some serious issues with the ongoing business. IT is slipping its competitive edge because of its poor and the old generation technologies that the organisation uses for the process of business. The organisation heads want to rebuild the entire structure of the organisation for the betterment of the business. The things that the heads want to change two of the major process of the organisation, 1st is rebuilding its core customer facing platforms and the replacing the old technology of worth in multi millions, back office into new technically advanced instruments and technologies (Benes et al., 2015). The aim of this paper is to highlight each and everything that can be done in order to make the industry a bench mark again. The paper will focus on finding the best suitable trends and technologies that will have a positive effect on the business procedure. The paper will also highlight some of the potential investment opportunities. One of the major thing that the organisation lack in the past, will be bought into highlight, that is the cloud technology which is one of the most advance technology for storing data (Croughan, Konstantinov & Cooney, 2015). The paper will also focus on the operating system changes that the organisation needs to use, the software’s that will be of crucial use, the networking protocols. The paper will also provide some major recommendations for the organisation to progress and sustain the market.
Cloud computing can be defined as the as the practice of using the remote servers that are hosted on the internet, for storing and managing and processing of data, rather than storing of the data in the local servers. This can help the organisation for storing the data in the cloud servers. Thus, reducing the cost of maintaining the local servers. Also, the clouds provide the best quality of data security. Cloud computing systems reduce the capital expenses of buying of the hardware’s and the software’s and setting them on the site, round the clock electric current service and the cost of large number of the technical for the process (Almorsy, Grundy & Müller, 2016). Most of the cloud services provide self-services and hence the data can be introduced in the organisation system within minutes. As the cloud computing systems runs on a global scale hence can just use them for the development of the backend systems in the organisation. The cloud system can also ensure that there is no data loss in the system and hence can the organisation can blindly rely on the system (Rittinghouse, & Ransome, 2016). For the betterment of the data centre the organisation needs to merge up with the cloud system for the storage of the system. This will reduce the cost and the time of the system. With the introduction of the cloud technology the departments that will be affected the most are
Impact of Cloud Computing on HR, Finance and IT Departments
HR department: The work of the Human resource department is to find recruits and give proper training to the recruits, with the introduction of the cloud system the seniors can store the data of the new recruits as well as the old employees in a well organised cloud platform (Khalil, Khreishah & Azeem, 2014). The need of any paper work won’t be needed and thence will reduce the cost.
Finance department: This is the one department which will get the best advantage of the cloud system. The work of the fiancé department is to make sure the entire business is going on smoothly and there is no loss of money, every employee is getting their salary, the input of the money is more than the output or not (Zhao, Li & Liu 2014). With the introduction of the cloud the system the team can store the data in a well-defined manner and access the data whenever the team needs it. Also, there is no chance of any data loss.
IT department: The work of the department is to store data, and use them when needed, it looks on every project the internal teams are working. IT focuses on the providing support to all the teams in the organisation ((Hashem et al., 2015). This is the team which will install the cloud system in the organisation and make the necessary changes. By the introduction of the cloud system every the it team can get the access to any team within time to provide help.
An operating system or the OS can be defined as the system software that helps in managing every computer hardware software and other resources linked with the software for providing better services to the user. The organisation must update the operating system it is currently using .One of the best operating system in the market is the new Windows 10, developed by the Microsoft. The latest version of the operating system supports a huge amount of the applications and other services. This is one of the most secured operating systems ever built (Silberschatz, Galvin & Gagne, 2014). This will help the organisation in maintaining a proper balanced work process in the organisation. With the updating of the OS, thee software set that comes preinstalled with the operating system like the email service software, the browsers and the other service.
The Internet of things which is one of the hottest topics in the world can be implemented in the industry for the betterment of the department works. The IOt will help in the automation of the entire system in a certain department. Where there are liked department the IOT can be much helpful as it helps in the combination and calculation of the work to be done.
The organisation also needs to update the desktop systems or the workstations the employees are working on, with the introduction of the modern-day configuration the teams can work in a faster way and provide better output to the teams (Lee & Lee 2015). The Internet of Things (IoT). With the advance systems the back-end support systems get a more secured and advance set of the application servers and the firewalls.
Importance of Upgraded Operating System
In the organisation the employees are given many tools for the betterment of the work they are doing, and service to do their respective duties.
Some of the these are:
- Email – The organisation provides a well synchronised email option to the employees currently delivered via a thick client application as well as over the Internet. This helps the employees to keep up with any update from the department or the client. This also ensures that the emails are sent and received thought a secured platform, so that there are less chances of any data theft.
- Storage space – The cloud is the storage space for the employees in the organisation. This storage is used for sharing and or storing data files – typical data files relate to word processing files, diagrams and spread sheets etc; however, in some cases the storage is also used as a source code repository (Wei et al., 2014). The company Barres any employee to store any sensitive or personal data inn the cloud without proper security in order to maintain the security aspect.
- Desktop Productivity – currently provided as a thick client (on end user device) applications but the company wants to explore the possibility to provide this on multiple form factors and different platforms (Eckert et al., 2016).
- Internet Connectivity – The organisation provides the well-established and secured currently enabled via Wi-Fi and some fixed Ethernet based approaches. The company does not exclude the wider consideration for other wireless technology for the provisioning of connectivity options. But the organisation restricts the use of some of the websites that may be harmful for the organisation.
- Line of Business Applications: The organisation uses the line of the business application protocols using technologies varying from legacy fat client server to web-based solutions.
- Desktop management – As discussed above the organisation provides a well-established and advanced desktop systems or workstations for using the software’s that are needed for the organisation using the central patching, applications provisioning on desktop.
- Back office: The organisation provides a well-established management and support system, including network, storage and compute infrastructures.
The organisation can implement and invest an amount of money in the in the e commerce and the mobile technology. It is seen that in the modern generation these two are one of the hottest topics that helps the business to develop and progress (Bosomworth, 2015). The people in the world are getting more and more attracted towards the technologies. With the introduction of these technologies the organisation can have a greater number of customer base and increase the popularity of the organisation. The social media also helps in the promotion and increasing of the customer base. This is because of the factor that the people are more and more getting attracted towards the mobile phones and are always connected to the outside world though the mobile and hence never miss to notice of the organisation.
The organisation also needs to set up the backend office in such a way that there are mainframe computer and the microcomputer. The microcomputer looking and taking care of the task like the financing systems, HR systems and the other works where as the main frame computer taking the controls of all the computers. Main frame computers are type of the systems that can handle more than 100 users a particular time. There are specially designed operating systems and can do parallel computing tasks. The best OS that the organisation use for this task is the Linux operating system (Bornstein, Krusell & Rebelo, 2017). The main frame computers can do many tasks simultaneously like the host processing, backend processing and front-end processing. Where as the micro computer are the personal systems that the employees use for daily work in the office.
Security of data is one of the major side which is needed to be looked after by the organisation. With the advance technology there comes the chances of getting hacked by foul players. The organisation needs to keep up to the security systems with the modern days. The organisation should always be ready of any attack (Cooper, 2015). Cyber security analysis is one of the key tasks that is to be done by the organisation is ordering to get proper benefit of the technology. Some of the common attacks that the organisation may face in the future are: –
- Phishing Attacks: – Phasing attack is one of the major and common attack that any organisation faces (Chiew, Yong & Tan, 2018). It arises when an attacker acts as a trusted entity, dupes a victim into opening an email or any other file in order to inject files to hamper the systems.
- SQL Injection Attacks (SQLi): SQL injection a type of a code injection method, which used to attack data-driven software’s, in which reprehensible SQL statements are inserted into an entry field for execution and when the execution occurs it hampers the entire system.
- Cross-Site Scripting (XSS): This somewhat same of the SQL injection, the basic difference is that in this case infected code are injected using the scripts in the websites for the attacks. This can affect if there is any transaction going on in the organisation website.
- Man-in-the-Middle (MITM) Attacks: A man-in-the-middle outbreak is a type of cyberattack in which some foul player enclosures him/herself into a discussion between two parties, impersonates both parties and gains access to information that the two parties were trying to send to each other
- Malware Attacks: These are very common type of attacks where there is some malware software which enters the system of any organisation and does affect the organisation work procedure or collects data from the organisation without any permission.
- Denial-of-Service Attacks: This is one of the major attacks many organisations are facing in the recent days, also known as the DDOS attack (Yan, et al., 2016). Under this certain malware blocks the entire system and does not let the user do anything in the system.
The organisation also needs to reskill the number of the employees and introduce them with the new technologies that the organisation is implementing in the systems. The re-skilling needs to be done mainly in the IT and the Finance department as they will require the new services in a daily basis. The HR department must need to tech every new employee the new technologies in order to sustain in the organisation (Osei-Kyei, Chan & Ameyaw, 2017). The organisation also needs to give proper training to the staffs about the cyber security thefts and other crimes so that there are minimal chances of any such action.
Implementation of IoT
While implementing the new technology the organisation has to invest a huge amount of money in the modern-day technologies which the organisation might not be sure whether it will work or not. There are also other few other kinds of risk that the organisation must face in while the entire process of shifting.
Critical success factor can be defined the management term for an element that is necessary for an organization or project to achieve its mission A CSF is a critical factor or activity required for ensuring the success of a company or an organization. Currrently as the organising is going down in the list needs to set a primary success and try to achieve the same in order to be the in the top again. A critical success factor is measured in terms of the KPI’s.
Conclusion:
Thus, concluding the topic it can be said that in order to make the entire structure of the changes in the organisation, the leaders needs to invest a huge amount of money. It can be said that after the technical changes made the function of the organisation will be more efficient in functioning. The organisation also needs to hire new and young employees who knows the better use of the technology. Supposing it is hard for a man who is using a technique for years to change the work in new process, but a young man can learn the same in hours. In order to enhance the work flow of the organisation the leaders also need to ensure that the employees know the technology properly. This is also to be made sure that there is proper maintenance of the system periodically. If the system is not properly maintained it may happen that after certain interval of time the machines stops working. Also, the organisation heads must keep in mind that one-time investment is not enough, and the organisation needs to update the technologies, periodically to get the best benefits. Also, the organisation must always use authenticated software and operating systems to get the most of it. The departments must always make sure that in case of issue with the technologies must always contact the admin for better understanding of the topic. In order to gain maximum success this change is necessary for the organisation.
References
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107.
Benes, J., Chauvet, M., Kamenik, O., Kumhof, M., Laxton, D., Mursula, S., & Selody, J. (2015). The future of oil: Geology versus technology. International Journal of Forecasting, 31(1), 207-221.
Bornstein, G., Krusell, P., & Rebelo, S. (2017). Lags, costs, and shocks: An equilibrium model of the oil industry (No. w23423). National Bureau of Economic Research.
Bosomworth, D. (2015). Mobile marketing statistics 2015. Leeds: Smart Insights (Marketing Intelligence) Ltd.
Chiew, K. L., Yong, K. S. C., & Tan, C. L. (2018). A Survey of Phishing Attacks: Their Types, Vectors and Technical Approaches. Expert Systems with Applications.
Cooper, D. L. (2015, October). Data security: data breaches. In Proceedings of the 2015 Information Security Curriculum Development Conference (p. 13). ACM.
Croughan, M. S., Konstantinov, K. B., & Cooney, C. (2015). The future of industrial bioprocessing: Batch or continuous?. Biotechnology and bioengineering, 112(4), 648-651.
Eckert, M., Meyer, D., Haase, J., & Klauer, B. (2016). Operating system concepts for reconfigurable computing: review and survey. International Journal of Reconfigurable Computing, 2016.
Hartemo, M. (2016). Email marketing in the era of the empowered consumer. Journal of Research in Interactive Marketing, 10(3), 212-230.
Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. (2015). The rise of “big data” on cloud computing: Review and open research issues. Information Systems, 47, 98-115.
Khalil, I. M., Khreishah, A., & Azeem, M. (2014). Cloud computing security: A survey. Computers, 3(1), 1-35.
Lee, I., & Lee, K. (2015). The Internet of Things (IoT): Applications, investments, and challenges for enterprises. Business Horizons, 58(4), 431-440.
Osei-Kyei, R., Chan, A. P., & Ameyaw, E. E. (2017). A fuzzy synthetic evaluation analysis of operational management critical success factors for public-private partnership infrastructure projects. Benchmarking: An International Journal, 24(7), 2092-2112.
Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud computing: implementation, management, and security. CRC press.
Silberschatz, A., Galvin, P. B., & Gagne, G. (2014). Operating system concepts essentials. John Wiley & Sons, Inc..
Silberschatz, A., Galvin, P. B., & Gagne, G. (2014). Operating system concepts essentials. John Wiley & Sons, Inc..
Wang, K., Blackburn, S. M., Hosking, A. L., & Norrish, M. (2018, March). Hop, Skip, & Jump: Practical On-Stack Replacement for a Cross-Platform Language-Neutral VM. In Proceedings of the 14th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments(pp. 1-16). ACM.
Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., & Vasilakos, A. V. (2014). Security and privacy for storage and computation in cloud computing. Information Sciences, 258, 371-386.
Yan, Q., Yu, F. R., Gong, Q., & Li, J. (2016). Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: A survey, some research issues, and challenges. IEEE Communications Surveys & Tutorials, 18(1), 602-622.
Zhao, F., Li, C., & Liu, C. F. (2014, February). A cloud computing security solution based on fully homomorphic encryption. In Advanced Communication Technology (ICACT), 2014 16th International Conference on (pp. 485-488). IEEE.