Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!
loader
Add File

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!

ITC540 IT Infrastructure Management PG

tag 0 Download 0 Pages / 0 Words tag 21-06-2022
  • Course Code: ITC540
  • University: Charles Sturt University
    icon

    MyAssignmentHelp.com is not sponsored or endorsed by this college or university

  • Country: Australia

Answers:

Introduction

There are several organizations that work in the area of web services, web development and web solutions. One of such Australian organization is Kentico that works in the area of online marketing along with e-commerce on the web development and services side of the same. The information that is associated with the processes and activities that take place in terms of business at Kentico is huge. Traditional databases that are deployed at the organization are not competent enough to meet the needs of Kentico and it has therefore been proposed that cloud databases along with NoSQL databases shall be deployed in all the locations for enhanced data management.  

SWOT Analysis

SWOT Template

Organization: Kentico                                                               Date: 10/05/2017

 

Description of current/new ICT service: Traditional databases that are deployed at the organization are not competent enough to meet the needs of Kentico and it has therefore been proposed that cloud databases along with NoSQL databases shall be deployed in all the locations for enhanced data management. 

Strenght

The current systems that are deployed at Kentico have the ability to be scaled up or down. These systems will be easily synced in with the new database

Administration and management that is associated with Kentico is skilled, efficient and lays focus on the planning and analysis phases.

Security is one of the prime concerns and research areas that is followed in the organization and therefore measures will be taken to make sure that there are no security violations

The organization is already working in the area of web development and web services and is well versed with the related details and nature of operations. There will be technical skills available to implement the new database

Finance team that is engaged with the organization is efficient to design a budget that would fit in the needs and would lead to cost savings in the long run

Weaknessess

In case of a migration from an existing system to a new system, there ought to be bundle of changes that come along with it. The case will be the same with the implementation of advanced databases which may make the employees resistant towards accepting these changes and working accordingly

Training costs will be spent on the employees to allow them to gain an understanding of the new form of databases to ensure that the functionalities and features are well understood

There are certain areas in cloud/NoSQL databases that may be completely new for all of the employees which would demand a specialist or an expert to allow other to develop an understanding on the same. External hiring would be required in this case which would involve a lot of cost as well

Cloud is exposed to many risks and attacks in terms of security which will get introduced in case of Kentico (Hashizume, Rosado, Fernández-Medina, & Fernandez, 2013).

The frequency of the system downtime will increase during the process of migration which may impact the regular working of the organization   

The speed of operations will improve which will lead to the faster production units and the overall

productivity will show marked improvements

The profits and revenues that will be earned by the organization with the implementation of cloud/NoSQL databases will be high as these databases are as per the norms of latest technology that fulfills the demands of the users in the present times

The skills associated with these databases are in demand in the market and therefore the employees of the organization implementing these databases will have the opportunity to enhance their job profiles

Management of the data and information along with its tracking and reporting will become easy which will automatically streamline the rest of the processes

A lot of time is wasted in traditional databases in handling and managing the data. However, the case will be different with cloud and NoSQL databases as time will be saved which may be used in other activities.

Threats

The databases that will be installed will have the information of the entire organization along with its projects, clients and a lot more. There will be several access points which may lead to breaching of the information (Jansen, 2016).

Malware such as ransomware, viruses, worms, logic bombs, Trojan horses etc. may affect the database and associated information

Information may get lost as it may be captured during transition or there may also be leakage of the information to the unauthorized entities

Man in the middle attacks along with other network security attacks may impact the database (Pearson & Benameur, 2016).

Denial of service and other flooding attacks may also be executed that may have a worse impact on the availability of the system (Kshetri, 2016)

There will be several user roles that will be defined for the database and these user roles will include varied accesses and privileges. The admin account will have all the privileges followed by the rest of the employees engaged with the organization. Some of these employees may take advantage of these special rights and may transfer the information to malevolent entities or may violate the authentication and privacy principles

Inefficient back up and data recovery options associated with the database may not be installed and set up accurately. In such a case, there will be huge loss to the data and information present in the database as there might be occurrences of violation of security of the database

Summary and Recommendations:

Short Term (Now)

There will be a few actions and steps that will be required to be taken and executed at an immediate basis. The first step will include the development of a training plan for the employees listing the types of trainings that will be covered along with the training schedule and the details of the trainer. The training plan will be required to be executed and brought in effect with immediate action.

Mid Term (next 12 months)

There will also be mid-term plans and steps that will be necessary to be taken which will include the security analysis of the database along with the development and implementation of a disaster recovery plan for backing up of data. Also, the incorporation of the Business Intelligence (BI) techniques will be necessary to be done such as data warehousing, data analytics along with data mining.

Long Term (next 3 to 5 years)

Databases are an integral part of the organization and the case is the same with Kentico. It will be necessary for the organization to run cycles of maintenance and updates at regular intervals. There will also be a lot of done that shall be done in the area of database security. There is a lot of development that is being done in the field of security architecture associated with the databases which will be required to be analyzed and implemented. It will also be necessary to carry out the processes of quality control and quality assurance to make sure that adherence to the quality standards is being followed and maintained (Ryan, 2016).


Abstract

Cloud databases and their demand in the market are on an all time rise. It is because of the reason that the physical storage space is limited and there is no limit to store data on a virtual space. There are also several advantages that are offered along with these databases in terms of speed of operations along with scalability and flexibility. The research paper covers the definition and details of the cloud databases along with the database operations that can be executed on it. There are also certain security risks that are associated with these databases that have been covered along with the steps to security.

Cloud Database and Database Operations

Database Systems are defined as the information systems that are designed for data storage, data handling and its management. There are several database engines that have been developed and are being used by the users all across the globe. With the change and transformation in technology, there has been a shift in the use of traditional databases and the world is now moving to virtualization and virtual software. Cloud databases are the databases that do not have a physical existence and are present in the cloud for every single data related operation. NoSQL databases are the ones that are free from the use or involvement of SQL queries and statements and carry out data operations through other mechanisms.

Cloud and NoSQL databases have the capability to perform numerous data related operations. The usual operations on the databases such as storage of data, addition and deletion of data, modification, searching and sorting of data can be easily performed. There are also some of the advanced features that are provided and included in these databases (Takabi, 2016). Reporting is one of the useful features of many of the NoSQL databases along with the cloud databases which allow the users to extract the custom reports. These reports may comprise of data patterns and statistics which is retrieved upon the application of data analytics and several other operations.

Data Mining over Cloud

There are various technologies that are used and applied in the cloud databases. These technologies allow the enhancement of the data operations that are carried out on the cloud. Business Intelligence and the technologies that come under it are used in case of cloud and NoSQL databases to strengthen the data operations.

Data warehouses along with the logical data warehouses are applicable in case of cloud databases. There are clusters and massive information sets that are stored in the cloud databases. It is not possible to have a track of each of the data set or to review each and every set of the data. Logical data warehouses provide the database administrators and other entities with the logical view of the data rather than a physical model of the same.

Similarly, relevant information can be extracted from the data sets that are present in the cloud databases. These information and data sets cannot be reviewed or analyzed through manual processes. Data mining and data analytics can be applied to the data sets to retrieve important patterns and statistics that is associated with the data.

Security Risks To The Cloud Databases

Cloud computing is associated with many of the security risks and attacks. These risks fall in to various types and may impact the properties of the information such as its privacy or confidentiality. The impact that may result out from these risks can be varied depending upon the type of information that is attacks or hampered.

The databases that will be installed will have the information of the entire organization along with its projects, clients and a lot more. There will be several access points which may lead to breaching of the information. Malware such as ransomware, viruses, worms, logic bombs, Trojan horses etc. may affect the database and associated information. Information may get lost as it may be captured during transition or there may also be leakage of the information to the unauthorized entities. Man in the middle attacks along with other network security attacks may impact the database. Denial of service and other flooding attacks may also be executed that may have a worse impact on the availability of the system. There will be several user roles that will be defined for the database and these user roles will include varied accesses and privileges. The admin account will have all the privileges followed by the rest of the employees engaged with the organization. Some of these employees may take advantage of these special rights and may transfer the information to malevolent entities or may violate the authentication and privacy principles. Inefficient back up and data recovery options associated with the database may not be installed and set up accurately. In such a case, there will be huge loss to the data and information present in the database as there might be occurrences of violation of security of the database

Steps To Security

It is necessary to control and deal with the security risks that are associated with the cloud databases. These risks can be handled with the application and execution of a number of security steps which are listed and described below (Sen, 2016).

Administrative controls and steps play an important role in the area of data security. Management and administration engaged with the organization shall make sure that there are proper evaluation methods that shall be carried out to put a check on the violation of any of the security protocols. There shall also be timely reviews and audits that shall be executed along with enhancement of the policies and codes of conduct.

Another form of step that will play an important role in case of cloud databases and its security will be technical and logical steps and measures. These will comprise of the application of technical tools and algorithms to prevent the attacks from taking place and also the timely detection of the attacks. Some of the tools include anti-denial tools, Intrusion Detection systems, Intrusion Prevention Systems, anti-malware tools and likewise (Sun, Zhang, Xiong, & Zhu, 2014).

Physical security and the steps to analyze the current trends in database security are also essential. Technology is advancing with each passing second. It is necessary for the organizations to have a view of the latest measures that may be taken and the future trends that are involved. Therefore, a check on the security policies and the strategies that may be applied shall be done on a regular basis.

Conclusion

Cloud databases are the databases that do not have a physical existence and are present in the cloud for every single data related operation. NoSQL databases are the ones that are free from the use or involvement of SQL queries and statements and carry out data operations through other mechanisms. There are several advantages and opportunities that open up with the implementation of these databases in the organization. The speed of operations will improve which will lead to the faster production units and the overall productivity will show marked improvements. The profits and revenues that will be earned by the organization with the implementation of cloud/NoSQL databases will be high as these databases are as per the norms of latest technology that fulfills the demands of the users in the present times. The skills associated with these databases are in demand in the market and therefore the employees of the organization implementing these databases will have the opportunity to enhance their job profiles. Management of the data and information along with its tracking and reporting will become easy which will automatically streamline the rest of the processes. A lot of time is wasted in traditional databases in handling and managing the data. However, the case will be different with cloud and NoSQL databases as time will be saved which may be used in other activities. There are various technologies that are used and applied in the cloud databases. These technologies allow the enhancement of the data operations that are carried out on the cloud. Business Intelligence and the technologies that come under it are used in case of cloud and NoSQL databases to strengthen the data operations. It is necessary to control and deal with the security risks that are associated with the cloud databases. These risks can be handled with the application and execution of a number of security steps such as administrative checks, technical controls and physical security checks.

Part C

a) Are any of the bold, coloured text matches in my self-check report missing in-text references?  (We need to avoid plagiarism of ideas.) - No
 
b)  Do any of the bold, coloured text matches in my self-check report include more than three words in a row copied from the original source without quotation marks?  (We need to avoid plagiarism of language.) - No
 
c) Do direct quotations take up more than 10% of the essay? (We need to change some of the direct quotations to summaries and paraphrases so that at least 90% of every essay is written in our own words.) - No
 
d) Are any of the bold, coloured text matches in my originality report purely coincidental?  (Sometimes our words coincidentally match with words in other online sources that we have never seen before and that are completely irrelevant to our research topic.  If so, we do not need to change anything at all.) – Yes, full form
 
e)  Do any of the short strings of matching text indicate that my attempts at paraphrasing were not completely successful?  (We need to avoid sham paraphrasing, one type of plagiarism, by using synonyms and changing the sentence structures completely. Remember that we should not copy more than three words in a row from the original without quotation marks.) -No
 
f) Have I synthesised all of the sources’ ideas into my essay by introducing each piece of source information with a signal phrase and by adding my own comments or interpretation to it in the following sentence?  (We need to avoid dropped-in quotations and simply reporting facts or other people’s ideas because that approach means that instead of building our own arguments and writing our own essays, we are merely stringing together other people’s words and ideas.) - Yes

References

Hashizume, K., Rosado, D., Fernández-Medina, E., & Fernandez, E. (2013). An analysis of security issues for cloud computing. J Internet Serv Appl, 4(1), 5. http://dx.doi.org/10.1186/1869-0238-4-5

Jansen, W. (2016). Cloud Hooks: Security and Privacy Issues in Cloud Computing. Retrieved 10 May 2017, from https://www.computer.org/csdl/proceedings/hicss/2011/4282/00/10-03-01.pdf

Kshetri, N. (2016). Privacy and security issues in cloud computing: The role of institutions and institutional evolution. Sciencedirect.com. Retrieved 10 May 2017, from http://www.sciencedirect.com/science/article/pii/S0308596112000717

Pearson, S. & Benameur, A. (2016). Privacy, Security and Trust Issues Arising from Cloud Computing. Retrieved 10 May 2017, from http://barbie.uta.edu/~hdfeng/CloudComputing/cc/cc05.pdf

Ryan, M. (2016). Cloud Computing Privacy Concerns on Our Doorstep.Cacm.acm.org. Retrieved 10 May 2017, from http://cacm.acm.org/magazines/2011/1/103200-cloud-computing-privacy-concerns-on-our-doorstep/fulltext

Sen, J. (2016). Security and Privacy Issues in Cloud Computing. Retrieved 10 May 2017, from https://arxiv.org/ftp/arxiv/papers/1303/1303.4814.pdf

Sun, Y., Zhang, J., Xiong, Y., & Zhu, G. (2014). Data Security and Privacy in Cloud Computing. International Journal Of Distributed Sensor Networks, 2014, 1-9. http://dx.doi.org/10.1155/2014/190903

Takabi, H. (2016). Security and Privacy Challenges in Cloud Computing Environments. Retrieved 10 May 2017, from http://csis.pace.edu/~marchese/SE765/Paper/security2.pdf

Download Sample Now

Earn back the money you have spent on the downloaded sample by uploading a unique assignment/study material/research material you have. After we assess the authenticity of the uploaded content, you will get 100% money back in your wallet within 7 days.

Upload
Unique Document

Document
Under Evaluation

Get Money
into Your Wallet

Total 0 pages

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2022). IT Infrastructure Management PG. Retrieved from https://myassignmenthelp.com/free-samples/itc540-it-infrastructure-management/cloud-database-and-database-operation.html.

My Assignment Help (2022) IT Infrastructure Management PG [Online]. Available from: https://myassignmenthelp.com/free-samples/itc540-it-infrastructure-management/cloud-database-and-database-operation.html
[Accessed 02 October 2022].

My Assignment Help. 'IT Infrastructure Management PG' (My Assignment Help, 2022) <https://myassignmenthelp.com/free-samples/itc540-it-infrastructure-management/cloud-database-and-database-operation.html> accessed 02 October 2022.

My Assignment Help. IT Infrastructure Management PG [Internet]. My Assignment Help. 2022 [cited 02 October 2022]. Available from: https://myassignmenthelp.com/free-samples/itc540-it-infrastructure-management/cloud-database-and-database-operation.html.


Stuck on Any Question

Our best expert will help you with the answer of your question with best explanation.

question
We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

loader
250 words
Error goes here

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

We Can Help!

Get top notch assistance from our best tutors !
Excel in your academics & career in one easy click!

icon

Other Samples

Content Removal Request

If you are the original writer of this content and no longer wish to have your work published on Myassignmenthelp.com then please raise the content removal request.

icon

5% Cashback

On APP - grab it while it lasts!

Download app now (or) Scan the QR code

*Offer eligible for first 3 orders ordered through app!

screener
ribbon
callback request mobile
Have any Query?