Study QuestionsQ1: Why is the cloud the future for most organizations?. Q6: How can organizations use cloud services securely?. • Alliance transitioned data storage and processing from o
Trang 1The Cloud
Chapter 6
Trang 2“How About $10 Per Terabyte.”
• Lease storage capacity from third party
• All incoming data from drones automatically uploaded
• Average monthly storage costs cut at least 50%
• Power savings, backup time saved, no new hardware
configuration
• One-time set up and development costs
Trang 3Study Questions
Q1: Why is the cloud the future for most organizations?
Q2: What network technology supports the cloud?
Q3: How does the cloud work?
Q4: How do organizations use the cloud?
Q5: How can Falcon Security use the cloud?
Q6: How can organizations use cloud services securely?
Q7: 2026?
Trang 4Q1: Why Is the Cloud the Future for Most
Organizations?
• The Cloud
– Elastic leasing of pooled computer resources via Internet.
– Elastic
Automatically adjusts for unpredictable demand,
Limits financial risks.
– Pooled
Same physical hardware
Economies of scale
Trang 5Example of a Video Banner Ad Customer
Trang 6• Economies of scale
farms)
Trang 8Why Is the Cloud Preferred to In-House Hosting?
Trang 9Why Is the Cloud Preferred to In-House Hosting? (cont'd)
Trang 11When Does the Cloud Not Make Sense?
• When law or standard industry practice require physical control
or possession of the data
–Financial institutions legally required to maintain physical
control over its data
Trang 12Ethics Guide: Cloudy Profit?
• Data broker (or data aggregator)
• Acquiring and analyzing market, buyer, and seller data for real estate agents
• Alliance transitioned data storage and processing from own
Web farm to the cloud
• Improved speed and quality of data services at fraction of prior costs, cut in-house hardware support staff by 65%
Trang 13Q2: What Network Technology Supports the
Cloud?
Trang 14Typical Small
Office/Home
Office
(SOHO) LAN
Trang 15LAN Protocol
• IEEE 802.3
– Wired LAN– 10/100/1000 Mbps
–Transmits data short distances
–Connect computer, keyboard, mouse, printer, smartphones, smartwatches, automobiles, sports equipment, clothing
Trang 16Abbreviations Used for Communications and
Computer Memory Speeds
• Communications equipment,
• K(ilo) = 1,000, not 1,024 (as for memory);
• M(ega) = 1,000,000, not 1,024 × 1,024;
• G(iga) = 1,000,000,000, not 1,024 × 1,024 × 1,024
• Communications speeds expressed in bits, memory sizes in
bytes.
Trang 17Connecting Your LAN to the Internet
Important ISP functions:
1.Provide legitimate Internet address
2 Provide gateway to Internet
3.Pay access fees and other charges to telecoms
• WAN wireless average performance 1 Mbps, with peaks of up
to 3.0 Mbps
• Typical wireless LAN 50 Mbps
Trang 18Summary of LAN Networks
Trang 19Q3: How Does the Cloud Work?
The cloud resides in the Internet
Trang 20Carriers and Net Neutrality
• Messages, broken into packets
• Packets move across Internet, passing through networks owned
by telecom carriers.
• Peering agreements - Carriers freely exchange traffic amongst
themselves without paying access fees
• Net neutrality principle
– All data treated equally.
Trang 21Internet Addressing
• Public IP addresses
– Identifies a unique device on Internet.
– Assigned by ICANN (Internet Corporation for Assigned Names
and Numbers.
• Private IP addresses
– Identifies a device on a private network, usually a LAN.
– Assignment LAN controlled.
Trang 22IP Addressing: Major Benefits
Trang 23Public IP Addresses and Domain Names
• IPv4
– 165.193.123.253
• Domain name
– Unique name affiliated with a public IP address.
– Dynamic affiliation of domain names with IP addresses.
– Multiple domain names for same IP address
•URL (Uniform Resource Locator
Trang 24Domain Registry Company
Trang 25Processing on a Web Server
What happens when
you visit a Web site
and order something,
and pay for it?
Trang 26Three-tier Architecture
Trang 27Watch the Three Tiers in Action! Sample of
Commerce Server Page
1 Commerce server requests shoe data from DBMS
2 DBMS reads from database, returns data to
commerce server
3 Commerce server formats Web page with data and
sends html version of page to user’s computer.
4 Customer places items in shopping cart.
5 Customer checks out, commerce server program
processes payment, schedules inventory processing, arranges shipping, email receipt to
Trang 28SOA Analogy: Approval Request Interactions
Among Three Departments
• CheckCustomerCredit
• ApproveCustomerCredit
• VerifyInventoryAmount
• AllocateInventory
Trang 29Using SOA Principles, Each Department Defines:
• Each department formally states data to receive with request and data
promised to return in response.
Trang 30Using SOA Principles: Encapsulation
• No department needs to know who works in another
department, or how dept accomplishes work
• Each department free to change personnel task assignments, change processes for performing services
• Falcon Security could dynamically create 1,000 Inventory
Departments and Sales Department with no need to change
anything it does
Trang 31SOA Principles Applied to Three-tier Architecture
Trang 32Protocols Supporting Web Services
Trang 33WSDL, SOAP, XML, and JSON
WSDL (Web Services
Description Language) Standard for describing services, inputs, outputs, other data supported by a Web service Documents coded machine readable and used by developer
tools for creating programs to access the service.
Trang 34Example XML and JSON Documents
Trang 35Q4: How Do Organizations Use the Cloud?
Three Fundamental Cloud Types
Cloud
Services
from Cloud
Vendors
Trang 36Content Delivery Networks from Cloud Vendors
• Content delivery network (CDN)
– Stores user data in many different geographical locations
and makes data available on demand
– Specialized type of PaaS, but usually considered in its own category
– Minimizes latency.
Trang 37CDN Benefits
Trang 38Servers Used in a Typical CDN Service
Trang 39Using Web Services Internally
Private
Internet
Infrastructure
Trang 40Q5: How Can Falcon Security Use the Cloud?
• SaaS products Falcon Security could use
Trang 41PaaS Services from Amazon DBMS Products with Elastic Cloud 2 (EC2)
• Falcon Security could use CDN to distribute content worldwide
Trang 42IaaS Services at Falcon Security
• Provides basic hardware in the cloud
• May acquire servers to load operating systems
• Considerable technical expertise and management
• Alternative: Use elastic data storage services
• SaaS and PaaS provide more added value to Falcon Security
Trang 43Q6: How Can Organizations Use Cloud Services
Securely?
Remote Access Using VPN: Actual Connections
Trang 44Remote Access Using VPN: Apparent Connection
Trang 45Private Cloud for Inventory and Other Applications
Trang 46Accessing Private Cloud over a Virtual Private
Network
Trang 47Using A Virtual Private Cloud
Subset of a Public Cloud With Highly Restricted, Secure Access
Trang 48Q7: 2026
• Cloud services faster, more secure, easier to use, cheaper
• Fewer organizations own their computing infrastructure
• More pooling of servers across organizations
• Overall size of the cloud gets bigger
• Individuals, small businesses, large organizations obtain elastic resources at very low cost
• Cloud fosters new categories of work
Trang 49– Provide services in dangerous locations.
Reduces value of local mediocrity
Trang 50So What? "Net Neutrality Enabled"
• ISPs little control over amount, type, or origin of content
• 30% of U.S Internet traffic during peak hours associated with
using Netflix
• Net neutrality
– All users and content providers treated equally.
– No “fast” or “slow” lanes.
– ISPs not allowed to block, or slow, content associated with competitors – ISPs can’t charge heavy Internet users additional fees or taxes
Trang 51FCC Approved New Regulations (2015)
• Renders Internet a utility
• Complaint: Interfering with free markets
– ISPs argue loss of potential revenue stream inhibits
infrastructure development, limits growth, and stifles
innovation
• Larger war on net neutrality may have only just begun!
Trang 52Security Guide: From Anthem to Anathema
• Greater accessibility data more accessible to hackers
80 million customers affected
Trang 53Guide: Is It Spying or Just Good Management?
• 92% of employers monitor employees’ email, telephone, and Internet use
– Preserves free speech regarding laws Congress may enact, limited
protection for federal employees.
Trang 54Active Review
Q1: Why is the cloud the future for most organizations?
Q2: What network technology supports the cloud?
Q3: How does the cloud work?
Q4: How do organizations use the cloud?
Q5: How can Falcon Security use the cloud?
Q6: How can organizations use cloud services securely?
Q7: 2026?
Trang 55Case Study 6: FinQloud Forever … Well, At Least For The Required Interval …
• Securities and Exchange Commission (1937)
• Securities brokers' records must be stored on media that cannot
be altered
• Interpreted to enable storage of records on read-write medium, provided it includes software to prohibit data alteration (2003)
Trang 56Components of the FinQloud System
Trang 57FinQloud Forever … (cont'd)
• Creates “finger print” based on content of record
• SEC specifically excludes extrinsic controls:
– Believes such systems to could be readily misused to
overwrite records
• When properly configured, meets requirements of SEC’s
Rule17a-3) and similar rules of Commodities Futures Trading