What Is Cloud Computing

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 17

WHAT IS CLOUD COMPUTING?

Cloud computing is a general term for anything that involves delivering hosted services over the
internet. These services are divided into three main categories or types of cloud computing:
infrastructure as a service (IaaS), platform as a service (PaaS) and software as a service (SaaS).
A cloud can be private or public. A public cloud sells services to anyone on the internet. A
private cloud is a proprietary network or a data center that supplies hosted services to a limited
number of people, with certain access and permissions settings. Private or public, the goal of
cloud computing is to provide easy, scalable access to computing resources and IT services.
Cloud infrastructure involves the hardware and software components required for proper
implementation of a cloud computing model. Cloud computing can also be thought of as utility
computing or on-demand computing.

An internet network connection links the front end, which includes the accessing client device,
browser, network and cloud software applications, with the back end, which consists of
databases, servers and computers. The back end functions as a repository, storing data that is
accessed by the front end. Communications between the front and back ends are managed by a
central server. The central server relies on protocols to facilitate the exchange of data. The
central server uses both software and middleware to manage connectivity between different
client devices and cloud servers. Typically, there is a dedicated server for each individual
application or workload. Cloud computing relies heavily on virtualization and automation
technologies. Virtualization enables the easy abstraction and provisioning of services and
underlying cloud systems into logical entities that users can request and utilize. Automation and
accompanying orchestration capabilities provide users with a high degree of self-service to
provision resources, connect services and deploy workloads without direct intervention from the
cloud provider's IT staff.

What are the different types of cloud computing services?


Cloud computing can be separated into three general service delivery categories or forms of
cloud computing:
1. IaaS. IaaS providers, such as Amazon Web Services (AWS), supply a virtual server
instance and storage, as well as application programming interfaces (APIs) that let users
migrate workloads to a virtual machine (VM). Users have an allocated storage capacity
and can start, stop, access and configure the VM and storage as desired. IaaS providers
offer small, medium, large, extra-large, and memory- or compute-optimized instances, in
addition to enabling customization of instances, for various workload needs. The IaaS
cloud model is closest to a remote data center for business users.

2. PaaS. In the PaaS model, cloud providers host development tools on their infrastructures.
Users access these tools over the internet using APIs, web portals or gateway software.
PaaS is used for general software development, and many PaaS providers host the
software after it's developed. Common PaaS products include Salesforce's Lightning
Platform, AWS Elastic Beanstalk and Google App Engine.

3. SaaS. SaaS is a distribution model that delivers software applications over the internet;
these applications are often called web services. Users can access SaaS applications and
services from any location using a computer or mobile device that has internet access. In
the SaaS model, users gain access to application software and databases. One common
example of a SaaS application is Microsoft 365 for productivity and email services.

Characteristics and advantages of cloud computing


Cloud computing has been around for several decades now, and today's cloud computing
infrastructure demonstrates an array of characteristics that have brought meaningful benefits for
businesses of all sizes. Some of the main characteristics of cloud computing are the following:
 Self-service provisioning. End users can spin up compute resources for almost any type
of workload on demand. An end user can provision computing capabilities, such as server
time and network storage, eliminating the traditional need for IT administrators to
provision and manage compute resources.
 Elasticity. Companies can freely scale up as computing needs increase and scale down
again as demands decrease. This eliminates the need for massive investments in local
infrastructure, which might or might not remain active.
 Pay per use. Compute resources are measured at a granular level, enabling users to pay
only for the resources and workloads they use.
 Workload resilience. CSPs often implement redundant resources to ensure resilient
storage and to keep users' important workloads running -- often across multiple global
regions.
 Migration flexibility. Organizations can move certain workloads to or from the cloud --
or to different cloud platforms -- as desired or automatically for better cost savings or to
use new services as they emerge.
 Broad network access. A user can access cloud data or upload data to the cloud from
anywhere with an internet connection using any device.
 Multi-tenancy and resource pooling. Multi-tenancy lets numerous customers share the
same physical infrastructures or the same applications yet still retain privacy and security
over their own data. With resource pooling, cloud providers service numerous customers
from the same physical resources. The resource pools of the cloud providers should be
large and flexible enough so they can service the requirements of multiple customers.

An
overview of cloud features and characteristics
These characteristics support a variety of important benefits for modern business, including the
following:
 Cost management. Using cloud infrastructure can reduce capital costs, as organizations
don't have to spend massive amounts of money buying and maintaining equipment. This
reduces their capital expenditure costs -- as they don't have to invest in hardware,
facilities, utilities or building large data centers to accommodate their growing
businesses. Additionally, companies don't need large IT teams to handle cloud data center
operations because they can rely on the expertise of their cloud providers' teams. Cloud
computing also cuts costs related to downtime. Since downtime rarely happens in cloud
computing, companies don't have to spend time and money to fix any issues that might be
related to downtime.
 Data and workload mobility. Storing information in the cloud means that users can
access it from anywhere with any device with just an internet connection. That means
users don't have to carry around USB drives, an external hard drive or multiple CDs to
access their data. Users can access corporate data via smartphones and other mobile
devices, enabling remote employees to stay up to date with co-workers and customers.
End users can easily process, store, retrieve and recover resources in the cloud. In
addition, cloud vendors provide all the upgrades and updates automatically, saving time
and effort.
 Business continuity and disaster recovery (BCDR). All organizations worry about data
loss. Storing data in the cloud guarantees that users can always access their data even if
their devices, e.g., laptops or smartphones, are inoperable. With cloud-based services,
organizations can quickly recover their data in the event of emergencies, such as natural
disasters or power outages. This benefits BCDR and helps ensure that workloads and data
are available even if the business suffers damage or disruption.
What are the disadvantages of cloud computing?
Despite the clear upsides to relying on cloud services, cloud computing carries its own
challenges for IT professionals:
 Cloud security. Security is often considered the greatest challenge facing cloud
computing. When relying on the cloud, organizations risk data breaches, hacking of APIs
and interfaces, compromised credentials and authentication issues. Furthermore, there is a
lack of transparency regarding how and where sensitive information entrusted to the
cloud provider is handled. Security demands careful attention to cloud configurations and
business policy and practice.
 Cost unpredictability. Pay-as-you-go subscription plans for cloud use, along with
scaling resources to accommodate fluctuating workload demands, can make it tough to
define and predict final costs. Cloud costs are also frequently interdependent, with one
cloud service often utilizing one or more other cloud services -- all of which appear in the
recurring monthly bill. This can create additional unplanned cloud costs.
 Lack of capability and expertise. With cloud-supporting technologies rapidly
advancing, organizations are struggling to keep up with the growing demand for tools
and employees with the proper skill sets and knowledge needed to architect, deploy, and
manage workloads and data in a cloud.
 IT governance. The emphasis on do-it-yourself capability in cloud computing can make
IT governance difficult, as there is no control over provisioning, deprovisioning and
management of infrastructure operations. This can make it challenging to properly
manage risks and security, IT compliance and data quality.
 Compliance with industry laws. When transferring data from on-premises local storage
into cloud storage, it can be difficult to manage compliance with industry regulations
through a third party. It's important to know where data and workloads are actually
hosted in order to maintain regulatory compliance and proper business governance.
 Management of multiple clouds. Every cloud is different, so multi-cloud deployments
can disjoint efforts to address more general cloud computing challenges.
 Cloud performance. Performance -- such as latency -- is largely beyond the control of
the organization contracting cloud services with a provider. Network and provider
outages can interfere with productivity and disrupt business processes if organizations are
not prepared with contingency plans.
 Building a private cloud. Architecting, building and managing private clouds -- whether
for its own purpose or for a hybrid cloud goal -- can be a daunting task for IT
departments and staff.
 Cloud migration. The process of moving applications and other data to the cloud often
causes complications. Migration projects frequently take longer than anticipated and go
over budget. The issue of workload and data repatriation -- moving from the cloud back
to a local data center -- is often overlooked until unforeseen cost or performance
problems arise.
 Vendor lock-in. Often, switching between cloud providers can cause significant issues.
This includes technical incompatibilities, legal and regulatory limitations and substantial
costs incurred from sizable data migrations.
Cloud computing examples and use cases
Cloud computing has evolved and diversified into a wide array of offerings and capabilities
designed to suit almost any conceivable business need. Examples of cloud computing
capabilities and diversity include the following:
 Google Docs, Microsoft 365. Users can access Google Docs and Microsoft 365 through
the internet. Users can be more productive because they can access work presentations
and spreadsheets stored in the cloud at anytime from anywhere on any device.
 Email, Calendar, Skype, WhatsApp. Emails, calendars, Skype and WhatsApp take
advantage of the cloud's ability to provide users with access to data remotely so they can
access their personal data on any device, whenever and wherever they want.
 Zoom. Zoom is a cloud-based software platform for video and audio conferencing that
records meetings and saves them to the cloud, enabling users to access them anywhere
and at any time. Another common communication and collaboration platform is
Microsoft Teams.
 AWS Lambda. Lambda enables developers to run code for applications or back-end
services without having to provision or manage servers. The pay-as-you-go model
constantly scales with an organization to accommodate real-time changes in data usage
and data storage. Other major cloud providers also support serverless computing
capabilities, such as Google Cloud Functions and Azure Functions.
AUTOMATION EDUCATIONAL SOFTWARE
Automation can be defined as the process of removing the manual involvement of humans in a
particular process either with the help of machines or by using software. Ever since the Industrial
Revolution began, automating every industrial process became a common characteristic of
modernization. This carried on through the First and Second Industrial Revolutions to what we
call the Digital Revolution (or the Third Industrial Revolution) today, where all the technologies
available are combined in meticulous ways to make the life of humankind much more
manageable and efficient. For anyone living in the 21st century, the advantages of automation in
the industrial process are almost obvious. However, in the interconnected age of today, more and
more processes and technologies are being merged together to improve efficiency. This has
reached the doorstep of education as well. Automation helps improve different aspects of
different sectors, and the same goes for education as well.

Automation software are applications that minimize the need for human input and can be used in
a variety of ways in almost any industry. At the most basic, automation software is designed to
turn repeatable, routine tasks into automated actions. The importance of automating processes is
an essential topic for many industries. However, one industry that benefits the most from it
is education. Automation in the educational sector can reduce costs and improve efficiency. Here
are  five ways that schools, universities, and other educational organizations can benefit from
technology and process automation. 

1. Automating Classroom Technology to Manage Lesson Plans 


Many schools are already using classroom technology to manage lesson plans. There are several
software platforms available online that can help teachers create, follow and update their lesson
plans. Teachers can even update their lesson plans remotely. They can also make class lessons
more dynamic by incorporating creative videos with music, creating interactive presentations,
using teleprompters, and adding live data into documents displayed on screen. This way, they
increase student engagement and interest in their studies. Most importantly, classroom
technologies also allow instructors to upload content online without students having direct access
to it, enabling them to plan and alter the content before presenting it to the students. 
2. Automating Administrative Workflows 
Administrative tasks such as record keeping and student management take up time at schools,
universities, and other educational organizations. But automating management tasks can
streamline these activities into efficient processes, allowing school staff to focus on more
essential tasks like teaching students. Through automation, teachers can have a permanent record
of all graded assignments in an electronic format. This allows students to access their grades at
any given point during the school year without having to ask for them multiple times or go into
an administrator’s office if they need another copy. 
Teachers can also submit parent messages through online software, which automates
communication between parents and schools, saving them hours each week! Automation saves
teachers time and money, allowing them to focus on teaching instead of thinking about other
administrative tasks. 

3. Using Virtual Classrooms To Engage Students Who Are Not Physically Present On
Campus 
Another way that technology improves education is through using technological tools that allow
teachers to interact with students who are not physically present on campus.  Especially with the
global health crisis we’re experiencing, virtual classrooms allow teachers and professors to reach
a larger audience by using platforms that allow for online lectures, interactive discussions among
peers, Q&A sessions with experts in various fields of study, and more! Virtual learning
environments have improved education outcomes while also saving time because it doesn’t
require physical trips back and forth between campus buildings. Additionally, virtual classrooms
allow students worldwide to enroll in lectures and lessons at any time of day as long as they have
a computer with an internet connection. This also helps students who have full-time or part-time
jobs because they can follow along in class in their free time instead of waking up early before
work just for one specific lecture.

4. Automating Enrollment Processes 


Another way that schools can use process automation is by improving the enrollment process for
both students and school staff. Technology allows parents, guardians, or students to submit their
school application materials online. It saves time because it eliminates time spent on trips from
student homes to campus buildings and not worrying about lost paperwork! An automated
system can also accurately estimate by using AI technologies, how much aid each student will
receive based on their family’s financials. 
DRONES
A drone refers to any aerial vehicle that receives remote commands from a pilot or relies on
software for autonomous flight. Many drones display features like cameras for collecting visual
data and propellers for stabilizing their flight patterns. Sectors like videography, search and
rescue, agriculture and transportation have adopted drone technology. Originally developed for
the military and aerospace industries, drones have found their way into the mainstream because
of the enhanced levels of safety and efficiency they bring. These robotic UAVs operate without a
pilot on board and with different levels of autonomy.  A drone’s autonomy level can range from
remotely piloted (a human controls its movements) to advanced autonomy, which means that it
relies on a system of sensors and LiDAR detectors to calculate its movement. Different drones
are capable of traveling varying heights and distances. Very close-range drones usually have the
ability to travel up to three miles and are mostly used by hobbyists. Close-range UAVs have a
range of around 30 miles. Short-range drones travel up to 90 miles and are used primarily for
espionage and intelligence gathering. Mid-range UAVs have a 400-mile distance range and
could be used for intelligence gathering, scientific studies and meteorological research. The
longest-range drones are called “endurance” UAVs and have the ability to go beyond the 400-
mile range and up to 3,000 feet in the air.

How Do Drones Work? 


Many parts are involved behind the scenes to support the seamless operation of drones, so it’s
important to become familiar with the unmanned or remote technology that makes up a drone’s
system. From delivering commands to ensuring a manageable weight, pilots must take into
account the various factors that make a drone suited for specific jobs. Among the many variables
in play, some of the most critical components of a drone to consider are its ground control station
(GCS), payload and data links.
CYBER SECURITY
Cyber security is the practice of defending computers, servers, mobile devices, electronic
systems, networks, and data from malicious attacks. It's also known as information technology
security or electronic information security. The term applies in a variety of contexts, from
business to mobile computing, and can be divided into a few common categories.
·         Network security is the practice of securing a computer network from intruders, whether
targeted attackers or opportunistic malware.
·         Application security focuses on keeping software and devices free of threats. A
compromised application could provide access to the data its designed to protect. Successful
security begins in the design stage, well before a program or device is deployed.
·         Information security protects the integrity and privacy of data, both in storage and in
transit.
·         Operational security includes the processes and decisions for handling and protecting
data assets. The permissions users have when accessing a network and the procedures that
determine how and where data may be stored or shared all fall under this umbrella.
·         Disaster recovery and business continuity define how an organization responds to a
cyber-security incident or any other event that causes the loss of operations or data. Disaster
recovery policies dictate how the organization restores its operations and information to return to
the same operating capacity as before the event. Business continuity is the plan the organization
falls back on while trying to operate without certain resources.
Importance of Cyber Security in the Digital World 
The importance of cyber security in the digital world cannot be understated. A single security
breach can have far-reaching consequences in today's interconnected world. For example, the
2017 Equifax breach exposed the personal information of over 145 million people, and the 2018
Marriott breach exposed the personal information of over 500 million people.  These breaches
had a significant financial impact on the companies involved and also resulted in a loss of
customer trust. Therefore, cyber security is essential to protect businesses and individuals from
the potentially devastating consequences of a security breach.  To understand why it is important
to learn about cybersecurity, you must first know how a solid cybersecurity system helps and
protects students, businesses, organizations, and the banking sector.  

Importance of Cyber Security for Students


Cyber security is important for students because they often target cyber attacks. In a recent case,
a group of students from a college in the United States was targeted by hackers who gained
access to their personal information, including their Social Security numbers and credit card
information. The hackers then used this information to fraudulently charge thousands of dollars
to the students' credit cards. The students were left with massive debt and had to spend months
repairing their credit. This case highlights the importance of cyber security for students, who are
often the victims of cybercrime. If a student's personal information is stolen in a cyber attack, it
could be used to commit identity theft. It could ruin the student's credit, making it difficult for
the student to get loans for college or a car. In extreme cases, identity theft can even lead to jail. 
Most Common Cyberattacks
In recent years, there have been several high-profile cyberattacks that have had a devastating
impact on businesses and individuals. These are theft of social security numbers, bank account
details, credit card information, and sensitive data leaks. The main reason is that most individuals
store their data on cloud storage services such as Dropbox or Google Drive. These attacks have
highlighted the importance of having strong cybersecurity measures in place. Some of the most
common cyberattacks include: 
1. Phishing Attacks
Phishing is a type of cyberattack that involves tricking users into clicking on malicious links or
attachments. It can lead to the theft of sensitive information, such as login credentials or financial
data. 
2. Malware Attacks
Malware is a type of malicious software that can infect computers and devices. It can steal
information, hijack devices, or launch attacks on other systems. 
3. Denial-of-service Attacks
A denial-of-service attack is a type of attack that prevents users from accessing a system or
service. This can be done by flooding the system with traffic or requests or damaging it so it can
no longer function properly. 
4. Ransomware Attacks
Ransomware is malware that encrypts files or systems and demands a ransom to decrypt them. It
can lead to the loss of essential data or the complete shutdown of a system. 
5. Man-in-the-middle (MitM) Attacks
A MitM attack is a type of attack where an attacker intercepts communications between two
parties. This can be done by eavesdropping on a network connection or redirecting traffic to a
malicious server. 
6. SQL Injection
A SQL injection attack is a type of cyber-attack that exploit vulnerabilities in web applications to
inject malicious SQL code into the database. This code can view, delete, or modify data in the
database. SQL injection attacks can also take control of the server or carry out other malicious
activities. 
Cybersecurity is critical because it helps to protect us from these and other threats. By being
aware of the risks and taking steps to mitigate them, we can help to keep our data and systems
safe. Take a look at the need for cybersecurity in the growingly digitalized world.  

Volume and Complexity of Cyber Attacks


As cyber-attacks volume and complexity increase, cybersecurity's importance also increases.
Cybersecurity is critical because it helps to protect organizations and individuals from cyber
attacks. Cybersecurity can help to prevent data breaches, identity theft, and other types of
cybercrime. Organizations must have strong cybersecurity measures to protect their data and
customers. 

1. Technology Innovation
The importance of cybersecurity regarding technology innovation is that it helps protect ideas
and intellectual property from theft or being copied without permission. This is important
because it allows companies to maintain a competitive advantage and keep their products and
services safe from competitors. Additionally, it helps to ensure that new products and services
are not easily replicated or stolen before they can be released to the market. 
2. Cloud Transformation
The cloud has transformed how we think about IT, but it has also introduced new security risks.
As organizations move more critical data and applications to the cloud, they must know the latest
cybersecurity threats and how to protect themselves.  One of the most significant advantages of
the cloud is that it allows organizations to be more agile and responsive to change. However, this
agility can also introduce new security risks. For example, a cloud provider may not have the
same security controls as a traditional on-premises data center. Cloud data is often spread across
multiple physical locations, making protecting it more challenging. Organizations must be aware
of these new risks and take steps to mitigate them. They should work with their cloud providers
to ensure that adequate security controls are in place. They should also consider using a cloud
security platform to help manage and monitor their cloud environment. 

3. Impact on Business Operations


The internet has become a staple in business operations for the majority of companies across the
globe. The increase in internet usage has led to a rise in cyber-attacks, which can significantly
impact business operations. Cybersecurity in business helps protect itself against these attacks,
including data breaches, phishing scams, and ransomware. Cybersecurity can help businesses to
protect their data, customers, and reputation. 

4. Maintaining Customer and Employee Trust


Customers and employees trust that their information will be protected from cyber threats. To
maintain this trust, businesses must invest in cybersecurity measures to protect customer and
employee data. This may include installing firewalls, encrypting data, and creating secure
passwords. By taking these steps, businesses can show their commitment to protecting customer
and employee information, which can help to build and maintain trust. 

5. Securing Financial Position of the Organization


The importance of cybersecurity to ensure an organization's financial position cannot be
understated. In today's interconnected world, where sensitive data is often stored digitally, a
breach in security can have disastrous consequences. Not only can it lead to the loss of crucial
data, but it can also damage an organization's reputation and bottom line. A cyberattack can
result in the loss of customer confidence, increased costs, and a drop in stock value. In some
cases, it can even lead to bankruptcy. For these reasons, organizations need to take steps to
protect their data and their systems from attack. It includes investing in cybersecurity measures
such as firewalls, intrusion detection systems, and encryption. 

6. Staying Strong Amidst Competition


Cybersecurity is important to gain competitive advantages because it helps protect businesses
and organizations from cyber attacks. By investing in cybersecurity, businesses can improve
their security posture and make it more difficult for attackers to penetrate their systems. As a
result, it can give them a competitive edge over companies that have not invested in
cybersecurity. Additionally, businesses that cyber attacks have victimized can use their
experience to create better defenses against future attacks and share their knowledge with other
companies to help them improve their cybersecurity. 

7. Avoiding Fines and Penalties


The importance of cybersecurity in avoiding fines and penalties is that it helps protect businesses
and individuals from data breaches, cyber-attacks, and other online threats. By implementing
strong cybersecurity measures, companies and individuals can help to safeguard their data and
avoid potential fines and penalties. 

How to Protect your Organization Against Cybercrime?


To protect your organization against cybercrime, you should take several precautions. First, you
should have a solid cyber security policy in place. This policy should include data encryption,
firewalls, and intrusion detection systems.  
Additionally, you should train your employees to spot and report possible cyber threats. Finally,
you should regularly monitor your network for any suspicious activity. If you take these steps,
you will significantly reduce the chances of your organization becoming a victim of cybercrime. 

How Can Individuals Become Better at Protecting Their Data?


There are many reasons why individuals need to protect their data. One reason is that if data is
not covered, unauthorized people can access and use it. As a result, it can lead to identity theft,
fraud, and other crimes.  
Another reason is that if data is not protected, it can be lost or destroyed, which can cause
significant inconvenience or even financial hardship. Some ways individuals can become better
at protecting their data are: 
1. Use Strong Passwords: Passwords should be at least eight characters long and include a
mix of uppercase and lowercase letters, numbers, and symbols. Avoid using easily
guessed words like your name or birthdate. 
2. Use a Password Manager: A password manager can help you keep track of your
passwords and generate strong ones. 
3. Don't Reuse Passwords: Reusing passwords makes it easier for hackers to access your
accounts. 
4. Keep Your Software up to Date: Software updates often include security patches that
can help protect your data. 
5. Use Two-factor Authentication: Two-factor authentication adds an extra layer of
security by requiring you to enter a code from your phone or email in addition to your
password. 
6. Be Cautious of Phishing Scams: Phishing scams are emails or websites that pose as a
legitimate company to trick you into entering your personal information. 
7. Back up Your Data: Backing up your data helps ensure you can still access it even if
your computer is lost or stolen. 

You might also like