Task 1
Task 1
1. EXECUTIVE SUMMARY
1.1. SUMMARY OPTION
2. CURRENT SITUATION
Mission
Danford College seeks the highest quality of education and
greater educational links with industry. We work hard to continually improve
our services, facilities and educational offerings. With qualified trainers
and world-class facilities, we work to attract smart, passionate students
from around the world and help further their careers through education. A
Danford College education is a pathway. We support students looking to
advance their professional skills and knowledge, further their career, or
progress to higher education.
ICT Infrastructure
The college count with 3 server which provide WEB, FTP, DHCP, VoIP,
database and authentication services. In addition, the campus network has 1
main router (gateway) 2 switches and several Access points to provide wi-fi
access.
The college provides digital resources to the students in order to help them
with their assessments along with other services such as printing and Wi-Fi
connectivity.
Virtualization
The software used to manage the digital resources is called JobReady and
both students and trainers have access to it.
Workforce
The college staff is comprised by 20 trainers, 10 admin staff, 5 marketing
staff and 3 managers; it also subcontracts the IT services with a third-party
provider.
2.3. BUSINESS PROBLEM
All the assessments and attendance have been handled manually until now;
however, due to a significant increment in the number of students Danford
college has decided to move from a paper to a paper-less system, this means
that all assessment will be uploaded to a server/s where they will be marked
by the assessors.
In addition, the college is concerned with the low performance in the network
at peak hours (mainly when the students are in the campus) and the lack of
proper security for some of their online services.
3. PROPOSE RESPONSE
3.1. STRATEGIC ALIGNMENT
Private cloud: The infrastructure of this cloud is operated solely by and for an
organization
Virtualized elements and virtualization elements will be treated the same as the
corresponding physical elements for configuration, maintenance, security rules
and regulatory aspects.
The images of the virtual elements will be treated as data with the same security
requirements as the information and services handled by said virtual elements.
Providers will ensure that the location of each of the physical resources used to
implement the Cloud Computing service, directly or outsourced.
3.4. BENEFIST
Cost reduction. You pay for what you use.
Scalable storage options according to our need. You can expand the storage
options to meet the needs without problem.
Automatic updates. There is no need for the IT department to have to worry
about paying for future updates.
Remote access. Employees can access information wherever they are.
Ecological service. It uses less energy than traditional data centers.
Ease of implementation. There is no need to implement hardware and
components that may take several hours to install.
Qualified sellers. Choose who you prefer to manage and protect your data.
The response times. A better response time is achieved with the cloud than
most cases compared to a standard server.
It offers equal conditions for new small businesses, allowing them to compete
more effectively in the market.
Performance and durability. Run your websites at a much faster pace with the
benefits of using a more durable service.
4. PROPOSAL SUMMARY
We are going to move all the sever to the cloud, that means that all the physical
structure for the servers are going to be removed. Still is going to use the router for
WIFI. We are going to split by areas and each area is going to be connected to a
switch to prevent security problems. Most of the wire is going to disappear.
5. SOLUTION OPTION
5.1. DESIGN CRITERIAL
File Encryption
Taking into account that the files will be hosted on servers that we do not have
located, it is recommended before uploading them to the cloud storage service that
encryption is applied. With this, what is sought is that in a hypothetical case that
the service suffers from a security problem, cybercriminals will not be able to
access our information.
Flexibility: commercial demands on broadband are increasing. Cloud-based services
can take care of these demands, thanks to the enormous capacity of remote service
servers.
Automatic synchronization
The user can install a client on their desktop or mobile device and have in real time
any file that is in the service, thanks to automatic synchronization. Generally it is an
automatic function, being a matter of payment the number of devices to
synchronize with the same account.
Encrypted connection to connect to the service
So important is to encrypt the files, as we have pointed out above, how to access
the service securely.
Collaborative tools
When sharing documents with other users and editing them together, these types
of tools are the best solution.
Accessibility and maintenance
Accessibility can be said to be the most important benefit of cloud services for
maintenance teams. When maintenance systems are hosted in the cloud,
maintenance teams have access to their systems and data from anywhere. They no
longer need to be connected to the network to access critical information. This
positively impacts the way maintenance services are programmed, implemented
and operated.
Speed
Low speed due to increased network traffic into the server connection
Reliable
Routers and switches can be facilitated and configured from the cloud. Centralized
routers can also be managed and monitored virtually, which is still good news. By
facilitating installation and support, you are contributing to making your business
more reliable.
5.2. Identify options
Maintenance cost
Benefist
Requirements
Savings
6. OPTION ANALYSIS
Requirements Cloud
Benefits 1.- Access from any site and with several devices.
2.- Savings in both software and hardware and in technical
maintenance
Disadvantage 1.- Lack of security and privacy.
2.- Without Internet there is no cloud.
Total cost 2700 AUD
Total saving 7190 AUD
flexibility of the You can make a change of memory capacity layer at any
contract time, you can increase or decrease at any time
Estimate 4 hr
installation
timeframe
Requirements 1 ACCESS PERMITS
The software must have a system that allows assigning
access permissions according to each user. A company
should never allow free access to its folders and files.
Requirements 2 CONTROL OF SHARES OR WORKFLOW
When a company uses some file management software, it
is necessary to know what has happened in the life of those
files. The software has to provide some mechanism of
histories or workflow of the archives.
Requirements 3 MEASURES THAT AVOID LOSSES
The software must have measures that prevent the loss of
stored information. Any user should not be able to delete
company information. Similarly, any user should not be
able to modify the structure of files and folders of the
company.
Requirements 4 CONTROL OF LINKS AND EMAILS SENT
In the company you have to be very careful with the links
to share files. The systems must allow access control to
those links. They are company files distributed and sent
through links that are not well known where they can end.
Implementation Abuse and misuse of cloud computing
risk Unsecured interfaces and APIs
Internal threat
Loss or leakage of information
Session or service hijacking
7. IMPLEMENTATION APPROACH
Define your project – All the servers are going to move to the cloud
Select the platform – Microsoft Azure Cloud
security policies – section 9
Migration
The first thing is to verify that the “Remote Desktop” option is enabled. Additionally,
it is necessary to allow RDP connections in the Windows Firewall. And it is that
Azure generates a new network interface.
Next you have to create a Virtual Hard Disk. The format is VHD, the one used by
Azure for all its virtual machines.
The next step is to create a storage account in Azure, where you have to upload the
Virtual Hard Disk created in the previous step. In the storage account it is necessary
to generate a container.
Once the disk is uploaded, you must access the virtual machines section and select
the option that allows you to create a new disk from the existing VHD.
The last step is to create a new virtual machine. To do this, simply select the option
from the gallery and select the disc that has just been added.
Monitoring
It is important to have solutions that can report data from different sources on a
single platform, which allows to calculate metrics and uniform results in a
comprehensive view of performance. Another aspect to consider is the need to
monitor the uses and costs of the cloud service. The ability to scale is a key feature
of cloud services, but increased use can lead to increased costs. Robust monitoring
solutions should track what part of your organization's network activity is in the
cloud and how much it costs. A monitoring solution that alerts you when cloud
resources exceed the budget or usage limits can save an organization huge costs.
Organizations should track long-term trends and most monitoring tools provided by
cloud service providers only keep data for a limited time (between 30 and 60 days).
So a monitoring tool must be compatible with maintaining that information to show
trends for at least several months.
You have to configure instant visibility for everyone. The monitoring solution must
support customizable panels that provide instant visibility into what is happening,
what is happening, what is seeing intensive use and what is inactive. This not only
facilitates problem solving, but also allows teams to see problems and solve them
proactively before they affect end users. Finally, it is important to test the tools to
see what happens when there is a data interruption and evaluate the automatic
response systems when certain thresholds are reached.
8. AGENCY CAPABILITY
Stakeholders impact
employees:
Access from anywhere and device
Disconnections and offline availability
Administrative
Payment for use allows the option for companies to grow and adapt to new
changes and requirements, regardless of whether it is a immediate, short or
long term change.
Low demand for updates and maintenance (less costs)
Loss of data control
Training
We have to develop a program to train the clients and administrative to use the
new programs and how access to this.
Responsibility
The administrative department have to be monitoring to control the access to
the cloud and how the internet is working.
operational capacity
• A “shared services” governance model
• Supply and acquisition processes that do not compromise your punctuality
• A service infrastructure for the provision of services
• Integrated event management, configuration, changes,releases, capabilities
and service level.
• A catalog of services and a database for the management of the configuration
(CMDB) supported by tools service automation
• Measurement, billing and subscription support
• Bid management
• Virtualized and standardized infrastructure
• A critical mass of resources that can be grouped to justify the investment
made in the management infrastructure
• Software license acquisition agreements adapted to a cloud consumption
model
3) Close the security breach in mobile applications. Mobile web applications are
effectively applications within an application - the native browser on a mobile
device and there are thousands of them. While some security solutions offer the
ability to block or allow native applications, they do not provide controls for
mobile web applications, creating a security breach in mobile applications that
leaves users vulnerable to applications at risk or danger on mobile devices.
Closing this gap is a fundamental step on the road to the complete incorporation
of BYOD into the company.
5) Report, adjust and repeat. To maintain effective security and adequate policy
controls, it is essential to adjust corporate policies based on real-time data
obtained from all users and devices. Use reporting tools to understand not only
how policies are impacting users and their network, but also to identify and
resolve issues immediately.
10. RISK
FACTOR DESCRIPTION
Business need the infrastructure of the network would be improved which
facilitates the location of the computers.
the costs would decrease
the customer would be satisfied and the ease of use for
this
Standardized and self-service offers that improve
efficiency
Services provided quickly that provide agility
Availability of flexible prices that facilitate innovation
Strategic fit It would be shown as an eco-friendly educational
company, in addition to presenting a stable structure and
allowing the connection of students from anywhere, it
does not necessarily have to be in the educational center
to access the server
Value for money There would be a 70% benefit by reducing more than
7,000 dollars per year
Achievability Integrator is needed as it is responsible for the cloud
services offered by providers. This role requires some IT
knowledge to communicate and clearly translate the
technical and business requirements to the service
providers. In effect, the integrator is the link between your
organization and all external suppliers
A solid cloud governance infrastructure and strategy It
should be part of any cloud computing strategy. The Cloud
governance includes:
• Establish decision rights for interest groups, such as
determining the roles with power to acquire solutions and
the level of involvement required of the involved
• Develop decision-making processes for the cloud
• Establish and apply policies to manage suppliers
of cloud services
Supply vendor side We use IasS because compared to SaaS and PaaS, IaaS
users are responsible for managing applications, data,
runtime, middleware, and OSes. Providers still manage
virtualization, servers, hard drives, storage, and
networking. Many IaaS providers now offer databases,
messaging queues, and other services above the
virtualization layer as well. Some tech analysts draw a
distinction here and use the IaaS+ moniker for these other
options. What users gain with IaaS is infrastructure on top
of which they can install any required platform. Users are
responsible for updating these if new versions are
released.