Batchnum - 141 Group4
Batchnum - 141 Group4
Submitted To :
Submitted By:
Prince Garg Sir
Batch No. : 141
Chetan Bhasin Sir
Batch Timings : 2-8 P.M.
Deepanshu Goel Sir
Centre : Prashant Vihar
Himanshi Gaba Ma’am
Roll no: 31-38
MEMBERS
Roll No. Name Registration No.
31 Swidhi Goel CRO0737289
32 Tanish Jain NRO0526160
33 Tannu Sharma NRO0545625
34 Vanshaj Bablani NRO0534039
35 Vanshika Goyal NRO0538872
36 Vanshika Jain NRO0535250
37 Vishal NRO0538841
38 Vishesh Jain NRO0545697
ACKNOWLEDGEMENT
We would like to express our sincere gratitude to everyone who contributed to the success of
this presentation. First and foremost, we extend our heartfelt thanks to our faculties for their
invaluable guidance and continuous support throughout the preparation of this presentation.
We would also like to thank our peers for their constructive feedback and collaborative spirit,
which helped shape this work. Additionally, we appreciate the resources and knowledge shared
by ICAI, which enriched the content of this presentation.
Finally, we are grateful to everyone present today for your time and attention. Your participation
is greatly appreciated.
Thank You.
TABLE OF CONTENTS
1. What is Cloud Computing?
2. Examples of Early Use Cloud Computing
3. Types of Cloud Computing
4. Benefits of Cloud Computing
5. Cloud Service Providers
6. Cloud Security
7. Cloud Computing in CA Profession
8. Challenges and Limitations
9. Future Trends
What is Cloud Computing?
• Cloud computing refers to the delivery of
computing services—including servers,
storage, databases, networking, software,
analytics, and intelligence—over the internet
("the cloud").
• It allows users to access these resources on
demand, without the need for local
infrastructure
• It offers faster innovation, flexible resources,
and economies of scale.
On-Demand Self-Service Broad Network Access
Users can provision computing Resources are available over a network,
resources independently and as often the internet, and accessible from
needed various devices.
PLATFORM AS SOFTWARE AS
INFRASTRUCTURE AS
PRIVATE PUBLIC HYBRID SERVICE (IAAS) SERVICE SERVICE
(PAAS) (SAAS)
DEPLOYMENT MODEL SERVICE MODEL
TYPES OF MODELS
SERVICE MODEL
PUBLIC CLOUD
The public cloud makes it possible for anybody to access systems and services. The public cloud may
be less secure as it is open to everyone. The public cloud is one in which cloud infrastructure services
are provided over the internet to the general people or major industry groups.
PRIVATE CLOUD
The private cloud deployment model is the exact opposite of the public cloud deployment model. There
is no need to share your hardware with anyone else. The distinction between PRIVATE AND PUBLIC is
in how you handle all of the hardware.
HYBRID CLOUD
By bridging the public and private worlds with a layer of proprietary software, hybrid cloud computing
gives the best of both worlds. With a hybrid solution, you may host the app in a safe environment while
taking advantage of the public cloud’s cost savings.
Infrastructure as a Service (IaaS)
Infrastructure as a Service (IaaS) contains the basic building blocks for cloud IT and typically provide access to
networking features, computers (virtual or on dedicated hardware), and data storage space. Infrastructure
as a Service vendors can help you with the highest level of flexibility and management control over your IT
resources
• So you can take your work with you on your wedding and vacations.
5. Automatically updated :-
• Owners no longer need to hire people to update mote than one
server, and It also helps the users the users who do not like to
download updates for the software.
• The server gets the updates and everyone who uses the service
gets the updates without updating anything on their end.
6. Computing flexibility & No downloads
ms
Security information and event management (SIEM)
IMPORTANCE OF CLOUD SECURITY
1. Data Protection: Cloud services store vast amounts of sensitive data, from personal
information to business-critical files. Without proper security, this data could be vulnerable
to unauthorized access, breaches, or theft.
2. Risk Management: Cloud environments are often targeted by cybercriminals due to their
high value and the complexity of managing them. Strong security measures help mitigate
risks such as data breaches, ransomware, and other cyber threats.
3. Business Continuity: Reliable cloud security includes features like backup, disaster
recovery, and redundancy, which are essential for ensuring that data is protected and
available even in the event of an incident.
4. Cost Efficiency: While investing in security might seem costly, it can prevent far more
expensive consequences associated with breaches and data loss. Proper cloud security
can save money in the long run by avoiding these costly incidents.
CLOUD SECURITY CHALLENGES
Lack of visibility
It's easy to lose track of how your data is accessed and by whom, since many cloud services are
accessed outside of corporate networks and through third parties.
Compliance
Regulatory compliance management is oftentimes a source of confusion for enterprises that use
public or hybrid cloud deployments. Overall accountability for data privacy and security still rests with
the enterprise, and heavy reliance on third-party solutions to manage this component can lead to
costly compliance issues.
Misconfigurations
A substantial portion of breached records can be attributed to misconfigured assets, making the
inadvertent insider a key issue for cloud computing environments. Misconfigurations can include
Cloud Computing in CA Profession
Cloud computing accounting involves
hosting and carrying out accounting tasks
such as auditing, storing data,
bookkeeping, data entry, and data
processing on the internet, a feature borne
out of an innovative marriage between
technology and business.
Importance in Chartered Accountant Field
Cross-platform Integration