There are several organizations that work in the area of web services, web development and web solutions. One of such Australian organization is Kentico that works in the area of online marketing along with e-commerce on the web development and services side of the same. The information that is associated with the processes and activities that take place in terms of business at Kentico is huge. Traditional databases that are deployed at the organization are not competent enough to meet the needs of Kentico and it has therefore been proposed that cloud databases along with NoSQL databases shall be deployed in all the locations for enhanced data management.
SWOT Template Organization: Kentico Date: 10/05/2017
|
|
Description of current/new ICT service: Traditional databases that are deployed at the organization are not competent enough to meet the needs of Kentico and it has therefore been proposed that cloud databases along with NoSQL databases shall be deployed in all the locations for enhanced data management. |
|
Strenght The current systems that are deployed at Kentico have the ability to be scaled up or down. These systems will be easily synced in with the new database Administration and management that is associated with Kentico is skilled, efficient and lays focus on the planning and analysis phases. Security is one of the prime concerns and research areas that is followed in the organization and therefore measures will be taken to make sure that there are no security violations The organization is already working in the area of web development and web services and is well versed with the related details and nature of operations. There will be technical skills available to implement the new database Finance team that is engaged with the organization is efficient to design a budget that would fit in the needs and would lead to cost savings in the long run |
Weaknessess In case of a migration from an existing system to a new system, there ought to be bundle of changes that come along with it. The case will be the same with the implementation of advanced databases which may make the employees resistant towards accepting these changes and working accordingly Training costs will be spent on the employees to allow them to gain an understanding of the new form of databases to ensure that the functionalities and features are well understood There are certain areas in cloud/NoSQL databases that may be completely new for all of the employees which would demand a specialist or an expert to allow other to develop an understanding on the same. External hiring would be required in this case which would involve a lot of cost as well Cloud is exposed to many risks and attacks in terms of security which will get introduced in case of Kentico (Hashizume, Rosado, Fernández-Medina, & Fernandez, 2013). The frequency of the system downtime will increase during the process of migration which may impact the regular working of the organization |
The speed of operations will improve which will lead to the faster production units and the overall productivity will show marked improvements The profits and revenues that will be earned by the organization with the implementation of cloud/NoSQL databases will be high as these databases are as per the norms of latest technology that fulfills the demands of the users in the present times The skills associated with these databases are in demand in the market and therefore the employees of the organization implementing these databases will have the opportunity to enhance their job profiles Management of the data and information along with its tracking and reporting will become easy which will automatically streamline the rest of the processes A lot of time is wasted in traditional databases in handling and managing the data. However, the case will be different with cloud and NoSQL databases as time will be saved which may be used in other activities. |
Threats The databases that will be installed will have the information of the entire organization along with its projects, clients and a lot more. There will be several access points which may lead to breaching of the information (Jansen, 2016). Malware such as ransomware, viruses, worms, logic bombs, Trojan horses etc. may affect the database and associated information Information may get lost as it may be captured during transition or there may also be leakage of the information to the unauthorized entities Man in the middle attacks along with other network security attacks may impact the database (Pearson & Benameur, 2016). Denial of service and other flooding attacks may also be executed that may have a worse impact on the availability of the system (Kshetri, 2016) There will be several user roles that will be defined for the database and these user roles will include varied accesses and privileges. The admin account will have all the privileges followed by the rest of the employees engaged with the organization. Some of these employees may take advantage of these special rights and may transfer the information to malevolent entities or may violate the authentication and privacy principles Inefficient back up and data recovery options associated with the database may not be installed and set up accurately. In such a case, there will be huge loss to the data and information present in the database as there might be occurrences of violation of security of the database |
Summary and Recommendations: Short Term (Now) There will be a few actions and steps that will be required to be taken and executed at an immediate basis. The first step will include the development of a training plan for the employees listing the types of trainings that will be covered along with the training schedule and the details of the trainer. The training plan will be required to be executed and brought in effect with immediate action. Mid Term (next 12 months) There will also be mid-term plans and steps that will be necessary to be taken which will include the security analysis of the database along with the development and implementation of a disaster recovery plan for backing up of data. Also, the incorporation of the Business Intelligence (BI) techniques will be necessary to be done such as data warehousing, data analytics along with data mining. Long Term (next 3 to 5 years) Databases are an integral part of the organization and the case is the same with Kentico. It will be necessary for the organization to run cycles of maintenance and updates at regular intervals. There will also be a lot of done that shall be done in the area of database security. There is a lot of development that is being done in the field of security architecture associated with the databases which will be required to be analyzed and implemented. It will also be necessary to carry out the processes of quality control and quality assurance to make sure that adherence to the quality standards is being followed and maintained (Ryan, 2016). |
Cloud databases and their demand in the market are on an all time rise. It is because of the reason that the physical storage space is limited and there is no limit to store data on a virtual space. There are also several advantages that are offered along with these databases in terms of speed of operations along with scalability and flexibility. The research paper covers the definition and details of the cloud databases along with the database operations that can be executed on it. There are also certain security risks that are associated with these databases that have been covered along with the steps to security.
Database Systems are defined as the information systems that are designed for data storage, data handling and its management. There are several database engines that have been developed and are being used by the users all across the globe. With the change and transformation in technology, there has been a shift in the use of traditional databases and the world is now moving to virtualization and virtual software. Cloud databases are the databases that do not have a physical existence and are present in the cloud for every single data related operation. NoSQL databases are the ones that are free from the use or involvement of SQL queries and statements and carry out data operations through other mechanisms.
Cloud and NoSQL databases have the capability to perform numerous data related operations. The usual operations on the databases such as storage of data, addition and deletion of data, modification, searching and sorting of data can be easily performed. There are also some of the advanced features that are provided and included in these databases (Takabi, 2016). Reporting is one of the useful features of many of the NoSQL databases along with the cloud databases which allow the users to extract the custom reports. These reports may comprise of data patterns and statistics which is retrieved upon the application of data analytics and several other operations.
There are various technologies that are used and applied in the cloud databases. These technologies allow the enhancement of the data operations that are carried out on the cloud. Business Intelligence and the technologies that come under it are used in case of cloud and NoSQL databases to strengthen the data operations.
Data warehouses along with the logical data warehouses are applicable in case of cloud databases. There are clusters and massive information sets that are stored in the cloud databases. It is not possible to have a track of each of the data set or to review each and every set of the data. Logical data warehouses provide the database administrators and other entities with the logical view of the data rather than a physical model of the same.
Similarly, relevant information can be extracted from the data sets that are present in the cloud databases. These information and data sets cannot be reviewed or analyzed through manual processes. Data mining and data analytics can be applied to the data sets to retrieve important patterns and statistics that is associated with the data.
Cloud computing is associated with many of the security risks and attacks. These risks fall in to various types and may impact the properties of the information such as its privacy or confidentiality. The impact that may result out from these risks can be varied depending upon the type of information that is attacks or hampered.
The databases that will be installed will have the information of the entire organization along with its projects, clients and a lot more. There will be several access points which may lead to breaching of the information. Malware such as ransomware, viruses, worms, logic bombs, Trojan horses etc. may affect the database and associated information. Information may get lost as it may be captured during transition or there may also be leakage of the information to the unauthorized entities. Man in the middle attacks along with other network security attacks may impact the database. Denial of service and other flooding attacks may also be executed that may have a worse impact on the availability of the system. There will be several user roles that will be defined for the database and these user roles will include varied accesses and privileges. The admin account will have all the privileges followed by the rest of the employees engaged with the organization. Some of these employees may take advantage of these special rights and may transfer the information to malevolent entities or may violate the authentication and privacy principles. Inefficient back up and data recovery options associated with the database may not be installed and set up accurately. In such a case, there will be huge loss to the data and information present in the database as there might be occurrences of violation of security of the database
It is necessary to control and deal with the security risks that are associated with the cloud databases. These risks can be handled with the application and execution of a number of security steps which are listed and described below (Sen, 2016).
Administrative controls and steps play an important role in the area of data security. Management and administration engaged with the organization shall make sure that there are proper evaluation methods that shall be carried out to put a check on the violation of any of the security protocols. There shall also be timely reviews and audits that shall be executed along with enhancement of the policies and codes of conduct.
Another form of step that will play an important role in case of cloud databases and its security will be technical and logical steps and measures. These will comprise of the application of technical tools and algorithms to prevent the attacks from taking place and also the timely detection of the attacks. Some of the tools include anti-denial tools, Intrusion Detection systems, Intrusion Prevention Systems, anti-malware tools and likewise (Sun, Zhang, Xiong, & Zhu, 2014).
Physical security and the steps to analyze the current trends in database security are also essential. Technology is advancing with each passing second. It is necessary for the organizations to have a view of the latest measures that may be taken and the future trends that are involved. Therefore, a check on the security policies and the strategies that may be applied shall be done on a regular basis.
Cloud databases are the databases that do not have a physical existence and are present in the cloud for every single data related operation. NoSQL databases are the ones that are free from the use or involvement of SQL queries and statements and carry out data operations through other mechanisms. There are several advantages and opportunities that open up with the implementation of these databases in the organization. The speed of operations will improve which will lead to the faster production units and the overall productivity will show marked improvements. The profits and revenues that will be earned by the organization with the implementation of cloud/NoSQL databases will be high as these databases are as per the norms of latest technology that fulfills the demands of the users in the present times. The skills associated with these databases are in demand in the market and therefore the employees of the organization implementing these databases will have the opportunity to enhance their job profiles. Management of the data and information along with its tracking and reporting will become easy which will automatically streamline the rest of the processes. A lot of time is wasted in traditional databases in handling and managing the data. However, the case will be different with cloud and NoSQL databases as time will be saved which may be used in other activities. There are various technologies that are used and applied in the cloud databases. These technologies allow the enhancement of the data operations that are carried out on the cloud. Business Intelligence and the technologies that come under it are used in case of cloud and NoSQL databases to strengthen the data operations. It is necessary to control and deal with the security risks that are associated with the cloud databases. These risks can be handled with the application and execution of a number of security steps such as administrative checks, technical controls and physical security checks.
Hashizume, K., Rosado, D., Fernández-Medina, E., & Fernandez, E. (2013). An analysis of security issues for cloud computing. J Internet Serv Appl, 4(1), 5. http://dx.doi.org/10.1186/1869-0238-4-5
Jansen, W. (2016). Cloud Hooks: Security and Privacy Issues in Cloud Computing. Retrieved 10 May 2017, from https://www.computer.org/csdl/proceedings/hicss/2011/4282/00/10-03-01.pdf
Kshetri, N. (2016). Privacy and security issues in cloud computing: The role of institutions and institutional evolution. Sciencedirect.com. Retrieved 10 May 2017, from http://www.sciencedirect.com/science/article/pii/S0308596112000717
Pearson, S. & Benameur, A. (2016). Privacy, Security and Trust Issues Arising from Cloud Computing. Retrieved 10 May 2017, from http://barbie.uta.edu/~hdfeng/CloudComputing/cc/cc05.pdf
Ryan, M. (2016). Cloud Computing Privacy Concerns on Our Doorstep.Cacm.acm.org. Retrieved 10 May 2017, from http://cacm.acm.org/magazines/2011/1/103200-cloud-computing-privacy-concerns-on-our-doorstep/fulltext
Sen, J. (2016). Security and Privacy Issues in Cloud Computing. Retrieved 10 May 2017, from https://arxiv.org/ftp/arxiv/papers/1303/1303.4814.pdf
Sun, Y., Zhang, J., Xiong, Y., & Zhu, G. (2014). Data Security and Privacy in Cloud Computing. International Journal Of Distributed Sensor Networks, 2014, 1-9. http://dx.doi.org/10.1155/2014/190903
Takabi, H. (2016). Security and Privacy Challenges in Cloud Computing Environments. Retrieved 10 May 2017, from http://csis.pace.edu/~marchese/SE765/Paper/security2.pdf
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2022). ITC540 IT Infrastructure Management PG Essay. Retrieved from https://myassignmenthelp.com/free-samples/itc540-it-infrastructure-management/cloud-database-and-database-operation.html.
"ITC540 IT Infrastructure Management PG Essay." My Assignment Help, 2022, https://myassignmenthelp.com/free-samples/itc540-it-infrastructure-management/cloud-database-and-database-operation.html.
My Assignment Help (2022) ITC540 IT Infrastructure Management PG Essay [Online]. Available from: https://myassignmenthelp.com/free-samples/itc540-it-infrastructure-management/cloud-database-and-database-operation.html
[Accessed 19 August 2024].
My Assignment Help. 'ITC540 IT Infrastructure Management PG Essay' (My Assignment Help, 2022) <https://myassignmenthelp.com/free-samples/itc540-it-infrastructure-management/cloud-database-and-database-operation.html> accessed 19 August 2024.
My Assignment Help. ITC540 IT Infrastructure Management PG Essay [Internet]. My Assignment Help. 2022 [cited 19 August 2024]. Available from: https://myassignmenthelp.com/free-samples/itc540-it-infrastructure-management/cloud-database-and-database-operation.html.