Cloud Computing refers to manipulating, configuring, and accessing the applications online. It offers online data storage, infrastructure and application.
Cloud Computing is both a combination of software and hardware based computing resources delivered as a network service.
Basic Concepts:
There are certain services and models working behind the scene making the cloud computing feasible and accessible to end users. Following are the working models for cloud computing:
1. Deployment Models
2. Service Models
This document provides an overview of cloud computing. It defines cloud computing as accessing applications and data storage over the internet. The document then discusses key concepts in cloud computing including deployment models (public, private, community, hybrid clouds), service models (Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS)), and advantages (lower costs, improved performance) and disadvantages (requires internet, data security issues). The document is presented by Pradeep Kumar for a cyber security course.
This document discusses cloud computing and software as a service (SaaS). It begins with an introduction to cloud computing and defines it as manipulating, configuring, and accessing applications online through online data storage, infrastructure, and applications. It then discusses the architecture of cloud computing and SaaS architecture stack. The main part of the document focuses on SaaS, defining it as an application delivery model where software is distributed as a service through the internet. It describes key features of SaaS such as standardized software customized for customers, highly scalable architecture, licensing based on usage, and web-based services including maintenance, support, and upgrades with data storage by the SaaS vendor.
An educational overview of the Cloud Computing Ecosystem or Framework. This presentation is geared toward those who are just beginning to understand Cloud Computing.
Cloud computing allows users to access computing resources like servers, storage, databases, networking, software, analytics and more over the internet. It provides on-demand access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort. Some key characteristics of cloud computing include centralization of infrastructure, increased peak-load capacity, efficiency improvements, dynamic allocation of resources, and consistent monitored performance. There are various deployment and service models used in cloud computing like public, private, hybrid, community clouds and Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS).
This document provides an overview of cloud computing, including definitions, architecture, deployment models, and service models. Cloud computing allows users to access applications and store data over the internet rather than locally. There are four deployment models - public, private, hybrid, and community clouds. The three main service models are Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). IaaS provides fundamental computing resources, PaaS provides development platforms, and SaaS provides software applications delivered over the internet.
Microsoft Windows Azure - Platfrom Appfabric Service Bus And Access Control P...Microsoft Private Cloud
This document discusses Service Bus and Access Control in the Windows Azure platform. It provides an overview of how they can help solve challenges around connectivity, security, and access across organizational boundaries. Service Bus allows applications and services to connect across firewalls, domains, and networks. Access Control simplifies user authorization across organizations and identity providers. Case studies demonstrate how companies have benefited from these technologies in terms of efficiency, agility, focus, and trust.
Cloud computing is the delivery of computing resources such as hardware and software over a network. It allows consumers to access applications from anywhere via the internet. There are different types of cloud computing including Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Cloud services can be deployed in private, public, community or hybrid models. Major companies delivering cloud services include Google, Microsoft, Amazon, Apple and Salesforce.
The document provides an introduction to cloud computing and Amazon Web Services (AWS), describing characteristics of cloud computing including scalability, reliability, and cost reduction. It explains the three main service models of cloud computing - Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS) - and how AWS offers these services globally through regions and availability zones. Key AWS services are introduced, including Amazon Simple Storage Service (Amazon S3) for object storage in the cloud.
Cloud computing provides on-demand access to IT resources and applications from the Internet. There are three service models - Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). IaaS provides fundamental computing resources, PaaS supplies platforms for developing and deploying applications, and SaaS delivers software applications to users. Cloud computing offers advantages like reduced costs, improved performance and collaboration, but also disadvantages such as reliance on internet and potential security and speed issues.
This document provides an introduction to cloud computing, discussing what cloud computing is, the cloud computing architecture including deployment models and service models, and advantages and disadvantages of cloud computing. Specifically, it defines cloud computing as manipulating, configuring, and accessing applications online, and discusses the main deployment models of public, private, hybrid, and community clouds. It also outlines the primary service models of Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS).
The term Cloud refers to a Network or Internet. In other words, we can say that Cloud is something, which is present at remote location. Cloud can provide services over network, i.e., on public networks or on private networks, i.e., WAN, LAN or VPN.
Applications such as e-mail, web conferencing, customer relationship management (CRM), all run in cloud.
Cloud Computing genral for all concepts.pptxraghavanp4
Cloud computing provides on-demand access to shared computing resources like networks, servers, storage, applications and services via the internet. It has three service models - Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). There are four deployment models - public, private, hybrid and community clouds. Key enabling technologies include virtualization, distributed resource management and reservation-based provisioning to meet service level agreements.
The document discusses a seminar on cloud computing presented by Akshay Vasava. It introduces cloud computing and defines it as accessing applications over the internet as utilities. It describes the basic concepts of cloud computing including deployment models (public, private, community, hybrid clouds) and service models (Infrastructure as a Service, Platform as a Service, Software as a Service). The document outlines the advantages of cloud computing such as lower costs, improved performance and collaboration, and unlimited storage.
The term Cloud refers to a Network or Internet. In other words, we can say that Cloud is something, which is present at remote location. Cloud can provide services over network, i.e., on public networks or on private networks, i.e., WAN, LAN or VPN.
Applications such as e-mail, web conferencing, customer relationship management (CRM), all run in cloud.
Cloud Computing provides us a means by which we can access the applications as utilities, over the Internet. It allows us to create, configure, and customize applications online. With Cloud Computing users can access database resources via the internet from anywhere for as long as they need without worrying about any maintenance or management of actual resources.
This document discusses cloud deployment plans. It begins with an introduction to cloud computing, defining it as scalable IT capabilities provided over the internet. It then discusses the benefits of cloud computing such as reduced costs and increased flexibility. The document outlines the history and origins of cloud computing. It describes the essential characteristics of cloud computing such as on-demand access, resource pooling, and elasticity. It defines the three main cloud service models of SaaS, PaaS, and IaaS and compares their characteristics. Finally, it discusses the different types of cloud implementation including public, private, community, and hybrid clouds.
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Key features of cloud computing include on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. Common types of cloud computing include public, private, hybrid and community clouds. Common cloud service models are Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS).
This document provides an overview of cloud computing, including definitions, architecture, deployment models, and service models. Cloud computing allows users to access applications and store data over the internet rather than locally. There are four deployment models - public, private, hybrid, and community clouds. The three main service models are Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). IaaS provides fundamental computing resources, PaaS provides development platforms, and SaaS provides software applications delivered over the internet. Advantages of cloud computing include lower costs, improved performance, universal access, and unlimited storage, while disadvantages include reliance on internet and potential security and performance issues
The document provides an introduction to cloud computing, defining key concepts such as cloud, cloud computing, deployment models, and service models. It explains that cloud computing allows users to access applications and store data over the internet rather than locally on a device. The main deployment models are public, private, community, and hybrid clouds. The primary service models are Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). IaaS provides fundamental computing resources, PaaS provides development platforms, and SaaS provides software applications delivered over the internet. The document discusses advantages such as lower costs and universal access, and disadvantages including internet dependence and potential security issues.
The document provides an introduction to cloud computing, defining key concepts such as cloud, cloud computing, deployment models, and service models. It describes cloud computing as accessing applications over the internet as utilities. The main deployment models are public, private, hybrid, and community clouds. The main service models are Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). IaaS provides access to computing infrastructure resources, PaaS provides platforms for application development, and SaaS provides access to software applications. The document also discusses advantages like lower costs and improved performance, as well as disadvantages like requiring internet access.
The document provides an introduction to cloud computing, defining key concepts such as cloud, cloud computing, deployment models, and service models. It explains that cloud computing allows users to access applications and store data over the internet rather than locally on a device. The main deployment models are public, private, community, and hybrid clouds, while the main service models are Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). IaaS provides fundamental computing resources, PaaS provides development platforms, and SaaS provides software applications to users. The document discusses advantages such as lower costs and universal access, and disadvantages including internet dependence and potential security issues.
Cloud computing provides dynamically scalable resources as a service over the Internet. It consists of interconnected, virtualized computers that are provisioned and presented as unified resources. Services include infrastructure, platform and software and are accessed from any device via the Internet in a pay-as-you-go manner. Key enabling technologies include virtualization, web services, service-oriented architecture, and mashups. Features include on-demand scaling, location independence via any device, quality of service guarantees, and no upfront capital costs as users pay for what they use. Major providers offer platforms for deployment of applications and services.
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Murphy -Dat...Continuity and Resilience
The 14th Middle East Business and IT Resilience Summit
Abu Dhabi, UAE
Date: 7th & 8th May 2025
Murphy -Data resilience Customer story for Abu Dhabi event
Ad
More Related Content
Similar to IT Application Notes and Reviewer.pdf file (20)
Microsoft Windows Azure - Platfrom Appfabric Service Bus And Access Control P...Microsoft Private Cloud
This document discusses Service Bus and Access Control in the Windows Azure platform. It provides an overview of how they can help solve challenges around connectivity, security, and access across organizational boundaries. Service Bus allows applications and services to connect across firewalls, domains, and networks. Access Control simplifies user authorization across organizations and identity providers. Case studies demonstrate how companies have benefited from these technologies in terms of efficiency, agility, focus, and trust.
Cloud computing is the delivery of computing resources such as hardware and software over a network. It allows consumers to access applications from anywhere via the internet. There are different types of cloud computing including Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Cloud services can be deployed in private, public, community or hybrid models. Major companies delivering cloud services include Google, Microsoft, Amazon, Apple and Salesforce.
The document provides an introduction to cloud computing and Amazon Web Services (AWS), describing characteristics of cloud computing including scalability, reliability, and cost reduction. It explains the three main service models of cloud computing - Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS) - and how AWS offers these services globally through regions and availability zones. Key AWS services are introduced, including Amazon Simple Storage Service (Amazon S3) for object storage in the cloud.
Cloud computing provides on-demand access to IT resources and applications from the Internet. There are three service models - Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). IaaS provides fundamental computing resources, PaaS supplies platforms for developing and deploying applications, and SaaS delivers software applications to users. Cloud computing offers advantages like reduced costs, improved performance and collaboration, but also disadvantages such as reliance on internet and potential security and speed issues.
This document provides an introduction to cloud computing, discussing what cloud computing is, the cloud computing architecture including deployment models and service models, and advantages and disadvantages of cloud computing. Specifically, it defines cloud computing as manipulating, configuring, and accessing applications online, and discusses the main deployment models of public, private, hybrid, and community clouds. It also outlines the primary service models of Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS).
The term Cloud refers to a Network or Internet. In other words, we can say that Cloud is something, which is present at remote location. Cloud can provide services over network, i.e., on public networks or on private networks, i.e., WAN, LAN or VPN.
Applications such as e-mail, web conferencing, customer relationship management (CRM), all run in cloud.
Cloud Computing genral for all concepts.pptxraghavanp4
Cloud computing provides on-demand access to shared computing resources like networks, servers, storage, applications and services via the internet. It has three service models - Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). There are four deployment models - public, private, hybrid and community clouds. Key enabling technologies include virtualization, distributed resource management and reservation-based provisioning to meet service level agreements.
The document discusses a seminar on cloud computing presented by Akshay Vasava. It introduces cloud computing and defines it as accessing applications over the internet as utilities. It describes the basic concepts of cloud computing including deployment models (public, private, community, hybrid clouds) and service models (Infrastructure as a Service, Platform as a Service, Software as a Service). The document outlines the advantages of cloud computing such as lower costs, improved performance and collaboration, and unlimited storage.
The term Cloud refers to a Network or Internet. In other words, we can say that Cloud is something, which is present at remote location. Cloud can provide services over network, i.e., on public networks or on private networks, i.e., WAN, LAN or VPN.
Applications such as e-mail, web conferencing, customer relationship management (CRM), all run in cloud.
Cloud Computing provides us a means by which we can access the applications as utilities, over the Internet. It allows us to create, configure, and customize applications online. With Cloud Computing users can access database resources via the internet from anywhere for as long as they need without worrying about any maintenance or management of actual resources.
This document discusses cloud deployment plans. It begins with an introduction to cloud computing, defining it as scalable IT capabilities provided over the internet. It then discusses the benefits of cloud computing such as reduced costs and increased flexibility. The document outlines the history and origins of cloud computing. It describes the essential characteristics of cloud computing such as on-demand access, resource pooling, and elasticity. It defines the three main cloud service models of SaaS, PaaS, and IaaS and compares their characteristics. Finally, it discusses the different types of cloud implementation including public, private, community, and hybrid clouds.
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Key features of cloud computing include on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. Common types of cloud computing include public, private, hybrid and community clouds. Common cloud service models are Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS).
This document provides an overview of cloud computing, including definitions, architecture, deployment models, and service models. Cloud computing allows users to access applications and store data over the internet rather than locally. There are four deployment models - public, private, hybrid, and community clouds. The three main service models are Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). IaaS provides fundamental computing resources, PaaS provides development platforms, and SaaS provides software applications delivered over the internet. Advantages of cloud computing include lower costs, improved performance, universal access, and unlimited storage, while disadvantages include reliance on internet and potential security and performance issues
The document provides an introduction to cloud computing, defining key concepts such as cloud, cloud computing, deployment models, and service models. It explains that cloud computing allows users to access applications and store data over the internet rather than locally on a device. The main deployment models are public, private, community, and hybrid clouds. The primary service models are Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). IaaS provides fundamental computing resources, PaaS provides development platforms, and SaaS provides software applications delivered over the internet. The document discusses advantages such as lower costs and universal access, and disadvantages including internet dependence and potential security issues.
The document provides an introduction to cloud computing, defining key concepts such as cloud, cloud computing, deployment models, and service models. It describes cloud computing as accessing applications over the internet as utilities. The main deployment models are public, private, hybrid, and community clouds. The main service models are Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). IaaS provides access to computing infrastructure resources, PaaS provides platforms for application development, and SaaS provides access to software applications. The document also discusses advantages like lower costs and improved performance, as well as disadvantages like requiring internet access.
The document provides an introduction to cloud computing, defining key concepts such as cloud, cloud computing, deployment models, and service models. It explains that cloud computing allows users to access applications and store data over the internet rather than locally on a device. The main deployment models are public, private, community, and hybrid clouds, while the main service models are Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). IaaS provides fundamental computing resources, PaaS provides development platforms, and SaaS provides software applications to users. The document discusses advantages such as lower costs and universal access, and disadvantages including internet dependence and potential security issues.
Cloud computing provides dynamically scalable resources as a service over the Internet. It consists of interconnected, virtualized computers that are provisioned and presented as unified resources. Services include infrastructure, platform and software and are accessed from any device via the Internet in a pay-as-you-go manner. Key enabling technologies include virtualization, web services, service-oriented architecture, and mashups. Features include on-demand scaling, location independence via any device, quality of service guarantees, and no upfront capital costs as users pay for what they use. Major providers offer platforms for deployment of applications and services.
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Murphy -Dat...Continuity and Resilience
The 14th Middle East Business and IT Resilience Summit
Abu Dhabi, UAE
Date: 7th & 8th May 2025
Murphy -Data resilience Customer story for Abu Dhabi event
Cost Structure of Hydrogen Vehicle Manufacturing Plantsurajimarc0777
The report provides a complete roadmap for setting up a hydrogen vehicle manufacturing plant. It covers a comprehensive market overview to micro-level information such as unit operations involved, cost breakdown, raw material requirements, utility requirements, infrastructure requirements, machinery and technology requirements, manpower requirements, packaging requirements, transportation requirements, etc.
Kunal Bansal Visits PEC Chandigarh_ Bridging Academia and Infrastructure Inno...Kunal Bansal Chandigarh
Kunal Bansal, Director of GMI Infra, recently visited Punjab Engineering College (PEC) in Chandigarh, highlighting the importance of collaboration between academia and the infrastructure industry. His unique blend of legal and project management expertise is shaping key developments across Mohali, bridging innovation with real-world execution.
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Shakti Moha...Continuity and Resilience
The 14th Middle East Business and IT Resilience Summit
Abu Dhabi, UAE
Date: 7th & 8th May 2025
Shakti Mohanty - IT Disaster Recovery Planning Building Resilient Digital Infrastructure
HyperVerge's journey from $10M to $30M ARR: Commoditize Your ComplementsNayan Kumar
This case study examines how HyperVerge can scale its identity verification solution from Asian markets to achieve global presence without diluting it's core value proposition.
Why Startups Should Hire Fractionals - GrowthExpertzGrowthExpertz
Startups are increasingly turning to fractional executives to scale smarter and faster. This deck highlights key data points showing why, from saving over $100K a year on salaries to achieving 50% growth and faster operational impact. If you're a founder looking to grow without the overhead of a full-time hire, this is worth a look. Reach out at marketing@growthexpertz.com or visit growthexpertz.com to learn more.
Top Solar Panel Manufacturers in India and Photovoltaic Module Manufacturers....Insolation Energy
Indian solar power and other clean energy sources are quickly becoming important all over the world. A lot of work is being done by the Indian government on clean energy, and many solar panel manufacturers in India are helping the country meet its eco-friendly goals.
Fillip Kosorukov graduated summa cum laude with a Bachelor’s in Psychology from the University of New Mexico in 2020, achieving Dean’s List honors. He thanked his family, friends, and mentors on graduation day.
The FedEx Effect; Innovation that Transformed Global Logisticsramavisca
The presentation titled "The FedEx Effect: Innovation That Transformed Global Logistics" by Raul Amavisca offers a high-level summary of the book’s key themes and insights. It emphasizes:
FedEx’s foundational innovations such as the hub-and-spoke model and COSMOS tracking system, which set new industry standards.
Strategic global expansion, including the acquisition of Flying Tigers and the establishment of major international hubs.
The Quality-Driven Management (QDM) framework and People-Service-Profit (PSP) philosophy, highlighting continuous improvement and employee-driven performance.
A comparative analysis of FedEx versus competitors (UPS, DHL, USPS), focusing on first-mover advantage and cultural differentiation.
FedEx’s ability to adapt to change, manage risks, and evolve leadership practices.
Leadership lessons, such as the importance of building systems, institutionalizing innovation, and aligning people, purpose, and process.
The presentation concludes with takeaways for leaders and a reinforcement of FedEx’s broader impact on logistics and business strategy
How to Integrate Telehealth Into Existing Workflows for Maximum Impact (1).pdfsundramvozo
70% of practices report fewer scheduling errors after integrating telehealth, yet many still struggle with disconnected systems and frustrated patients.
Juggling multiple platforms means wasted time, lost notes, and uneven care, until you build a truly unified workflow.
Here’s how to turn complexity into cohesion and achieve up to a 30% reduction in no-show rates and an 85% patient satisfaction score:
1. Choose a telehealth solution that fully syncs with your EHR and practice management software.
2. Equip clinical and administrative staff with hands-on platform training.
3. Analyze scheduling, consent, triage, and documentation steps, then redesign processes.
Solving Disintermediation in Ride-HailingNayan Kumar
An in-depth analysis of how Ola can combat revenue leakage through product design strategies that discourage off-platform transactions between drivers and riders.
Simmons is recognized as the best luxury mattress brand in Singapore, offering premium comfort and exceptional support. Known for innovation and craftsmanship, Simmons mattresses feature advanced technologies like pocketed coils and cooling materials. Perfect for discerning sleepers, Simmons delivers a superior sleep experience, making it the top choice in luxury bedding.
Vannin Healthcare Greencube Electronic Health Record -Modules and Features.pdfovanveen
Ad
IT Application Notes and Reviewer.pdf file
1. Ezekiel B. Olac BSA- C01
ITAPP
CLOUD INTRODUCTION
CLOUD COMPUTING
Refers to the delivery of computing services
over the internet
Allows users to access resources and services
on demands, without the need for physical
infrastructure or local servers
CLOUD COMPUTING (NIST DEFINITION)
Is a model for enabling convenient, on-
demand network access to a shared pool of
configurable computing resources
Promotes availability and is composed of five
essential characteristics, thee service models,
and four deployment models
CLOUD COMPUTING (WIKIPEDIA)
Is internet-based computing, whereby shared
resources, software and information are
provided to computers and other devices on
demand
Style of computing in which dynamically
scalable and often virtualized resources are
provided as a service over the internet
CLOUD COMPUTING (WHATIS.COM)
name cloud computing was inspired by the
cloud symbol that's often used to represent
the Internet in flowcharts and diagrams
is a general term for anything that involves
delivering hosted services over the Internet.
CLOUD COMPUTING (BERKELEY)
refers to both the applications delivered as
services over the Internet and the hardware
and systems software in the datacenters that
provide those services
services themselves have long been referred to
as Software as a Service (SaaS), so we use that
term. The datacenter hardware and software
is what we will call a
Cloud.
When a Cloud is made available
in a pay-as-you-go manner to the
public…… The service being sold is
Utility Computing.
CLOUD COMPUTING (BUYYA)
a type of parallel and distributed system
consisting of a collection of interconnected
and virtualized computers that are
dynamically provisioned and presented as
one or more unified computing resources
based on service-level agreements established
through negotiation between the service
provider and consumers.
CLOUD COMPUTING
Is a paradigm of computing, a new way of
thinking about IT industry but not any
specific technology
CENTRAL IDEAS
Utility Computing
SOA (Service Oriented Architecture)
SLA (Service Level Agreement)
PROPERTIES AND CHARACTERISTICS
High scalability and elasticity
High availability and reliability
High manageability and interoperability
High accessibility and portability
High performance and optimization
ENABLING TECHNIQUES
Hardware virtualization
Parallelized and distributed computing
Web service
CLOUD ECOSYSTEM
Public Cloud
Private Cloud
Community Cloud
Hybrid Cloud
PROPERTIES AND CHARACTERISTICS
SCALABILITY, ELASTICTY
Dynamic provision
Multi-tenant design
AVAILABILITY, RELIABILITY
Fault tolerance
System resilience
System security
PERFORMANCE, OPTIMIZATION
Parallel processing
Load balancing
Job scheduling
ACCESSIBILITY, PORTABILITY
Uniform access
Thin client
MANAGEABILITY, INTEROPERABILITY
Control automation
System monitoring
Billing system
BENEFITS OF CLOUD
COST SAVINGS
Pay for what you use, with no upfront
infrastructure costs
SCALABILITY
Easily scale resources up or down based on
demand
FLEXIBILITY
Access resources and applications from
anywhere with an internet connection
RELIABILITY
Cloud providers typically offer high uptime
and data redundancy
COLLABORATION
Enable seamless collaboration and data
sharing among teams
BENEFITS
FAULT TOLERANT
property that enables a system to continue
operating properly in the event of the failure
of some of its components.
Four Basic Characteristics
2. Ezekiel B. Olac BSA- C01
- No single point of failure
- Fault detection and isolation to the
failing component
- Fault containment to prevent
propagation of the failure
- Availability of reversion modes
HIGH AVAILABILITY
The degree to which a system, subsystem, or
equipment is in a specified operable and
committable state at the start of a mission,
when the mission is called for at an unknown
time.
RELIABILITY
The ability of a system or component to
perform its required functions under stated
conditions for a specified period of time.
SCALABILITY
ELASTICITY
KEY CHARACTERISTICS OF CLOUD COMPUITNG
CLOUD DEPLOYEMENT MODELS
Public cloud
Services are provided over a public network
and available to anyone
Cost-effective option for business and
individuals
Offer wide range of services accessible to the
general public
Private cloud
Infrastructure is dedicated to a single
organization and may be located on-premises
or off-premises
Designed to meet specific security
Offer enhances control, customization and
privacy
Hybrid cloud
Combines public and private cloud
environments
Organizations can leverage the benefits of
both public and private cloud
Deployments enable workload portability and
seamless integration
Community cloud
Deployment model where infrastructure and
services are shared among a specific
community
Caters to the needs of a particular
community
Provides a cost-effective solution while
addressing specific requirements
SERVICE MODEL OVERVIEW
DELIVERY MODELS OF CLOUD
SAAS (SOFTWARE AS A SERVICE)
Delivers software applications over the
internet
Users can access and use applications directly
through web browsers
Provider hosts and manages the underlying
infrastructure, application, and data
Users can typically customize certain aspects
of the application to fit their needs
use the provider’s applications running on a
cloud infrastructure.
The consumer does not manage or control
the underlying cloud infrastructure
Enabling Technique — Web Service
Web 2.0 is the trend of using the full
potential of the web
- Viewing the Internet as a computing
platform
- Running interactive applications through
a web browser
- Leveraging interconnectivity and mobility
of devices
- Enhanced effectiveness with greater
human participation
Properties provided by internet:
- Accessibility and portability
Provide service — Web-based Applications
Conventional applications should translate
their access interface onto web-based
platform.
Applications in different domains
- General Applications – applications
which are designed for general purpose
- Business Applications – applications
which are designed for business propose
- Scientific Applications – applications
which are designed for scientific propose
3. Ezekiel B. Olac BSA- C01
- Government Applications – applications
which are designed for government
propose
Provide service — Web Portal
Offer other services such as e-mail, news,
stock prices, etc.
Provide a way for enterprises to provide a
consistent look and feel with access control
Examples:
- iGoogle
- MSNBC
- Netvibes
- Yahoo!
PAAS (PLATFORM AS A SERVICE)
Offers a platform for developing, testing and
deploying apps
Users can focus on app development
Providers manage the underlying
infrastructure
Developers can leverage pre-configured
environments
Deploy onto the cloud infrastructure
consumer-created or acquired applications
The consumer does not manage or control
the underlying cloud infrastructure
System Architecture:
Enabling technique- Runtime Environment Design
Refers to collection of software services
available
Common properties in Runtime
Environment:
- Manageability and Interoperability
- Performance and Optimization
- Availability and Reliability
- Scalability and Elasticity
IAAS (INFRASTRUCTURE AS A SERVICE)
Provides virtualized computing resources over
the internet
Users have control over the operating
systems, storage and networking components
Can provision and manage virtual machines
Provision processing storage, networks and
other fundamental computing resources
The consumer does not manage or control
the underlying cloud infrastructure but has a
control over operating systems
Properties supported by virtualization
technique:
- Manageability and interoperability
- Availability and reliability
- Scalability and elasticity
Provide service — System Monitoring Interface
Several types of monitoring metrics:
- Virtual machine- should be able to
monitor some system states of each
virtual machine
- Virtual storage- should be able to
monitor some storage states of each
virtual storage
- Virtual Network- should be able to
monitor some network states of each
virtual network
COMMON CLOUD COMPUTING USE CASES
DATA STORAGE AND BACKUP
Store and back up large amounts of data
securely
SOFTWARE DEVELOPMENT AND TESTING
Rapidly create and deploy applications in a
scalable environment
WEB AND MOBILE APPLICATIONS
Host web and mobile applications in the
cloud for global accessibility
BIG DATA ANALYTICS
Process and analyze vast amounts of data
using cloud resources
DISASTER RECOVERY
Maintain data backups and recovery plans in
the cloud for business continuity
CLOUD ARCHITECTURE
Refers to the design and structure of cloud
computing environments, including the
arrangement of components and relationship
between them
Involves various elements that work together
to deliver cloud services and ensure
reliability, scalability and security
NIST ARCHITECTIRE OF CLOUD
CLOUD CONSUMER
An individual or organization that engages
in business partnership with Cloud
Providers
CLOUD PROVIDER
A person, organization or entity that is
accountable for offering services to
individuals or entities who are interested in
them
CLOUD AUDITOR
A party capable of conducting an impartial
evaluation of cloud services, as well as
4. Ezekiel B. Olac BSA- C01
assessing the performance, security, and
operations of the cloud implementation.
CLOUD BROKER
An entity responsible for managing the
utilization, performance, and delivery of
cloud services.
CLOUD CARRIER
An intermediary that facilitates the
connectivity and transportation of cloud
services from Cloud Providers to Cloud
Consumers
CLOUD ARCHITECTURE BEST PRACTICES
ETHICS
refers to the study of principles and values
that guide human behavior and decision-
making.
involves evaluating what is morally right or
wrong, just or unjust, and good or bad.
Ethics provides a framework for individuals
and societies to determine how to navigate
complex situations, make choices, and
interact with others
PROFESSIONAL ETHICS AND CHARACTER
refers to the moral guidelines and principles
that govern the behavior and conduct of
individuals within a specific profession.
help professionals make ethical decisions and
uphold their responsibilities to clients,
colleagues, the public, and the field as a
whole.
Ethical issues within a profession are
situations or dilemmas that involve
conflicting values or principles and require
careful consideration and resolution.
LEGAL, ETHICAL AND SOCIETAL ISSUES
BUSINESS ETHICS
The moral principles, policies, and values
that govern the way business and individuals
engage in business activity
Fundamental Business Ethics
- Fairness -Behavior
- Respect - Principle
- Honesty - Trust
- Accountability - Responsibility
- Loyalty - Relationship
- Integrity - Reliability
- Choice - Morality
- Avoid conflict - Compliance
- Relevant Information - Law abiding
- Fulfilling Commitments
CODE OF ETHICS
Providing a set of principles that affect
employee mindset and decision-making
CODE OF CONDUCT
A set of values, rules, standards, and
principles outlining what employers expect
from staff within an organization
Can range from big picture ideals to specific
rules
WHY CREATE CODE OF CONDUCT?
The organization making a commitment to
self-regulation
The organization has a framework to inform
ethical decision-making
Vital part of a company’s compliance and
legal policies
BY CREATING CODE OF CONDUCT
Staff understands what rules and
expectations management has
Organization has concrete company policies
5. Ezekiel B. Olac BSA- C01
Customers and partners understand the
values of organizations
Can help engender positive and receptive
attitude from customers
WHAT TO INCLUDE IN CODE OF CONDUCT
Values your organization believes in
Guidelines for behavior
Day-to-day business practices
How employees should interact with outside
parties
IMPORTANT FACTORS TO CONSIDER
1. Company Values
Details and topics related to the values the
company holds itself to.
- Business ethics
- Social responsibility
- Environmental responsibility
- Employee rights
- Commitment and responsibility
- Diversity and inclusion
2. Employee behavior
Leadership must explain to all employees
what is expected of them in terms of behavior
and performance.
- Standards and professionalism
- Discrimination and sexual harassment
policies
- Use of company asset
- Use of social media
- Communication rules
- Disciplinary process
3. Internal practices
Defined rules related to day-to-day business
practices that are easy to explain
- Dress code
- Annual leave/ holiday time
- Inclement weather policy
- Break policy
- Onboarding process
- Job duties
- Training guidelines
- Rules related to time off through
illness/injury
- Attendance and punctuality
- Use of phone while at work
- Benefits
- Chain of command
4. External practices
Should define the expectations for employees
when dealing with external parties
- Confidentiality
- Privacy
- Intellectual policies
- Customer communication requirements
- Conflict of
PROFESSIONAL ETHICS
INTRODUCTION
Is a fundamental framework that guides the
behavior and decision-making of individuals
Encompasses set of principles, values and
standards that professionals adhere
Its aim is to maintain integrity, foster trust,
and uphold the well being of clients
Cornerstone of responsible practice
Examines moral and ethical issues
KEY CONCEPTS
1. Code of Ethics
Outline the ethical principles and standards
expected of their members
2. Conflicts of Interest
Personal interests’ conflict with their
professional duties
3. Client Confidentiality
Maintaining privacy of client information is a
fundamental ethical obligation
4. Professional competence
Expected to maintain a high level of
competence in their field
5. Honesty and integrity
Professionals are expected to maintain a high
level of competence in their field
6. Informed consent
Must ensure clients and stakeholders are fully
informed about the nature, risks, and
benefits of the services
7. Whistleblowing
They may face the ethical dilemma of
whether to blow the whistle on these actions
8. Diversity and Inclusion
Professionals should promote diversity,
equity and inclusion in their practice and
interactions.
9. Boundaries
Maintaining appropriate boundaries between
professionals and clients, colleagues or other
stakeholders
10. Social responsibility
Professionals often have broader
responsibility to contribute positively to
society
11. Environmental ethics
Some professionals have an impact on the
environment
12. Global considerations
In a globalized world, professionals may
encounter ethical dilemmas
CYBER THREATS AND SECURITY
MALWARE
Any program or file that is intentionally
harmful to a computer, network or server
SOCIAL ENGINEERING
6. Ezekiel B. Olac BSA- C01
Form of cyber-attack in which criminals
manipulative victims into handing over
sensitive information
TYPES OF SOCIAL ENGINEERING
1. Phishing- sending fraudulent emails or
messages that appear to be from
reputable source
2. Pretexting- creating fabricated scenario or
pretext to deceive individuals into sharing
info
3. Baiting- offering something enticing that
contains malware
4. Quid Pro Quo- offering something in
exchange for info
5. Tailgating- physically following someone
into restricted area
6. Impersonation- pretending to be
someone else
7. Dumpster diving- scavenging through
discarded materials
8. Vishing (Voice Phishing)- using voice
communication
9. Smishing (SMS Phishing)- sending
fraudulent text messages to trick
recipients
10. Water Holing- compromising websites
frequented by the target demographic
IDENTIFYING THEFT
when someone steals another person's
personal information, such as their name,
Social Security number, credit card number,
or other identifying details, with the
intention of impersonating them
FRAUD
involves intentional deception for financial
gain or to cause harm
ONLINE HATE CRIMES
refer to criminal acts that are motivated by
hatred or prejudice and are carried out
through online platforms or digital
communication channels
DATA BREACH
refers to the unauthorized access, disclosure,
or acquisition of sensitive or confidential
information from a secure location
CYBER VANDALISM
broad range of malicious activities conducted
with the intention of causing damage,
disruption, or chaos to digital properties
WEBSITE DEFACEMENT
refers to the act of altering the visual
appearance or content of a website without
permission.
RANSOMWARE
type of malicious software (malware) designed
to encrypt files on a victim's computer or
network, rendering them inaccessible, and
then demand payment (a ransom) in
exchange for decrypting the files and
restoring access.
RA 11934 (SIM REG ACT)
is a Philippine law mandating the registration
of SIM cards before activation
RA 10175 (CYBERCRIME PREVENTION ACT)
is a law in the Philippines that was approved
on September 12, 2012
aims to address legal issues concerning online
interactions and the Internet in the
Philippines.
SCAREWARE
type of malware that tricks users into
believing their computer is infected with a
virus or other malicious software, often
through alarming pop-up messages or fake
system notifications
ZOMBIES
refers to the creation of a network of
compromised computers (also known as a
botnet) under the control of the attacker
PHISHING
attackers use deceptive emails, text messages,
or websites to trick individuals into divulging
sensitive information such as login
credentials, personal information, or
financial data.
SPEAR PHISHING
highly targeted form of phishing attack in
which the attacker customizes their phishing
messages to target specific individuals or
organizations.
DEEPFAKES
type of synthetic media generated using deep
learning techniques, particularly generative
adversarial networks (GANs)
QUISHING (QR PHISHING)
is a type of cyber attack that leverages Quick
Response (QR) codes to deceive users and
steal sensitive information.
PHARMING
involves redirecting website traffic from
legitimate websites to fraudulent ones
without the users' knowledge or consent