1 / 13

Cloud Computing Dangers and Pitfalls

Cloud Computing Dangers and Pitfalls. Cloud Computing. What is cloud computing What is necessary to move to cloud computing Types of cloud computing products Common pitfalls in moving to the cloud Dangers in the cloud industry Developing a strategy for implementation.

janetc
Download Presentation

Cloud Computing Dangers and Pitfalls

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cloud Computing Dangers and Pitfalls Forensic & Security Services

  2. Cloud Computing • What is cloud computing • What is necessary to move to cloud computing • Types of cloud computing products • Common pitfalls in moving to the cloud • Dangers in the cloud industry • Developing a strategy for implementation Forensic & Security Services

  3. Defining “Cloud Computing” • “Cloud computing is a model enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model is comprised of five essential characteristics, three service levels, and four deployment models.” Source: National Institute of Standards and Technology 2011 Forensic & Security Services

  4. Differences between Cloud computing and legacy computing Legacy Model Cloud Model Logical Hardware Resource licensing Logical security Outsourced it staff Control shared with provider • Physical Hardware • Permanent Program Licenses • Physical Security • IT support staff • Total control over environment Forensic & Security Services

  5. Procurement differences Legacy Model Cloud Model Service purchase Agree to online contract Supply form of payment Begin using service • Hardware purchase • Software purchase • Installation • Configuration • Testing • Production Forensic & Security Services

  6. Cloud Business Issues • Is the cloud suitable for storage of the type of data? • User support provided? • Contract termination provisions? • Data migration support. • Security management and controls responsibility • Reliability of service Forensic & Security Services

  7. Cloud legal issues • Change of control of provider • Location of data • Security management and controls • Legal production of data and logs • Going out of business timetable • Remedies for bad performance Forensic & Security Services

  8. Jurisdictional Issues • International boundaries and data redundancy • Regulatory constraints • Provider's location • Dispute resolution • Law enforcement response Forensic & Security Services

  9. Moving to the Cloud • Assessment of needs and requirements • Technical expertise • Project Planning • Parallel Testing • Migration of Data • Service Level Monitoring Forensic & Security Services

  10. Cloud Computing Models • Infrastructure as a Service (IAAS) • Platform as a Service (PAAS) • Software as a Service (SAAS) • Private Clouds • Hybrid Clouds • Public clouds Forensic & Security Services

  11. Cloud Migration Pitfalls • Understanding business terms • Service level agreements • Technical assumptions • Too good to be true • Cost savings Forensic & Security Services

  12. Industry Dangers • Vendor stability • Communications reliability • Security of data • User satisfaction levels • Financial payback Forensic & Security Services

  13. What to do in Cloud Computing • Obtain proper expertise • Assess the financial aspects and savings claims • Develop a sound technical solution • Hire a team with experience • Train staff for ongoing support and maintenance • Develop a project plan Forensic & Security Services

More Related