Answer To: This is an individual assessment. Questions are to be completed using Microsoft Word for all written...
Nishtha answered on Oct 19 2021
FNS40217 – CERTIFICATE IV IN ACCOUNTING & BOOKKEEPING
UNIT CODE: BSBSMB412
UNIT NAME: INTRODUCE CLOUD COMPUTING INTO BUSINESS OPERATIONS
ASSESSMENT 1: RESEARCH FOLIO
Table of Contents
1. 3
2. 3
3. 4
4. 4
5. 4
6. 5
7. 5
8. 5
9. 5
10. 6
11. 6
12. 6
13. 6
14. 7
15. 7
16. 7
References 8
1.
On-demand self-service
Cloud computing services can be supplied without the service provider's human involvement. In other words, without passing through to the cloud provider, a manufacturing company may supply extra computing services as needed. This could be a space for computing, instances of a virtual machine and instance of a database.
Multi-tenancy and resource pooling
Tools for cloud computing are intended to support a multi-tenant model. Multi-tenancy requires various consumers to obtain the same apps or the same basic infrastructure while protecting their data confidentiality and protection. It is common among people living in an apartment complex, sharing the same infrastructure projects, but inside that infrastructure, they still want their own apartments and privacy. It is how the multi-tenancy cloud operates.
Rapid elasticity and scalability
The ability to easily provide cloud services when manufacturing companies require them is one of the best things about cloud computing. Then, once they do not need them, delete them. In line with business demands, cloud computing services may scale up or down quickly and, in some situations, automatically. It is a key cloud-computing feature. Without additional contracts or fines, the use, capability and thus cost may be scaled up or down.
2.
Together with software development and IT operation, technology as code, micro - services and frameworks, organisations are adopting cloud computing, once again we see people and process problems slowing down wide adoption. When accepting cloud computing within a large organisation, it is so important to concentrate on organisational change.
Delivery Speed
Many companies are adopting the software development and IT operation revolution in order to satisfy the business demands of bringing new services to market more quickly. The enterprises, which are effective in moving toward that agile development model, are more often able to launch smaller sets of changes to output (Mazzara, et al., 2018).
Agility vs. Power
To protect the business from the possibility of security threats, highly controlled businesses also deploy very strict controls. Most of these controls are applied with a set of, mostly manual, procedures that slow down the SDLC dramatically. It is mentioned that developers should function under these constraints in an environment where we produce about once 3 to 6 months (Ayma, et al., 2019).
3.
The risks are unauthorised access to consumer and business information, vendor protection risks, regulatory and legal risks, inadequate control risks and accessibility risks. When business use a cloud service, the threat of government interference often rises. It is indicated that when business rely on a cloud service for a business-critical mission (Drissi, et al., 2016). The place company's confidence in other people's hands and the efficiency of the work is always a risky task. The reputation no longer relies on the credibility of only company, but now it also relies on the credibility of the company of the vendor. Moreover, that is a risk from cloud computing. Also, bear in mind that cloud information is maintained from anywhere on the internet, meaning that business data can be compromised if a data breach occurs through hacking, a disgruntled former employee, or sloppy username / password protection. Moreover, all the time, cyber-attacks occur more to secure government businesses.
4.
A mission critical system is the process that is vital to a corporation or organisation's survival. Company activities are greatly disrupted when a mission critical device fails or is disrupted. Aircraft management systems, power grid systems and crisis communications systems are instances of mission critical systems. However, with many organisations relying on business-critical systems to conduct work and generate value, human existence does not want to be on the track (Tchernykh, et al., 2019). A business-critical activity or method may be important for the long-term success of a business or even its existence. The failure of a job or process that is mission-critical instantly stops an organisation or a system in its path. According to the mission-critical functions of the system, emergency alert centres, computerised health worker records, data storage centres, stock exchanges and some other operations based on networking and telecommunication systems have to be secured against breakdowns.
5.
If there is, a system lets or hard drive malfunction, the key purpose for backup data is to save valuable files. If the initial backup results in the data manipulation or hard drive malfunction,...