Pro 4-6 | Computer Science homework help

Project 1: Overview of Cloud Technology
Step 4: Define the IT Business Requirements

After considering the economic aspects of the cloud, the next logical step is to narrow the particular requirements of cloud computing for the organization. It is important that your presentation works toward 

building a business case for cloud computing
.

Your presentation must address BallotOnline’s 

business requirements
 and 

critical IT requirements related to data storage
. Make sure you classify the requirements into functional (behavior) and nonfunctional, as per the requirements definition link.

Take NOTE:

The business requirements should be explicit directives specifying what the solution should deliver for the business, formulated using imperative language (system 
should, or 
must, or 
will do this and that) rather than a general description of cloud solution features.

IT Business Needs

You will need to assess the IT needs or requirements of the business to determine whether cloud computing is a feasible option for the organization. To evaluate what the IT business requirements are, you should look at the company’s historical IT needs (current IT infrastructure), future growth areas of the business (new business and expected growth projections), and evaluating financial factors (ROI, TCO, IT budgets, service costs).

Cloud Reference Model

A cloud reference model or architecture helps you to better understand the different parties that perform transactions, processes, or tasks in a cloud computing model, as well as the interactions between these parties.

Cloud reference architecture of a cloud provider, cloud consumer, cloud auditor, and cloud carrier. This also includes service orchestration, cloud service management, security, privacy, and cloud broker.

Source: National Institute of Standards and Technology. (2011). 
NIST cloud computing reference architecture. In the public domain.

Cloud Architecture

Cloud architecture is a term referring to the various components required under a cloud computing model. For example, in an infrastructure as a service (IaaS) delivery model, these components might include compute and storage nodes and network connectivity, and it is up to the cloud architect to determine how these components should interact with one another. In a software as a service (SaaS) delivery model, these components might include front-end interfaces (web, mobile), middleware (business-specific applications, application servers), back-end (databases), load balancing, and caching services (Akamai, memcached, Amazon ElastiCache).

Cloud Migration Methods

Organizations moving to cloud computing models need to evaluate how to migrate their existing IT workloads and data. Each organization has to evaluate whether it wishes to hire a third party to help facilitate the migration, or perform the migration using its own IT staff. Different migration methods may be used depending on whether it is an application, database, or infrastructure services.

Current Trends in Cloud Computing

Cloud computing is fast-paced and rapidly evolving, so the current trends today will be different than the trends tomorrow (Boulton, 2016).

· Some organizations may shift away from private clouds, in favor of less expensive public cloud implementations.

· Cloud cost containment is very important, and new cost management tools are being developed to aid in this.

· Applications are being rewritten as native cloud applications.

· Enterprise applications are moving to the public cloud.

Business Requirements

Print

A requirements analysis involves a systematic evaluation of needs derived from a company’s business goals and strategy. One approach to determining requirements involves the classification of functional and nonfunctional system requirements.

Functional Requirements

Functional requirements are at the heart of systems or technology development. Functional requirements specify the behavior of a system and determine what the system should do. These requirements are developed well before the acquisition or development of systems. The activity can be performed during the system design and can be application- or architecture-driven. For example, a functional requirement for a calculator would be “must be able to add, subtract, multiply, and divide numbers.”

Typical functional requirements are (Eriksson, 2012):

· business rules

· transaction corrections, adjustments, and cancellations

· administrative functions

· authentication

· authorization levels

· audit tracking

· external interfaces

· certification requirements

· reporting requirements

· historical data

· legal or regulatory requirements

These rules determine things such as operations, systems reports, and workflow. These requirements are also the determining factor when evaluating system compliance. Typically, the flow of functional requirements incorporates such things as user request, feature, use case, and business rule.

Examples of Functional Requirements

User request: I need to send secure messages in the new application.

Feature: End-to-end encryption when sending messages.

Use case: This feature will be enabled when the application sends communications to the database.

Business rule: All encryption must be FIPS 140-2 compliant.

Nonfunctional Requirements

Nonfunctional requirements specify how the system will support the functional requirements. They may include ways of verification of functional requirements fulfillment, as well as any remaining requirements that are not covered by the functional requirements.

While functional requirements are necessary to make the system or component work nonfunctional requirements can determine how well the system or component works because they describe the “quality characteristics” or “quality attributes” of the functional requirements (Eriksson, 2012).

Typical nonfunctional requirements include (Eriksson, 2012):

· performance (e.g., response time, throughput, utilization, static, volumetric)

· scalability

· capacity

· availability

· reliability

· recoverability

· maintainability

· serviceability

· security

· regulatory

· manageability

· environmental

· data integrity

· usability

· interoperability

Examples of Nonfunctional Requirements

Availability: The Online Payment System will be available for users between the hours of 5:00 a.m. and 11:00 p.m. EST.

Capacity: Up to 1,000 total users can use the system.

Maintainability: Changes required by law will applied at least 3 months before the law becomes enforceable.

Reliability: Will be available to users 98 percent of normal working hours.

Security: Only users with the role “Administrator” or “Supervisor” can make changes to the system.

 

Critical IT Requirements Related to Data Storage

Print

Security rules and procedures protect information and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. Examples of IT requirements that support secure data storage include the following (Niels, Dempsey, and Pillitteri, 2017):

Data Protection

Encryption of data (at rest and in transit)

· Encryption transforms intelligible data, called plaintext, into an unintelligible form, called ciphertext. This is reversed through the process of decryption.

Appropriate security technologies

· e.g., intrusion detection and protection systems, firewalls, configuration settings

Audit Trails

Records of system activity, including information on system processes, application processes, and all user activities, should be maintained. These records could be used to find security violations, application flaws, and/or understand performance problems within the system.

Separation of Data

Separation of data in this context means that individual clients may require that their data be stored in an environment that is either logically separated using software or physically separated using hardware isolation.

Separation of Duties

Separation of duties is the process by which roles specific to handling sensitive systems and data are segmented so that no single individual has total control of—or access to—a system. Separation of duties can reduce insider threats by limiting the access any one individual has to a system. Such separation can also serve as a checks and balances system for security. This differentiates the individuals who design or test a system from those who conduct security testing or monitoring.

Project 1: Overview of Cloud Technology
Step 5: Prepare a SWOT Analysis

In this step, you will apply the information gathered in the business analysis to assess the benefits and possible drawbacks of adopting cloud infrastructure for BallotOnline.

Take Note

What Is a SWOT Analysis?

SWOT analysis acronym stands for Strength, Weaknesses, Opportunities, and Threats.

Iamnee/Essentials Collection/iStock

Your supervisor, Sophia, recommends that you include a 
SWOT analysis in your presentation, since the BallotOnline company executives will want you to go over both the advantages and disadvantages of cloud adoption and any important internal and external factors that may influence the success of the project.

Take Action

Demonstrate your critical-thinking abilities by identifying the strengths, weaknesses, opportunities, and threats of adopting cloud computing.

First, articulate each of these areas for the SWOT analysis:

1. Identify the key strengths (advantages) of adopting cloud computing.

2. Identify the major weaknesses (disadvantages) of adopting cloud computing.

3. Are there any opportunities that cloud computing enables the organization to take advantage of?

4. What are the threats that an organization considering adopting cloud computing needs to consider?

Next, evaluate how to achieve the following outcomes to add to the SWOT analysis:

1. How can you use strengths to take advantage of opportunities?

2. How can you overcome weaknesses to take advantage of opportunities?

3. How can you use strengths to avoid threats?

4. How can you minimize weaknesses and avoid threats?

Use the 
SWOT analysis template to organize your ideas.

When you have completed the SWOT analysis, move to the last step, which is the final

SWOT Analysis Template

STRENGTHS

1.

2.

3.

4.

WEAKNESSES

1.

2.

3.

4.

OPPORTUNITIES

1.

2.

3.

4.

Opportunity-Strength (OS) Strategies

Use the strengths to take advantage of opportunities

1.

2.

Opportunity-Weakness (OW) Strategies

Overcome weaknesses by taking advantage of opportunities

1.

2.

THREATS

1.

2.

3.

4.

Threat-Strength (TS) Strategies

Use strengths to avoid threats

1.

2.

Threat-Weakness (TW) Strategies

Minimize weaknesses and avoid threats

1.

2.

image2.png

image1.png

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more