About 10 Per T erabyte Lease storage capacity from third party All incoming data from drones automatically uploaded Average monthly storage costs cut at least 50 Power savings backup time saved no ID: 722332
Download Presentation The PPT/PDF document "The Cloud Chapter 6 “ How" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
Slide1
The Cloud
Chapter 6Slide2
“
How
About $10 Per Terabyte.”
Lease storage capacity from third party.All incoming data from drones automatically uploaded.Average monthly storage costs cut at least 50%.Power savings, backup time saved, no new hardware configuration.One-time set up and development costs.
Copyright © 2017 Pearson Education, Inc.Slide3
Study Questions
Q1:
Why is the cloud the future for most organizations?Q2:
What network technology supports the cloud?Q3: How does the cloud work?Q4: How do organizations use the cloud?Q5: How can Falcon Security use the cloud?Q6: How can organizations use cloud services securely?Q7: 2026?Copyright © 2017 Pearson Education, Inc.Slide4
Q1: Why Is the Cloud the Future for Most Organizations?
The Cloud
Elastic
leasing of pooled computer resources via Internet.ElasticAutomatically adjusts for unpredictable demand, Limits financial risks.PooledSame physical hardwareEconomies of scale
Copyright © 2017 Pearson Education, Inc.Slide5
Example of a Video Banner Ad Customer
Copyright © 2017 Pearson Education, Inc.Slide6
Pooled
E
conomies of scale
Average cost decreases as size of operation increases.Major cloud vendors operate enormous data centers (Web farms).Copyright © 2017 Pearson Education, Inc.Slide7
Apple Data Center
in Maiden
, NC
Billion-dollar facility contains more than 500,000 sq. ft.Copyright © 2017 Pearson Education, Inc.Slide8
Why Is the Cloud Preferred to
In-House Hosting
?
Copyright © 2017 Pearson Education, Inc.Slide9
Why Is the Cloud Preferred to
In-House Hosting? (cont'd)
Copyright © 2017 Pearson Education, Inc.Slide10
Why Now?
Cheap processors, essentially free data communication and storage.
Virtualization technology.
Internet-based standards enable flexible, standardized processing capabilities.Copyright © 2017 Pearson Education, Inc.Slide11
When Does the Cloud Not Make Sense?
When law
or standard industry practice require physical control or possession of the
data.Financial institutions legally required to maintain physical control over its data.Copyright © 2017 Pearson Education, Inc.Slide12
Ethics Guide: Cloudy Profit?
Data
broker (or data
aggregator).Acquiring and analyzing market, buyer, and seller data for real estate agents.Alliance transitioned data storage and processing from own Web farm to the cloud.Improved speed and quality of data services
at fraction of
prior
costs, cut in-house hardware
support staff by
65%.
P
lowing
money back into
R&D.
Copyright © 2017 Pearson Education, Inc.Slide13
Q2: What Network Technology Supports the Cloud?
Copyright © 2017 Pearson Education, Inc.Slide14
Typical Small Office/Home
Office (
SOHO) LAN
Copyright © 2017 Pearson Education, Inc.Slide15
LAN Protocol
IEEE 802.3
Wired LAN
10/100/1000 Mbps EthernetIEEE 802.11Wireless LAN802.11acSpeeds up to 1.3 Gbps
Bluetooth
Transmits
data
short distances.
Connect computer, keyboard, mouse, printer, smartphones,
smartwatches, automobiles,
sports equipment,
clothing.
Copyright © 2017 Pearson Education, Inc.Slide16
Abbreviations Used for Communications and Computer Memory Speeds
Communications
equipment,
K(ilo) = 1,000, not 1,024 (as for memory); M(ega) = 1,000,000, not 1,024 × 1,024; G(iga) = 1,000,000,000, not 1,024 × 1,024 × 1,024.
100
Mbps =
100,000,000
bits per second.
Communications speeds expressed
in
bits
,
memory sizes in
bytes
.
Copyright © 2017 Pearson Education, Inc.Slide17
Connecting Your LAN to the
Internet
Important ISP functions:
Provide legitimate Internet address. Provide gateway to Internet.Pay access fees and other charges to telecoms.WAN wireless average performance 1 Mbps, with peaks of up to 3.0 Mbps.Typical wireless LAN 50 Mbps.
Copyright © 2017 Pearson Education, Inc.Slide18
Summary of LAN Networks
Copyright © 2017 Pearson Education, Inc.Slide19
Q3:
How Does the Cloud Work?
The cloud resides in the
Internet
Copyright © 2017 Pearson Education, Inc.Slide20
Carriers and Net Neutrality
Messages, broken into
packets. Packets move across
Internet, passing through networks owned by telecom carriers.Peering agreements - Carriers freely exchange traffic amongst themselves without paying access fees. Net neutrality principleAll data treated equally.Problem: some people use more bandwidth than others.
Copyright © 2017 Pearson Education, Inc.Slide21
Internet Addressing
Public IP addresses
Identifies a unique device on
Internet.Assigned by ICANN (Internet Corporation for Assigned Names and Numbers.Private IP addresses Identifies a device on a private network, usually a LAN.Assignment LAN controlled.
Copyright © 2017 Pearson Education, Inc.Slide22
IP Addressing:
Major
Benefits
Public IP addresses conservedOne public IP address per LAN. Using private IP addresses
Eliminates
registering public IP address with ICANN-approved agencies.
Protects against direct attack.
Copyright © 2017 Pearson Education, Inc.Slide23
Public IP Addresses and Domain Names
IPv4
165.193.123.253
Domain nameUnique name affiliated with a public IP address.Dynamic affiliation of domain names with IP addresses.Multiple domain names for same IP address. URL (Uniform Resource LocatorInternet address
p
rotocol, such as
http:
//
or ftp
:
//.
Copyright © 2017 Pearson Education, Inc.Slide24
Domain Registry Company
Copyright © 2017 Pearson Education, Inc.Slide25
Processing on a Web Server
What
happens when
you visit a Web site and order something, and pay for it?Copyright © 2017 Pearson Education, Inc.Slide26
Three-tier Architecture
Copyright © 2017 Pearson Education, Inc.Slide27
Watch the Three Tiers in Action
!
Sample of Commerce Server Page
Commerce server requests shoe data from
DBMS.
DBMS
reads from
database, returns
data
to
commerce server.
Commerce server
formats Web page
with
data and sends html version of page to user’s computer.
Customer places items in shopping cart
.
Customer
checks out, commerce server program processes payment, schedules inventory processing, arranges
shipping, email receipt to customer.
Copyright © 2017 Pearson Education, Inc.Slide28
SOA Analogy: Approval
Request
Interactions Among Three Departments
CheckCustomerCredit• ApproveCustomerCredit• VerifyInventoryAmount
• AllocateInventory
• ReleaseAllocatedInventory
Copyright © 2017 Pearson Education, Inc.Slide29
Using SOA Principles, Each Department Defines:
CheckCustomerCredit
ApproveCustomerCredit
Inventory DepartmentVerifyInventoryAmountAllocateInventoryReleaseAllocatedInventoryEach department formally states data to receive with request and data promised to return in response.
Every interaction
done
exactly
same way.
Copyright © 2017 Pearson Education, Inc.Slide30
Using SOA
Principles:
EncapsulationNo department needs to know
who works in another department, or how dept. accomplishes work. Each department free to change personnel task assignments, change processes for performing services.Falcon Security could dynamically create 1,000 Inventory Departments and Sales Department with no need to change anything it does.
Copyright © 2017 Pearson Education, Inc.Slide31
SOA Principles Applied to
Three-tier Architecture
Services
ObtainPartDataObtainPartImages
ObtainPartQuantityOnHand
OrderPart
JavaScript
written to invoke these services correctly.
Copyright © 2017 Pearson Education, Inc.Slide32
Protocols Supporting Web Services
Copyright © 2017 Pearson Education, Inc.Slide33
WSDL, SOAP, XML, and JSON
WSDL (Web Services
Description Language)
Standard for describing services, inputs, outputs, other data supported by a Web service. Documents coded machine readable and used by developer tools for creating programs to access the service.
SOAP
(no longer an acronym)
Protocol for requesting Web services and for sending responses to Web service requests.
XML
(eXtensible Markup Language)
Used for transmitting documents. Contains metadata to validate format and completeness of a document, includes considerable overhead (see Figure 6-15a).
JSON
(JavaScript Object Notation)
Markup language used for transmitting documents. Contains little metadata. Preferred for transmitting volumes of data between servers and browsers. While notation in format of JavaScript objects, JSON documents can be processed by any language (see Figure 6-15b).
Copyright © 2017 Pearson Education, Inc.Slide34
Example XML and JSON
Documents
Copyright © 2017 Pearson Education, Inc.Slide35
Q4: How Do Organizations Use the Cloud?
Three
Fundamental
Cloud TypesCloud Services from Cloud Vendors
Copyright © 2017 Pearson Education, Inc.Slide36
Content Delivery Networks from
Cloud Vendors
Content delivery network (CDN)
Stores user data in many different geographical locations and makes data available on demand. Specialized type of PaaS, but usually considered in its own category.Minimizes latency.Used to store and deliver content seldom changed.
Copyright © 2017 Pearson Education, Inc.Slide37
CDN Benefits
Copyright © 2017 Pearson Education, Inc.Slide38
Servers Used in a Typical
CDN Service
Copyright © 2017 Pearson Education, Inc.Slide39
Using Web Services
Internally
Private Internet Infrastructure
Copyright © 2017 Pearson Education, Inc.Slide40
Q5: How Can Falcon Security Use
the
Cloud?SaaS products
Falcon Security could use.Google MailGoogle DriveOffice 365Salesforce.comMicrosoft CRM OnLinemany others . . .Copyright © 2017 Pearson Education, Inc.Slide41
PaaS Services from
Amazon DBMS
Products with Elastic Cloud 2 (EC2)
Falcon Security could use CDN
to distribute content worldwide and respond to leads generated from
advertising.
Copyright © 2017 Pearson Education, Inc.Slide42
IaaS Services at
Falcon Security
Provides
basic hardware in the cloud. May acquire servers to load operating systems. Considerable technical expertise and management.Alternative: Use elastic data storage services.
SaaS
and PaaS
provide more added value to Falcon Security.
Copyright © 2017 Pearson Education, Inc.Slide43
Q6: How
Can Organizations Use
Cloud Services Securely?
Remote Access Using VPN: Actual Connections
Copyright © 2017 Pearson Education, Inc.Slide44
Remote Access Using
VPN: Apparent
Connection
Copyright © 2017 Pearson Education, Inc.Slide45
Private Cloud for
Inventory and
Other Applications
Copyright © 2017 Pearson Education, Inc.Slide46
Accessing Private Cloud over a
Virtual Private
Network
Copyright © 2017 Pearson Education, Inc.Slide47
Using A Virtual Private Cloud
Subset of a Public Cloud With Highly Restricted, Secure
Access
Copyright © 2017 Pearson Education, Inc.Slide48
Q7: 2026
C
loud services
faster, more secure, easier to use, cheaper.Fewer organizations own their computing infrastructure.More pooling of servers across organizations.Overall size of the cloud gets bigger.Individuals, small businesses, large organizations obtain elastic resources at very low
cost.
Cloud fosters
new categories of
work.
Copyright © 2017 Pearson Education, Inc.Slide49
Q7: 2026 (cont’d)
Remote
action systems
TelediagnosisTelesurgeryTelelaw enforcementProvide services in dangerous locations.Watch top-notch performers and performances.Reduces value of local mediocrity.Copyright © 2017 Pearson Education, Inc.Slide50
So What? "Net Neutrality Enabled"
ISPs
little control over amount
, type, or origin of content.30% of U.S. Internet traffic during peak hours associated with using Netflix.Net neutralityAll users and content providers treated equally.No “fast” or
“slow”
lanes.
ISPs not
allowed to block, or
slow
, content associated with
competitors.
ISPs can’t
charge heavy Internet users additional fees or taxes.
Copyright © 2017 Pearson Education, Inc.Slide51
FCC Approved New Regulations (2015)
Renders
Internet a utility.Complaint: Interfering
with free markets.ISPs argue loss of potential revenue stream inhibits infrastructure development, limits growth, and stifles innovation. Larger war on net neutrality may have only just begun!Copyright © 2017 Pearson Education, Inc.Slide52
Security Guide: From Anthem to Anathema
G
reater accessibility
data more accessible to hackers.80 million customers affected.Stole names, addresses, Social Security numbers, and salaries.Stored in plain text.Lawsuits filed.Premera Blue Cross Bank-account and medical data of 11 million customers.
Copyright © 2017 Pearson Education, Inc.Slide53
Guide: Is It Spying or Just Good
Management?
92%
of employers monitor employees’ email, telephone, and Internet use. Key loggersLog filesPacket sniffersText miningFirst Amendment Preserves free speech regarding laws Congress may enact, limited protection for
federal
employees
.
Does not
protect
you
at work
.
Copyright © 2017 Pearson Education, Inc.Slide54
Active Review
Q1:
Why is the cloud the future for most organizations?Q2:
What network technology supports the cloud?Q3: How does the cloud work?Q4: How do organizations use the cloud?Q5: How can Falcon Security use the cloud?Q6: How can organizations use cloud services securely?Q7: 2026?Copyright © 2017 Pearson Education, Inc.Slide55
Case Study 6: FinQloud Forever … Well, At Least For The Required Interval …
Securities
and Exchange Commission
(1937). Securities brokers' records must be stored on media that cannot be altered.Interpreted to enable storage of records on read-write medium, provided it includes software to prohibit data alteration (2003).Copyright © 2017 Pearson Education, Inc.Slide56
Components of the
FinQloud System
Copyright © 2017 Pearson Education, Inc.Slide57
FinQloud Forever
… (cont'd)
Creates “finger print” based on content of
record. SEC specifically excludes extrinsic controls: Authentication, passwords, and manual procedures,Believes such systems to could be readily misused to overwrite records.When properly configured, meets requirements of SEC’s Rule17a-3) and similar rules of Commodities Futures Trading Commission.
Copyright © 2017 Pearson Education, Inc.Slide58
Copyright © 2017 Pearson Education, Inc.