Professional Documents
Culture Documents
ISAD GROUP 1 Virtualization and Cloud Computing Environment and Business Application System
ISAD GROUP 1 Virtualization and Cloud Computing Environment and Business Application System
Computing Environment
and
G R O U P 1
BONITO, Vina Joy BRIONES, Veronica Jane LANDICHO, Karen MENIADO, Eryka Gwyneth VALERO, Aerah Mae
GUESS
THE
LOGO
DROPBOX
ONEDRIVE
CISCO WEBEX
ZENDESK
SAP
INFORMATION SYSTEMS ANALYSIS & DESIGN
Isolation
02
Virtualization software’s self-contained VMs provide guest users
(a designation that includes not only people but applications,
OSs, and devices) with an isolated online environment. That
separation protects sensitive information while also allowing
guests to stay connected.
CHARACTERISTICS OF VIRTUALIZATION
Availability
03
Virtualization software offers several features you won’t get with
physical servers that help increase uptime, availability, fault
tolerance, and more–helping users avoid downtime that
undermines user productivity and introduces security threats and
safety hazards.
Aggregation
04
While virtualization allows multiple devices to share resources from a single machine, it can also be
used to combine several devices into one powerful host. Aggregation requires cluster management
software, which connects a homogeneous group of computers or servers together to create a
unified resource center.
Reliability
05
These days, virtualization platforms ensure constant uptime via automated load balancing, which
runs redundant servers on different host machines to prevent outages. That way, hardware failures
are little more than a minor inconvenience. Do note that if downtime is a major concern, you might
need to invest in some backup hardware to act as a fail-safe.
Types of
Virtualization
01
Server Virtualization
allows users to consolidate and
redistribute resources for more
efficient resource utilization.
02 Data Virtualization
allows users to easily manipulate data
using an abstraction that exists
independent of actual data structure and
database systems.
TYPES OF VIRTUALIZATION
03
Software Virtualization
also called application virtualization is the
practice of running software from a remote
server. Software virtualization is similar to that
of virtualization except that it is capable to
abstract the software installation procedure
and create virtual software installation.
TYPES OF VIRTUALIZATION
04
Desktop Virtualization
Desktop virtualization allows users to run multiple
desktop operating systems from a single computer
and fall into two main categories.
05
Storage virtualization
CHARACTERISTICS OF IAAS:
1. Resources are available as a service
2. Services are highly scalable EXAMPLES:
3. Dynamic and flexible DigitalOcean, Linode, Amazon Web Services
(AWS), Microsoft Azure, Google Compute
4. GUI and API-based access
Engine (GCE), Rackspace, and Cisco
5. Automated administrative tasks Metacloud.
CLOUD SERVICE
2. Platform as a Service (PaaS)
MODELS
PaaS cloud computing platform is created for the programmer to develop, test, run, and
manage the applications.
CHARACTERISTICS OF PAAS:
1. Accessible to various users via the same development
EXAMPLES: application.
AWS Elastic Beanstalk, Windows 2. Integrates with web services and databases.
Azure, Heroku, Force.com, Google App 3. Builds on virtualization technology, so resources can
Engine, Apache Stratos, Magento easily be scaled up or down as per the organization's
Commerce Cloud, and OpenShift. need.
4. Support multiple languages and frameworks.
5. Provides an ability to "Auto-scale"
CLOUD SERVICE
MODELS 3. Software as a Service (SaaS)
SaaS is also known as "on-demand software". It is a software in which the
applications are hosted by a cloud service provider. Users can access these
applications with the help of internet connection and web browser.
CHARACTERISTICS OF SAAS:
1. Managed from a central location
2. Hosted on a remote server EXAMPLES:
3. Accessible over the internet BigCommerce, Google Apps, Salesforce,
4. Updates are applied automatically. Dropbox, ZenDesk, Cisco WebEx,
5. The services are purchased on the pay- ZenDesk, Slack, and GoToMeeting.
as-per-use basis
Cloud Responsibility Model
Important Controls for
Cloud Environment
01 02 03 04
ACCESS ENVIRONMENT PHYSICAL REGULATION
CONTROL SEGREGATION SECURITY
05 06 07 08
PRIVACY LEGAL AVAILABILITY AUDIT
JURISDICTION
IMPORTANT CONTROLS FOR
CLOUD ENVIRONMENT
01 ACCESS CONTROL
Access control is a security technique that regulates who or what can view or use
resources in a computing environment. It is a fundamental concept in security that
minimizes risk to the business or organization.
02 ENVIRONMENT SEGREGATION
One wrong move can adversely affect your production environment, further affecting
live users and their mission-critical data, especially if you deal with sensitive and
private data (ID, client, health, or financial information). You must ensure that
development and testing of any kind take place in completely segregated
environments.
IMPORTANT CONTROLS FOR
CLOUD ENVIRONMENT
03 PHYSICAL SECURITY
Physical security is the protection of personnel, hardware, software, networks and data
from physical actions and events that could cause serious loss or damage to an
enterprise, agency or institution.
04 REGULATION
Cloud computing is not governed by a specific “cloud law,” and no direct regulation
applies to its services. Instead, the legal and regulatory landscape is made up of a
matrix of different rules, as wide as the scope of the technology itself, spanning multiple
industries and geographies.
IMPORTANT CONTROLS FOR
CLOUD ENVIRONMENT
05 PRIVACY
refers to the right to self-determination, that is, the right of individuals to ‘know what is
known about them’, be aware of stored information about them, control how that
information is communicated and prevent its abuse.
06 LEGAL JURISDICTION
an additional protocol establishing guidelines and possible solutions on the
intersection between cloud computing and cybercrime jurisdiction.
IMPORTANT CONTROLS FOR
CLOUD ENVIRONMENT
07 AVAILABILITY
to make your products, services, and tools available to your customers and employees
at anytime from anywhere using any device with an internet connection.
08 AUDIT
is a periodic examination an organization does to assess and document its cloud
vendor’s performance.
Cloud Security Alliance
(CSA) is the world’s leading organization dedicated to defining
and raising awareness of best practices to help ensure a secure
cloud computing environment. CSA harnesses the subject
matter expertise of industry practitioners, associations,
governments, and its corporate and individual members to offer
cloud security-specific research, education, certification, events
and products. CSA’s activities, knowledge and extensive network
benefit the entire community impacted by cloud — from
providers and customers, to governments, entrepreneurs and
the assurance industry — and provide a forum through which
diverse parties can work together to create and maintain a
trusted cloud ecosystem.
Virtualization In
Cloud Computing
In the computing or Cloud computing
domain, virtualization refers to the
creation of virtual resources (like a
virtual server, virtual storage device,
virtual network switch or even a virtual
Operating System for that matter) from a
single resource of its type, which appears
as several individual isolated resources or
environments and users can use them as
a separate individual physical resource.
LEARN MORE
Types of Virtualization In
Cloud Computing
01 Operating System 02 Server
Virtualization Virtualization
In operating system virtualization in Cloud In server virtualization in Cloud Computing,
Computing, the virtual machine software the software directly installed on the server
installs in the operating system of the host system and used for a single physical server
rather than directly on the hardware system. can divide into many servers on the
demand basis and balance the load.
The most important use of operating system
virtualization is for testing the application on It can be also stated that the server
different platforms or operating systems. virtualization is masking of the server
Here, the software is present in the resources which consists of number and
hardware, which allows different identity. With the help of software, the server
applications to run. administrator divides one physical server
into multiple servers.
TYPES OF VIRTUALIZATION IN CLOUD COMPUTING
03 Hardware 04 Storage
Virtualization Virtualization
Hardware virtualization in Cloud In storage virtualization in Cloud
Computing, used in server platforms as it is Computing, a grouping is done of physical
flexible to use Virtual Machine rather than storage which is from multiple network
physical machines. In hardware storage devices; this is done so it looks like a
virtualizations, virtual machine software single storage device.
installs in the hardware system and then it is
known as hardware virtualization. It can be implemented with the help of
software applications and storage
It consists of a hypervisor which is used to virtualization is done for the backup and
control and monitor the process, memory, recovery process. It is a sharing of the
and other hardware resources. After the physical storage from multiple storage
completion of the hardware virtualization devices.
process, the user can install the different
operating system in it and with this platform
different applications can use it.
INFORMATION SYSTEMS ANALYSIS & DESIGN
Applications utilized by Apps that are used for Apps that are utilized in
business partners (e.g. general purposes, the the business. These
resellers, suppliers, etc.). majority of these are essential company
These can be accessible web- and browser- programs include the
using specific lines, such based, like dynamic internal ERP system, the
as the bulk order content websites, e- HR system, and others.
submission web service. commerce
applications, customer
loyalty apps, etc.
TYPES OF BUSINESS APPS
SUB CATEGORIES
Front-end Background Services-based
Applications Applications Applications
Users directly interact with These back-end apps These apps serve as an
these apps, usually function behind the integration point for
through a Graphic User scenes and manage other apps or systems.
Interface. background processes.
Types of Business Application Software
01
Human Resource
Information System (HRIS)
02 Inventory Control System
HRIS, which manages digital documentation,
can be used to monitor and automate hiring, Inventory management systems, one of the
onboarding, record keeping, training, and standardized corporate solutions, keep track of
stock levels, updates, turnover rates, and
payroll.
automate cycle counts. Automatic reorder
points and point-of-sale (POS) systems can
display real-time quantities on every item when
inventory systems and replenishment solutions
are integrated.
TYPES OF BUSINESS APPLICATION SOFTWARE
03 Communication Software
04 Accounting Software
Financial advisers can evaluate a company's
success using accounting software that tracks
expenses, income, and profits in real time.
Accountants can ensure that books have
accurate data and the company remains
profitable by using up-to-date information.
TYPES OF BUSINESS APPLICATION SOFTWARE
06
Reservation Software
05
Service Management Solution
08
Demand Forecasting Software
Demand forecasting software may sift through
past and present sales and stock data to predict
future client demand when coupled with POS
and inventory systems.
07
Schedule Management System
02 Metric Availability
Software uses real-time data from various operations, which can be collected and
generated into reports and analyses to monitor key performance indicators (KPIs).
03 Time Savings
software allows employees to focus manual labor on more complicated tasks, reducing
time and human error.
BENEFITS OF BUSINESS APPLICATION SOFTWARE