Cloud Computing: 785288

Cloud Computing

As the network administrator for BallotOnline, a company providing voting solutions to a global client base, you have convinced the organization to move the current infrastructure to the cloud, but your executive leadership has concerns about legal and compliance requirements.

Company leaders have reviewed your risk assessment report and found it informative. Based on the areas of risk covered in your report, BallotOnline’s executives have asked you to further explore the legal requirements of a cloud migration. You have been asked to write an executive brief identifying the legal and compliance requirements associated with moving to the cloud, and to develop recommended action plans to meet the requirements.

Your executive brief will be completed in a series of steps, in which you will explore United States legal and justice systems, cyberspace law, general compliance, geographic-specific compliance issues, industry-specific compliance issues, cloud-specific compliance issues, data compliance, frameworks for analyzing legal and compliance issues, and best practices for cloud implementation.

In preparing your brief, you will research sources for legal and compliance requirements for cloud adoption. You will need to review those requirements, develop action plans for meeting the requirements, and formulate a compliance program to avoid breaches of the requirements.

The executive brief will be five to seven pages that convey your understanding of the legal and compliance requirements associated with cloud computing and how BallotOnline can meet the requirements.

The executive team needs information on the following topics:

laws and regulations that may apply to the company

geographic-specific compliance requirements for the United States and European Union

data compliance requirements

election industry-specific compliance issues

When you submit your project, your work will be evaluated using the competencies listed below. You can use the list below to self-check your work before submission.

1.1: Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment.
1.3: Provide sufficient, correctly cited support that substantiates the writer’s ideas.
1.4: Tailor communications to the audience.
1.5: Use sentence structure appropriate to the task, message and audience.
1.6: Follow conventions of standard written English.
2.1: Identify and clearly explain the issue, question, or problem under critical consideration.
2.2: Locate and access sufficient information to investigate the issue or problem.
2.3: Evaluate the information in a logical and organized manner to determine its value and relevance to the problem.
2.4: Consider and analyze information in context to the issue or problem.
5.4: Articulate insights to leadership on the appropriate course of direction on the identified IT business needs
7.1: Examine legal and regulatory requirements
7.2: Examine industry best-practices and standards
8.1: Assess liability issues associated with cloud adoption
8.2: Assess network security and privacy risks associated with cloud infrastructure.
8.3: Assess management and operational risks associated with the cloud.
Now that you are aware of the requirements for this project, click on Step 1 to get started. You can also view the BallotOnline scenario video in the Course

Introduction

The organisation which is taken into consideration is the Ballotonline. The organisations main working is related to the providing online voting solution which is involved mainly in North America and Asia. The organisation is trying to indulge into the concept of the cloud computing for the purpose of the operation which is involved into the concept.

Problem statement

The main problem which is seen is the organisation is in the sector of minimum IT infrastructure which directly affects the overall working of the organisation (Rittinghouse & Ransome, 2016). The organisation should considered the aspect of expanding its resources.

Proposal

 In order to expand its resources is organisation is planning to move to the concept of the cloud computing (Botta et al., 2016). In the sector of deployment into the concept of cloud there are certain factors which should be taken into consideration such as the compliance requirement, risk which are associated with the factor and challenges which can be involved into the concept (Hashem et al., 2015). The factor which is related to the concept of risk orientation is important factor which should be taken into focus by the organisation.

Conclusion

In the aspect of the movement to the cloud would be very much beneficial for the organisation and most of the organisation workings. Cloud computing is one of the technology which in recent times is very much crucial for most of the organisation due to the different competitive advantage which is seen in the sector of working.

Part 2 – Report

Introduction

Cloud computing can be considered as one of the sector of the technology that is playing a very significant role which directly enhances sector which is linked with the working of the organisation (Hashem et al., 2015). It can be stated here that linking to the aspect of cloud computing can be one of the sector which is being recommended for the organisation. The organisation which is taken into consideration in the report which is the BallotOnline is facing problem in the domain of infrastructure of organisation. The organisation plans to move to the aspect of cloud computing, according to them cloud concept would be beneficial for the organisation.

The main focus relating to the report relates to the aspects of deployment of the cloud computing and the factor of the implementation of the technology.

Roles

In the technology relating to cloud computing the role which would be involved in the different sector of the operation are stated below:

Service architect: The main role which is related to the service architect is directly to ensure that the organisation receive service management processes and the service design.

SOA Security specialist: The main role which is related to the SOA security specialist is to ensure that services are very much secured and security of the data is ensured in the system.

SOA Governance Specialist: The SOA Governance Specialist is a specialist who is involved in the execution and the definition of the processes and the precepts of the governance. They also take into consideration the aspect of the usage of the government related technology.

Cloud resource administrator: The main role which is related to the cloud resource administrator is the utilization and the availability of the different resources of the cloud which would be utilised by the organisation.

Policies and procedures

There can be different types of policy or procedures which can adopted within the aspect of the technology. The primary emphasis point which is related to the aspect would be taking into consideration the security aspect of the data which stored in the domain relating to cloud. Policies used in the sector of proper utilisation of the different resources of the technology and procedures can be stated as one of the sector which is how to use the technology. Policies can be divided into different parts such as the technical policy which would be implemented in the sector of security of the data and the concept of the operation and the procedures can be directly be related to the aspect of securing of the data.

Learning

The aspect of learning can be stated to be one of the important factor in the concept of any recent technology. Training should be one of the most primary factors due to the factor that involvement of the training would be directly helping the employee to get engaged into the concept (Hashem et al., 2015). Without the aspect of proper training it can be stated that utilisation of the resources would not be proper and the sector of the resources would be wasted in the concept. Learning and the concept of the training can be considered to be very much linked with each other which would be helping in the altering of the external as well as internal working of the organisation. There are certain features like the usage of the technology which would be requiring training into how to get indulged into the concept.

Communication channel/ access

In the technology of the cloud computing the communication aspect with the serverof the cloud can be considered to be very much critical (Avram, 2014). If there are no communication involved into the concept there would not be many issue faced within the technology.

Dependencies

The technology of cloud computing is an independent platform which is related to the working within the organisational infrastructure (Chen, 2015). In most of the cases it can be stated that there is different sector of operation which is involved in the cloud computing would be directly involved in the concept of the cloud.

Example: The BallotOnline can directly implement the concept would be helping the organisation in the sector of the working of the organisation. It can be stated here that the problem which are being currently enforced by the organisation in the sector of the working can be mitigated with the different functionality approaches which can be included into the internal working of the organisation.

Components

There are few of components which can be included into the working of the organisation. The main aspect is the linkage of the different components with the strategy of the organisation (Chen, Jiao & Fu, 2016). It should be taken into consideration that there should not be any alteration in the sector of the working of the organisation or the infrastructure of the organisation.

Example: The linking of the different components of the cloud computing aspect can be very much advantagious in the sector of the working of the organisation. There are different types of components which are included into the working of the cloud computing for example the PaaS, IaaS or the PaaS which can be very much beneficial for the organisation.

Risk assessment

The sector the risk can be very much important in the sector of the using of the technology (Rittinghouse & Ransome, 2016). It can be stated here that risk identification can be very much important and the mitigation of the risk factor can be considered to be more important so that it does not get involved into the internal domain of the organisation (Hashem et al., 2015). There is consideration aspect which is related to the mitigation of the risk factor which should be implemented when there is a risk factor associated with the concept. The mitigation aspect of the risk assessment can be very much crucial due to the factor that if there are any type of risk factor within the working of the organisation it can directly impact the overall working.

Policy

There should be implementation of different types of policy which is related to the working of the organisation. The policies are stated below:

Policy 1: The privacy of the data should be protected so that there is no problem with the security of the data which is enforced into the system.

Policy 2: It can be stated that the adaptation of the policy should be done in a proper manner.

Policy 3: The employee of the organisation should be given appropriate training so that they can indulge into the working of the organisation. The training can be considered as one of the primary factor which is related to the employee get an in-depth knowledge of the different functionality of the system.

Policy 4: The employee should have a core knowledge of the security aspect of the data which should be included into the working of the organisation.

Digital signature

Digital signature can be considered as a technique which can be used for the aspect of protection of the data by means of focusing on the aspect of providing an authentication into the concept. The access of the data would be done in a manner which would be needing some sort of digital information attached to the concept.

Conclusion

The report can be concluded on a note that the organisation would be getting different type of benefit which would be associated with the aspect in the sector of the utilisation of the resources. The problem which is faced relating the infrastructure would be directly be resolved in the aspect and hence the organisation would be benefiting from the concept.

References

Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107.

Avram, M. G. (2014). Advantages and challenges of adopting cloud computing from an enterprise perspective. Procedia Technology12, 529-534.

Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud computing and internet of things: a survey. Future Generation Computer Systems56, 684-700.

Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud computing and internet of things: a survey. Future Generation Computer Systems56, 684-700.

Chen, X. (2015). Decentralized computation offloading game for mobile cloud computing. IEEE Transactions on Parallel and Distributed Systems26(4), 974-983.

Chen, X., Jiao, L., Li, W., & Fu, X. (2016). Efficient multi-user computation offloading for mobile-edge cloud computing. IEEE/ACM Transactions on Networking, (5), 2795-2808.

Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. (2015). The rise of “big data” on cloud computing: Review and open research issues. Information Systems47, 98-115.

Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. (2015). The rise of “big data” on cloud computing: Review and open research issues. Information Systems47, 98-115.

Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud computing: implementation, management, and security. CRC press.

Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud computing: implementation, management, and security. CRC press.

Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., & Ren, K. (2016). A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Transactions on Information Forensics and Security11(11), 2594-2608.