Cloud Computing
Cloud Computing
Cloud computing is the delivery of on-demand computing resources over the internet, including servers,
storage, databases, and software. Users can access these resources from anywhere, and pay only for
what they use, making it a flexible and cost-effective solution for businesses of all sizes. Cloud
computing can be classified into three main types:
• Scalability
• Flexibility
• Cost savings
• Reliability
• Security
However, there are also some challenges associated with cloud computing, such as:
1 2 3
Scalability 🚀 Accessibility 📱
Cloud computing resources can be scaled up Cloud computing offers access to data and
or down based on demand, allowing applications from anywhere, anytime, and
organizations to pay only for what they use. from any device with an internet connection,
This means that they can easily handle improving productivity and collaboration.
spikes in traffic or workloads without having This means that employees can work from
to invest in expensive hardware or anywhere, using any device, and still have
infrastructure. It also allows them to quickly access to the data and applications they
and easily adjust to changing business need to do their jobs. It also allows teams to
needs, without having to worry about collaborate more easily, share information
capacity planning or overprovisioning. more effectively, and work more efficiently,
Security Concerns and Mitigations
Security Concerns Mitigations
A data breach is an incident where sensitive, Data encryption is a process of converting
protected, or confidential data is accessed or sensitive data into an unreadable format to
disclosed without authorization. Data breaches prevent unauthorized access. Organizations can
can occur due to a variety of reasons, including use various encryption technologies, such as
human error, system glitches, or cyberattacks. symmetric key encryption, asymmetric key
They can result in financial losses, legal encryption, or hashing, to protect their data from
liabilities, and reputational damage for cyber threats.
Multi-factor authentication (MFA) is a security
organizations.
Data loss or theft can occur due to hardware measure that requires users to provide two or
failure, natural disasters, or human error. more forms of authentication to access a
Organizations can lose valuable data if they do system or service. MFA can prevent
not have appropriate backup and recovery plans unauthorized access to sensitive data and
in place. Data theft can occur due to protect against cyber attacks, such as phishing
cyberattacks, insider threats, or physical theft of or credential stuffing.
Disaster recovery planning (DRP) is a process of
devices. It can result in identity theft, financial
preparing for and recovering from a disaster
fraud, or other forms of cybercrime.
that affects an organization's IT systems or
A distributed denial of service (DDoS) attack is a infrastructure. DRP can include various
type of cyberattack where multiple measures, such as data backup and recovery,
compromised systems are used to target a system redundancy, and business continuity
single system or service, causing it to become planning, to ensure that an organization can
unavailable to users. DDoS attacks can be continue its operations in the event of a
launched by hackers or cybercriminals to disaster.
Regulatory compliance audits are a process of
blackmail organizations or disrupt their
assessing an organization's compliance with
operations. They can result in lost revenues,
various laws and regulations related to data
reputational damage, and legal liabilities.
Organizations that handle sensitive data or privacy, security, and governance. Audits can be
Cloud Computing Real-World Examples
Netflix has migrated its video- Zoom's video conferencing Microsoft Azure is a leading
streaming services to Amazon technology is hosted on AWS cloud services platform for
Web Services (AWS) to cut to provide high reliability and building, testing, deploying,
costs and improve scalability. secure connections to millions and managing applications
of users globally. and services through
Microsoft-managed data
centers.
Spotify uses Google Cloud Slack uses AWS to provide Adobe Creative Cloud is a
Platform (GCP) to process real-time communication and suite of creative applications
large amounts of data and collaboration services to its and services that are hosted
provide personalized music users, with high availability on AWS, providing users with
recommendations to its users. and low latency. on-demand access to tools
Migration to Cloud Computing
Planning
Develop a comprehensive migration plan that
includes timelines, budgets and resources
required, and a contingency plan to address
any issues that may arise.
1 2 3
Assessment Execution
Organizations should determine which Migrate applications and data to the cloud,
applications and data will be moved to the configure security and governance policies,
cloud and identify any potential security and and establish best practices for monitoring
compliance issues. and managing resources in the cloud.
• Identify applications and data to be migrated • Migrate applications and data to the cloud
The Future of Cloud Computing
Edge Computing Serverless Computing
Hybrid Cloud
Hybrid cloud is a combination of public and private cloud infrastructure. It gives organizations the
flexibility to run some applications in the public cloud, while keeping others on-premise. This can