preview

Cis 500: Cloud Computing

Good Essays

Case Study 2: Cloud Computing CIS500: Information Systems Decision-Making 2012, December 2 How did Ericsson benefit from Amazon Web Services (AWS)? According to Amazon’s Web Service website, it gives users the option to run just about everything using their service applications. By incorporating cloud computing, users are able to cut variable costs to a more attractive scale for the business by eliminating costly administrative and hardware fees. Due to remote access, Ericsson was able to immediately take advantage of AWS’s benefits since the infrastructure was already up and running. Demands change quickly and it’s important for a company to be able to adjust accordingly. By using the cloud system, Ericsson was able to employ …show more content…

The vendor controls the cloud and their employees may have access to the client’s information. It’s vital that the client organization seek clarity on exactly who has that access and their credentials—level of expertise, exact job title and company responsibility, etc. Data Location The client organization wants to make sure they at least know what country the cloud system they are using is located in. There are some cases where the organization has no clue where the cloud they are utilizing is based and that could potentially be a problem. One way to ease concern would be for the client to suggest specific locations and ensure that company privacy will not be breached. One suggestion to cope with the afore mentioned security concerns would be a method called the “layered approach”. The good thing about this option is it not only offers protection for not only the organization, but the vendor as well. The multi-level technique makes for a layered defense model that keeps the company from totally relying on one option. Level one—physical security—would focus on monitoring the actual facility that houses servers and other sensitive equipment. Level two—network security—would ensure around-the-clock monitoring of the network by well trained personnel. Level three—intrusion detection—would control the traffic that enters and leaves the network, making sure that any possible intrusion would be detected immediately and handled accordingly. Level

Get Access