06-03-2013, 10:07 AM
Cloud Report
Cloud.docx (Size: 85.54 KB / Downloads: 24)
INTRODUCTION
Cloud The word cloud is used as a metaphor for the Internet, based on the standardized use of a cloud-like shape to denote a network on telephony schematics and later to depict the Internet in computer network diagrams as an abstraction of the underlying infrastructure it represents. The cloud symbol was used to represent the Internet as early as 1994
computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). The name comes from the use of a cloud-shaped symbol as an abstraction for the complex infrastructure it contains in system diagrams. Cloud computing entrusts remote services with a user's data, software and computation.
There are many types of public cloud computing:[1]
• Infrastructure as a service (IaaS)
• Platform as a service (PaaS)
• Software as a service (SaaS)
• Network as a service (NaaS)
• Storage as a service (STaaS)
• Security as a service (SECaaS)
• Data as a service (DaaS)
• Desktop as a service (DaaS - see above)
• Database as a service (DBaaS)
• Test environment as a service (TEaaS)
• API as a service (APIaaS)
• Backend as a service (BaaS)
• Integrated development environment as a service (IDEaaS)
• Integration platform as a service (IPaaS), see Cloud-based integration
In the business model using software as a service, users are provided access to application software and databases. The cloud providers manage the infrastructure and platforms on which the applications run. SaaS is sometimes referred to as “on-demand software” and is usually priced on a pay-per-use basis. SaaS providers generally price applications using a subscription fee.
End users access cloud-based applications through a web browser or a light-weight desktop or mobile app while the business software and user's data are stored on servers at a remote location. Proponents claim that cloud computing allows enterprises to get their applications up and running faster, with improved manageability and less maintenance, and enables IT to more rapidly adjust resources to meet fluctuating and unpredictable business demand.[2][3]
Cyber attacks:
Cyber attacks exploiting software flaws can cause large data breaches, affecting millions of users, because of the large concentration of users and data. Physical redundancy does not safeguard against certain cyber attacks, such as data breaches exploiting software flaws.