SlideShare a Scribd company logo
1 of 3
Download to read offline
ISSN 22773061
845 | P a g e J u n e 2 5 , 2 0 1 3
Challenges and Security Issues in Future IT Infrastructure Components
Syed Mubashir Ali
Department of Computing, Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology, SZABIST, United
Arab Emirates
mubashir8733@gmail.com
ABSTRACT
Over the past 2 decades, the information technology infrastructure has gone through an exponential change with the
introduction and evolution of new technologies and trends. Organizations previously having their data on-premise and their
infrastructure comprising of multiple server machines on multiple server racks and dedicated client personal computers
(PCs) are moving towards cloud computing & virtualization to Smartphone and tablets. This rapid advancement and
constant change, although increasing productivity for the organizations is resulting in a rising number of challenges and
security issues for the organizations, their managers, IT administrators and technology architects. This paper discusses
the future IT infrastructure components and the challenges & security issues that arise after their implementation that
needs to be taken care of in order to get the full advantage of IT.
Indexing terms/Keywords
Cloud computing, IT infrastructure, Mobile devices, Information security, Virtualization.
Academic Discipline And Sub-Disciplines
IT, Computer Engineering, Computer Science, IT Infrastructure, Information Security, Cloud Computing;
SUBJECT CLASSIFICATION
IT Infrastructure, Information Security
TYPE (METHOD/APPROACH)
Literary Analysis;
Council for Innovative Research
Peer Review Research Publishing System
Journal: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
Vol 8, No 2
editor@cirworld.com
www.cirworld.com, member.cirworld.com
ISSN 22773061
846 | P a g e J u n e 2 5 , 2 0 1 3
INTRODUCTION
IT infrastructure has been evolving and will continue to grow and advance exponentially in the future. It started from
mainframe centric infrastructure to globally dispersed and distributed clusters. Enterprises from initially using desktops and
laptops are moving towards mobile and cloud computing. Marketing and advertising channels previously used short
messaging services and television advertisements are now shifting towards social media and social network marketing.
This evolution of IT infrastructure provided more flexibility to the businesses and enterprises. This continual change and
advancement in the IT infrastructure will raise some security issues that previously either didn’t exist or were insignificant
for the organizations. In this and future era of information and knowledge management; data and information privacy,
integrity, reliability and security are and will be the most important aspects and a challenge for IT engineers, scientists and
researchers. This study will focus on future IT infrastructure components including cloud computing, virtualization and
mobile devices (e.g. Smartphone, tablets). Then will explain the challenges and security issues that arise after their
implementation. And the final part will conclude the discussion of this research paper.
FUTURE IT INFRASTRUCTURE COMPONENTS
Future IT infrastructure could be having many different components but this study will consider cloud computing,
virtualization and mobile devices. Cloud computing is a model for IT infrastructure which provides ubiquitous, convenient
and on-demand network access to a shared pool of configurable computing resources (e.g. networks, servers, storage,
applications, and services) that can be rapidly provisioned and released with minimum management effort or service
provider interaction. [1]
Virtualization is the simulation of the software and/or hardware upon which other software executes. This simulated
systems environment is called a virtual machine (VM) or simulated network is called virtual network (VN). [2] In future IT
infrastructure, organizations and IT architects will focus on improving the client and business users’ user-experience,
achieving agreed service level, to utilize the full processing power of the underutilized servers and reduce the overheads
of air conditioning and power consumption by multiple physical server machines. As a result, there will be an increased
implementation of virtualization of IT infrastructure as it reduces the need for multiple servers thus reducing IT
infrastructure deployment & maintenance cost and provides efficient use of the existing resources within the organization.
There has been a rapid growth of mobile device usage all over the world. [3] The increase in use of mobile devices (e.g.
Smartphone, tablets) is increasing day by day within enterprise as well as home users; as more advanced mobile
operating systems (e.g. Android, IOS, Windows Phone) and powerful productivity applications are now available and an
increasing trend of “Bring your own device” (BYOD). By 2014, it is predicted that there will be more broadband users on
mobile phones and tablets than traditional internet users. Interestingly, Smartphone statistics indicate that 48 percent of
users use their smartphones to aid their work. [4]
CHALLENGES AND SECURITY ISSUES
Technology and inventions do have their own advantages. But the use of technology have been known to develop some
challenges, risks and security issues that needs to be addressed in order to have the real benefit from the investment in
the IT infrastructure. Following are some of the challenges and threats that may arise in the future IT infrastructure.
Service Reliability
In cloud computing, one of the major issues is service reliability. Organizations as the technology is advancing, are and
will store huge amount of their mission critical data and information on cloud which they need to be accessible 24/7. For
the data to be readily available when needed from the cloud, the cloud service provider needs to have a highly reliable
service. Therefore a considerable amount of investment and planning is required from the cloud service provider on their
technology infrastructure to implement effective measures including but not limited to redundant servers on multiple
geographical locations to provide service reliability. For-example in February 2008, cloud storage infrastructure of
Amazon's Web Service (Amazons-S3) experienced a downtime of several hours that caused access issues and loss of
data. [5] If an organization as big as Amazon could face reliability issues, other cloud service providers can be more prone
to service reliability issues and downtime. Hence cloud computing reliability issue needs to be addressed properly since
for mission critical data, small amount of downtime can result in a huge financial and business loss for organizations.
Data Encryption
Organizations have many sensitive data that they store on cloud and on premise. VMs and on cloud data is accessible
through cloud and Virtual Private Network (VPN) on PCs and mobile devices. This sensitive data needs to be encrypted.
In case, where an attacker manages to gain unauthorized access to that information that is encrypted will not be able to
get advantage of or misuse that information.
Inter-Network Dependency
Cloud computing as well as mobile devices in enterprises needs internet availability at all times. Employees and
organizations will have their emails, documents and data on cloud and on email servers and in order to access them they
need access to internet. In order to access the data remotely through Virtual Private Network (VPN) on premise or on
cloud needs always-on internet. This raises issue that what if internet service is down or unavailable, and what will happen
to the client systems and critical business operations that needs to run 24/7 such as hospitals and financial institutions. In
ISSN 22773061
847 | P a g e J u n e 2 5 , 2 0 1 3
some developing countries, where there are power breakdowns and internet service is not considered to be reliable will
greatly face the risk of data unavailability. [5]
Unauthorized Access
Smartphones and other mobile devices will contain organizations’ sensitive information in the form of stored emails and
documents that are vulnerable to leakage if the mobile device gets unauthorized physical access in case it gets lost or
stolen. With the increasing trend of BYOD, there will be potential threats due to lack of control over such mobile
devices.[6] Isolation between virtual machines can provide certain level of security through VPN tunneling and encryption,
[7] but still there will be threats of intrusions and attack to the physical VM that needs to be addressed.
CONCLUSION
The technological revolution will bring in and make various technologies and platforms more popular and more feasible to
be integrated in the future IT infrastructure. This evolution and advancement of information technology infrastructure will
offer a number of benefits and advantages to the organizations and helps them to have better business productivity. This
advancement in technology although providing several benefits will raise some security issues that needs to be addressed
in order to avoid financial loss and to get the actual payback and return on investment on IT infrastructure to the
organizations.
ACKNOWLEDGMENTS
I would like to thank my professor, Dr. Tariq Rahim Soomro for his continued support for conducting this study.
REFERENCES
[1] Mell, P. and Grance, T. 2011. The NIST definition of cloud computing (Draft), Recommendations of the National
Institute of Standards and Technology. Computer Security Division, Information Technology Laboratory, National
Institute of Standards and Technology.
[2] Scarfone, K., Souppaya, M. and Hoffman, P. 2011. Guide to security for full virtualization technologies. Computer
Security Division, Information Technology Laboratory, National Institute of Standards and Technology.
[3] World Economic Forum. 2012. Global IT report 2012. http://www3.weforum.org/docs/Global_IT_Report_2012.pdf
[4] MacCormick, J. S., Dery, K. and Kolb, D. G. 2007. Engaged or just connected? Smartphones and employee
engagement. Organizational Dynamics. 41(3), 194.
[5] Bamiah, M. A. and Brohi, S. N. 2011. Seven deadly threats and vulnerabilities in cloud computing. International
Journal of Advanced Engineering Sciences and Technologies, Vol , (9).
[6] Niharika Singh, N. 2012. B.Y.O.D. genie is out of the bottle – “Devil Or Angel”. Journal of Business Management and
Social Sciences Research, Vol, (1).
[7] Chowdhury, N. M. K. and Boutaba, R. 2009. Network virtualization: state of the art and research challenges.
Communications Magazine, IEEE. Vol, 47(7).
Author’ biography with Photo
Syed Mubashir Ali has completed his BS in Computer Engineering from National University of
Computer and Emerging Sciences – FAST, Karachi, Pakistan. Currently he is enrolled in MS
Computing in IT at Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology, SZABIST,
Dubai, United Arab Emirates. His research interest includes IT infrastructure, Cloud computing,
Standardization of IT, IT governance, E-Learning, Enterprise resource planning and IT
performance measurement.

More Related Content

What's hot

Seven deadly threats and vulnerabilities in cloud
Seven deadly threats and vulnerabilities in cloudSeven deadly threats and vulnerabilities in cloud
Seven deadly threats and vulnerabilities in cloudcloudresearcher
 
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityPAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityMighty Guides, Inc.
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Surveyinventionjournals
 
Cybersecurity in the Era of IoT
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoTAmy Daly
 
76 s201913
76 s20191376 s201913
76 s201913IJRAT
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET Journal
 
Good Security Whitepaper
Good Security WhitepaperGood Security Whitepaper
Good Security Whitepapergenasun
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 enKarel Van Isacker
 
Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewjournalBEEI
 
Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterpriseinfra-si
 
An Overview of Information Systems Security Measures in Zimbabwean Small and ...
An Overview of Information Systems Security Measures in Zimbabwean Small and ...An Overview of Information Systems Security Measures in Zimbabwean Small and ...
An Overview of Information Systems Security Measures in Zimbabwean Small and ...researchinventy
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715Jim Romeo
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseReadWrite
 
New Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud DataNew Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud DataEMC
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet accenture
 
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkSecurity and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkIOSR Journals
 
Emerging techonology presentation bw
Emerging techonology presentation bwEmerging techonology presentation bw
Emerging techonology presentation bwBridgetteWilliams15
 
FinalResearch_95752_oliver
FinalResearch_95752_oliverFinalResearch_95752_oliver
FinalResearch_95752_oliverMadison Oliver
 

What's hot (20)

Seven deadly threats and vulnerabilities in cloud
Seven deadly threats and vulnerabilities in cloudSeven deadly threats and vulnerabilities in cloud
Seven deadly threats and vulnerabilities in cloud
 
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityPAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
 
Cybersecurity in the Era of IoT
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoT
 
76 s201913
76 s20191376 s201913
76 s201913
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
 
Good Security Whitepaper
Good Security WhitepaperGood Security Whitepaper
Good Security Whitepaper
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
 
VMware pulse IoT center, an IoT management suite
VMware pulse IoT center, an IoT management suiteVMware pulse IoT center, an IoT management suite
VMware pulse IoT center, an IoT management suite
 
Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a review
 
Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterprise
 
An Overview of Information Systems Security Measures in Zimbabwean Small and ...
An Overview of Information Systems Security Measures in Zimbabwean Small and ...An Overview of Information Systems Security Measures in Zimbabwean Small and ...
An Overview of Information Systems Security Measures in Zimbabwean Small and ...
 
Performance Evaluation of Virtualization Technologies for Server
Performance Evaluation of Virtualization Technologies for ServerPerformance Evaluation of Virtualization Technologies for Server
Performance Evaluation of Virtualization Technologies for Server
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's Enterprise
 
New Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud DataNew Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud Data
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkSecurity and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
 
Emerging techonology presentation bw
Emerging techonology presentation bwEmerging techonology presentation bw
Emerging techonology presentation bw
 
FinalResearch_95752_oliver
FinalResearch_95752_oliverFinalResearch_95752_oliver
FinalResearch_95752_oliver
 

Similar to Challenges and Security Issues in Future IT Infrastructure Components

Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...
Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...
Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...IRJET Journal
 
Discussion paper: ”The coming obsolescence of the enterprise network”
Discussion paper: ”The coming obsolescence of the enterprise network” Discussion paper: ”The coming obsolescence of the enterprise network”
Discussion paper: ”The coming obsolescence of the enterprise network” Ericsson
 
10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-IT10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-ITIdan Hershkovich
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesKresimir Popovic
 
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing  A Case StudyAuthentication And Authorization Issues In Mobile Cloud Computing  A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing A Case StudyAngie Miller
 
Modern computer network technologies
Modern computer network technologies Modern computer network technologies
Modern computer network technologies Shamima Akther
 
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...IOSR Journals
 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...IAEME Publication
 
NTT i3 Point of View: Network Infrastructure Elasticity
NTT i3 Point of View:  Network Infrastructure ElasticityNTT i3 Point of View:  Network Infrastructure Elasticity
NTT i3 Point of View: Network Infrastructure ElasticityNTT Innovation Institute Inc.
 
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Dalton Valadares
 
Cyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesCyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesIRJET Journal
 
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network NeedsBuilding the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network NeedsJuniper Networks
 
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGIRJET Journal
 
SECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTUREacijjournal
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
 
Field Data Gathering Services — A Cloud-Based Approach
Field Data Gathering Services — A Cloud-Based ApproachField Data Gathering Services — A Cloud-Based Approach
Field Data Gathering Services — A Cloud-Based ApproachSchneider Electric
 
Seven Deadly Threats and Vulnerabilities in Cloud Computing
Seven Deadly Threats and  Vulnerabilities in Cloud ComputingSeven Deadly Threats and  Vulnerabilities in Cloud Computing
Seven Deadly Threats and Vulnerabilities in Cloud ComputingMervat Bamiah
 
A survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computingA survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computingIAEME Publication
 

Similar to Challenges and Security Issues in Future IT Infrastructure Components (20)

Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...
Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...
Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...
 
Discussion paper: ”The coming obsolescence of the enterprise network”
Discussion paper: ”The coming obsolescence of the enterprise network” Discussion paper: ”The coming obsolescence of the enterprise network”
Discussion paper: ”The coming obsolescence of the enterprise network”
 
10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-IT10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-IT
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing  A Case StudyAuthentication And Authorization Issues In Mobile Cloud Computing  A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 
Modern computer network technologies
Modern computer network technologies Modern computer network technologies
Modern computer network technologies
 
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...
 
NTT i3 Point of View: Network Infrastructure Elasticity
NTT i3 Point of View:  Network Infrastructure ElasticityNTT i3 Point of View:  Network Infrastructure Elasticity
NTT i3 Point of View: Network Infrastructure Elasticity
 
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
 
Cyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesCyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest Technologies
 
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network NeedsBuilding the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
 
B1802041217
B1802041217B1802041217
B1802041217
 
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
 
SECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURE
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
 
Field Data Gathering Services — A Cloud-Based Approach
Field Data Gathering Services — A Cloud-Based ApproachField Data Gathering Services — A Cloud-Based Approach
Field Data Gathering Services — A Cloud-Based Approach
 
Seven Deadly Threats and Vulnerabilities in Cloud Computing
Seven Deadly Threats and  Vulnerabilities in Cloud ComputingSeven Deadly Threats and  Vulnerabilities in Cloud Computing
Seven Deadly Threats and Vulnerabilities in Cloud Computing
 
A survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computingA survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computing
 

Recently uploaded

How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 

Challenges and Security Issues in Future IT Infrastructure Components

  • 1. ISSN 22773061 845 | P a g e J u n e 2 5 , 2 0 1 3 Challenges and Security Issues in Future IT Infrastructure Components Syed Mubashir Ali Department of Computing, Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology, SZABIST, United Arab Emirates mubashir8733@gmail.com ABSTRACT Over the past 2 decades, the information technology infrastructure has gone through an exponential change with the introduction and evolution of new technologies and trends. Organizations previously having their data on-premise and their infrastructure comprising of multiple server machines on multiple server racks and dedicated client personal computers (PCs) are moving towards cloud computing & virtualization to Smartphone and tablets. This rapid advancement and constant change, although increasing productivity for the organizations is resulting in a rising number of challenges and security issues for the organizations, their managers, IT administrators and technology architects. This paper discusses the future IT infrastructure components and the challenges & security issues that arise after their implementation that needs to be taken care of in order to get the full advantage of IT. Indexing terms/Keywords Cloud computing, IT infrastructure, Mobile devices, Information security, Virtualization. Academic Discipline And Sub-Disciplines IT, Computer Engineering, Computer Science, IT Infrastructure, Information Security, Cloud Computing; SUBJECT CLASSIFICATION IT Infrastructure, Information Security TYPE (METHOD/APPROACH) Literary Analysis; Council for Innovative Research Peer Review Research Publishing System Journal: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY Vol 8, No 2 editor@cirworld.com www.cirworld.com, member.cirworld.com
  • 2. ISSN 22773061 846 | P a g e J u n e 2 5 , 2 0 1 3 INTRODUCTION IT infrastructure has been evolving and will continue to grow and advance exponentially in the future. It started from mainframe centric infrastructure to globally dispersed and distributed clusters. Enterprises from initially using desktops and laptops are moving towards mobile and cloud computing. Marketing and advertising channels previously used short messaging services and television advertisements are now shifting towards social media and social network marketing. This evolution of IT infrastructure provided more flexibility to the businesses and enterprises. This continual change and advancement in the IT infrastructure will raise some security issues that previously either didn’t exist or were insignificant for the organizations. In this and future era of information and knowledge management; data and information privacy, integrity, reliability and security are and will be the most important aspects and a challenge for IT engineers, scientists and researchers. This study will focus on future IT infrastructure components including cloud computing, virtualization and mobile devices (e.g. Smartphone, tablets). Then will explain the challenges and security issues that arise after their implementation. And the final part will conclude the discussion of this research paper. FUTURE IT INFRASTRUCTURE COMPONENTS Future IT infrastructure could be having many different components but this study will consider cloud computing, virtualization and mobile devices. Cloud computing is a model for IT infrastructure which provides ubiquitous, convenient and on-demand network access to a shared pool of configurable computing resources (e.g. networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimum management effort or service provider interaction. [1] Virtualization is the simulation of the software and/or hardware upon which other software executes. This simulated systems environment is called a virtual machine (VM) or simulated network is called virtual network (VN). [2] In future IT infrastructure, organizations and IT architects will focus on improving the client and business users’ user-experience, achieving agreed service level, to utilize the full processing power of the underutilized servers and reduce the overheads of air conditioning and power consumption by multiple physical server machines. As a result, there will be an increased implementation of virtualization of IT infrastructure as it reduces the need for multiple servers thus reducing IT infrastructure deployment & maintenance cost and provides efficient use of the existing resources within the organization. There has been a rapid growth of mobile device usage all over the world. [3] The increase in use of mobile devices (e.g. Smartphone, tablets) is increasing day by day within enterprise as well as home users; as more advanced mobile operating systems (e.g. Android, IOS, Windows Phone) and powerful productivity applications are now available and an increasing trend of “Bring your own device” (BYOD). By 2014, it is predicted that there will be more broadband users on mobile phones and tablets than traditional internet users. Interestingly, Smartphone statistics indicate that 48 percent of users use their smartphones to aid their work. [4] CHALLENGES AND SECURITY ISSUES Technology and inventions do have their own advantages. But the use of technology have been known to develop some challenges, risks and security issues that needs to be addressed in order to have the real benefit from the investment in the IT infrastructure. Following are some of the challenges and threats that may arise in the future IT infrastructure. Service Reliability In cloud computing, one of the major issues is service reliability. Organizations as the technology is advancing, are and will store huge amount of their mission critical data and information on cloud which they need to be accessible 24/7. For the data to be readily available when needed from the cloud, the cloud service provider needs to have a highly reliable service. Therefore a considerable amount of investment and planning is required from the cloud service provider on their technology infrastructure to implement effective measures including but not limited to redundant servers on multiple geographical locations to provide service reliability. For-example in February 2008, cloud storage infrastructure of Amazon's Web Service (Amazons-S3) experienced a downtime of several hours that caused access issues and loss of data. [5] If an organization as big as Amazon could face reliability issues, other cloud service providers can be more prone to service reliability issues and downtime. Hence cloud computing reliability issue needs to be addressed properly since for mission critical data, small amount of downtime can result in a huge financial and business loss for organizations. Data Encryption Organizations have many sensitive data that they store on cloud and on premise. VMs and on cloud data is accessible through cloud and Virtual Private Network (VPN) on PCs and mobile devices. This sensitive data needs to be encrypted. In case, where an attacker manages to gain unauthorized access to that information that is encrypted will not be able to get advantage of or misuse that information. Inter-Network Dependency Cloud computing as well as mobile devices in enterprises needs internet availability at all times. Employees and organizations will have their emails, documents and data on cloud and on email servers and in order to access them they need access to internet. In order to access the data remotely through Virtual Private Network (VPN) on premise or on cloud needs always-on internet. This raises issue that what if internet service is down or unavailable, and what will happen to the client systems and critical business operations that needs to run 24/7 such as hospitals and financial institutions. In
  • 3. ISSN 22773061 847 | P a g e J u n e 2 5 , 2 0 1 3 some developing countries, where there are power breakdowns and internet service is not considered to be reliable will greatly face the risk of data unavailability. [5] Unauthorized Access Smartphones and other mobile devices will contain organizations’ sensitive information in the form of stored emails and documents that are vulnerable to leakage if the mobile device gets unauthorized physical access in case it gets lost or stolen. With the increasing trend of BYOD, there will be potential threats due to lack of control over such mobile devices.[6] Isolation between virtual machines can provide certain level of security through VPN tunneling and encryption, [7] but still there will be threats of intrusions and attack to the physical VM that needs to be addressed. CONCLUSION The technological revolution will bring in and make various technologies and platforms more popular and more feasible to be integrated in the future IT infrastructure. This evolution and advancement of information technology infrastructure will offer a number of benefits and advantages to the organizations and helps them to have better business productivity. This advancement in technology although providing several benefits will raise some security issues that needs to be addressed in order to avoid financial loss and to get the actual payback and return on investment on IT infrastructure to the organizations. ACKNOWLEDGMENTS I would like to thank my professor, Dr. Tariq Rahim Soomro for his continued support for conducting this study. REFERENCES [1] Mell, P. and Grance, T. 2011. The NIST definition of cloud computing (Draft), Recommendations of the National Institute of Standards and Technology. Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology. [2] Scarfone, K., Souppaya, M. and Hoffman, P. 2011. Guide to security for full virtualization technologies. Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology. [3] World Economic Forum. 2012. Global IT report 2012. http://www3.weforum.org/docs/Global_IT_Report_2012.pdf [4] MacCormick, J. S., Dery, K. and Kolb, D. G. 2007. Engaged or just connected? Smartphones and employee engagement. Organizational Dynamics. 41(3), 194. [5] Bamiah, M. A. and Brohi, S. N. 2011. Seven deadly threats and vulnerabilities in cloud computing. International Journal of Advanced Engineering Sciences and Technologies, Vol , (9). [6] Niharika Singh, N. 2012. B.Y.O.D. genie is out of the bottle – “Devil Or Angel”. Journal of Business Management and Social Sciences Research, Vol, (1). [7] Chowdhury, N. M. K. and Boutaba, R. 2009. Network virtualization: state of the art and research challenges. Communications Magazine, IEEE. Vol, 47(7). Author’ biography with Photo Syed Mubashir Ali has completed his BS in Computer Engineering from National University of Computer and Emerging Sciences – FAST, Karachi, Pakistan. Currently he is enrolled in MS Computing in IT at Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology, SZABIST, Dubai, United Arab Emirates. His research interest includes IT infrastructure, Cloud computing, Standardization of IT, IT governance, E-Learning, Enterprise resource planning and IT performance measurement.