SlideShare a Scribd company logo
1 of 6
Download to read offline
Case Study
On
1. How secure is the cloud?
2. Amazon Vs Walmart: which Giant will dominate E-Commerce?
Submitted To:
Air Commodore M Abdus Samad Azad, BSP ndu, Psc PhD
B. Sc. (Hons) M.Sc. in Applied Physics & Electronic Engineering
MBA
PhD (Information System)
Professor (Adjunct) & Ex-Treasurer
University of Professionals (BUP)
Submitted By:
Mohammad Mydul Islam
Roll: 2023031053
ID no: 20011378
Date of Submission
16th
May, 2020
Case Study
No 1: How secure is the cloud?
Case Study Question & Answer
1. What is the biggest risk of cloud computing?
Answer: The biggest risk of cloud computing is that it is highly distributed. Claud
applications and application mash-ups reside in virtual libraries in large remote data centres
and server farms that supply business, services and data management for multiple corporate
clients.
2. What is the nature of cloud computing?
Answer: The dispersed nature of cloud computing makes it difficult to track unauthorized
activity. Virtually all cloud providers use encryption, such as secure socket Layers, to secure
the data they handle while the data are being transmitted. But if the data are stored on devices
that also store other companies’ data, it’s important to ensure these stored data are encrypted
as well.
3. Is there any option to prove the data security?
Answer: If your data is totally secure in the cloud, you may not able to prove it. Some cloud
providers don’t meet current compliance requirements regarding security and some of those
providers, such as Amazon, have asserted that they don’t intend to meet those and won’t
allow companies auditors on-site.
4. What security and control problems are described in this case?
Answer: There is a distinct lack of transparency with cloud computing providers. One of the
biggest risks of cloud computing is that it is highly distributed. Cloud applications and
application mash-ups reside in virtual libraries in large remote data centres and server farms
that supply business services and data management for multiple corporate clients. Cloud
computing providers often distribute work to data centres around the globe. Users may not
know precisely where their data are being hosted nor where the data are stored. Because
cloud computing is dispersed it’s difficult to track unauthorized activity. If data are stored on
devices that also store other companies’ data, it’s important to ensure these stored data are
encrypted as well.
5. What people, organization, and technology factors contribute to these problems?
Answers: The factors are given below:
People: Cloud computing users and cloud providers may fall short in fully understanding the
security implications involved in the newest trend of distributed computing. Users are not
investigating the providers enough and making sure the providers are meeting all the
necessary security requirements. Providers are not being transparent enough in clearly
specifying what security services they provide, how they protect data, and how they intend to
meet corporate regulatory requirements.
Organization: Cloud providers must use a fault-tolerant computer system which minimizes or
eliminates downtime altogether by ensuring continuous availability of computing services.
Cloud users need to pay attention to their own security practices, especially access controls.
Cloud users should contract with a cloud vendor that is a public company, which is required
by law to disclose how it manages information.
Technology: Strong encryption technology is absolutely necessary for cloud computing.
Network traffic can use secure sockets layer and secure hypertext transfer protocols. Two
encryption methods that can be used for secure sessions between Internet client browser
software and servers are symmetric key encryption and public key encryption. Data stored on
cloud servers can be protected using firewalls, intrusion detection systems, antivirus and
antispyware software, and unified threat management systems.
6. How secure is cloud computing? Explain your answer
Answer: Depending on which cloud provider is used, it may be difficult to fully understand
how secure cloud computing is. Salesforce.com, as a public company, is required by law to
disclose how it manages information. It has strict processes and guidelines for managing its
data centres. Another option is to use a cloud provider that gives subscribers the option to
choose where their cloud computing work takes place. Other companies like Amazon EC2
and Microsoft Azure are not liable for data losses or fines or other legal penalties when
companies use their services. Both vendors offer guidance on how to use their cloud
platforms securely, and they may still be able to protect data better than some companies’
home-grown facilities. Some cloud providers don’t meet current compliance requirements
regarding security, and some of those providers, such as Amazon, have asserted that they
don’t intend to meet those rules and won’t allow compliance auditors on-site. Some
regulations call for proof that systems are securely managed, which may require confirmation
from an independent audit. Large providers are unlikely to allow another company’s auditors
to inspect their data Centres.
7. If you were in charge of your company’s information systems department, what issues
would you want to clarify with prospective vendors?
Answer: Issues cloud users should clarify with prospective vendors include:
a) Regardless of where data are stored or transferred, are users protected at a level that
meets their corporate requirements?
b) Does the cloud provider store and process data in specific jurisdictions according to the
privacy rules of those jurisdictions?
c) How does the cloud provider segregate corporate data from other companies?
d) Ask for proof that encryption mechanisms are sound.
e) How will the cloud provider respond if a disaster strikes, will the provider be able to
completely restore data and how long will it take?
f) Will the cloud provider submit to external audits and security certifications?
8. Would you entrust your corporate systems to a cloud computing provider? Why or why
not?
Answer: Answers should the issues raised in Question 7. As enticing as cloud computing may
be because it lowers TCO costs of IT infrastructures, some companies may need to stay away
from it altogether.
No 2: Amazon Vs Walmart: which Giant will dominate E-Commerce?
Case Study Question & Answer
1. What concepts in the chapter are illustrated in this case?
Answer: E – Commerce business model.
2. Analyse Amazon and Walmart.com using the value chain and competitive forces models?
Answer: Supply chain is a network of organizations and business processes for procuring raw
materials, transforming these materials into intermediate and finished products and
distributing the finished products to customers. It links suppliers, manufacturing plants,
distribution centres, retail outlets and customers to supply goods and services from source
through the supply chain in both directions.
Supply chain management system automate the flow of information among members of the
supply chain so they can use it to make better decisions about when and how much to
purchase, produce or ship. More accurate information from supply chain management
systems reduces uncertainty and the impact of the bullwhip effect. Supply chain management
software includes software for supply chain planning and for supply chains by providing the
connectivity for organizations in different countries to share supply chain information.
Improved communication among supply chain members also facilitates efficient customer
response and movement toward a demand-driven model.
In attaining competitive advantage Porter’s five competitive forces can be used to determine
industry profitability. These forces include threat of new entrances within the market, market
power of suppliers, substitutions of products and services, bargaining power of the buyers
and industry competition. The internet has changed the nature of doing business, so has the
competition that surrounds it. By supplying a wide range of product to the consumer,
amazon.com share a market space with the likes of Wal-Mart. Rivalries among existing firms
are strong as the industry is growing and the products that are being sold to the consumer are
not so differentiated.
3. What are the management, organization and technology factors that have contributed to the
success of both Wal-Mart and Amazon?
Answer: Both of them using e-commerce is a fascinating combination of business models and
new information technologies. The three major electronic commerce categories are business
to consumer (B2C) e commerce, business to business (B2B) e commerce and consumer to
consumer (C2C). E-commerce can be viewed as the conduct of business commercial
communications and management by using Internet technologies and through electronic
methods, such as electronic data interchange (EDI) and automated data-collection systems. It
may also involve the electronic transfer of information between businesses (EDI). E-business,
on the other hand, has come to refer to the automation of an organization’s internal business
processes using Internet and browser technologies. In using the Internet, many organizations
have looked to add more value to the tangible products they sell by providing additional
‘information-based’ services. These can include online support, order tracking, order history,
etc. Many of these initiatives focus on deepening the relationship with customers and
suppliers. Others have moved their trading platform either partially or entirely onto the
Internet. From the website, customers can search for a specific book, topic or author, or they
can browse their way through the book catalogue and then complete the sale by entering their
credit card information. Orders are processed immediately and books in stock, generally
bestsellers, are shipped the same day. Customers are contacted by email when their order has
been dispatched. All contact with the company is done either through their World Wide
Website or by email. The company has also branched out into electronic auctions. It has also
pioneered technologies such as customer profiling and ‘1-click’ shopping.
4. Compare Wal-Mart’s and Amazon’s e-commerce business models. Which is stronger?
Explain your answer
Answer: Both sites are online merchants that have been made by an identical model, where
the menu of product categories on the left page margin. The last category in Walmart, they
called Halloween shop which means a category where there are seasonal products. In the
middle of the page at the top of both sites have search engines for products that can be
searched by all departments or for each department separately. In the middle of the page both
have special offers, best-selling products, and amazon.com has the products you are currently
viewing by other users. Shop Walmart is simpler and easier to reach the required product,
while at amazon.com and search for products on the home page have a lot of things that
detract from the required product. The product categories are more or less similar but
amazon.com has a special category for the book which is understandable because it is the first
business was the main job. I think that amazon still as the stronger online retailer; they
always do continuing new innovative. The profiling technology has enabled Amazon to
recommend books based on previous purchasing history and what other customers who have
bought similar books are also reading. Even today, the company strives to maintain their
founding commitment to customer satisfaction and the delivery of an educational and
inspiring shopping experience.
5. Where would you prefer to make your internet purchases? Amazon or Walmart.com? Why
Answer: Amazon, the product more complete than Walmart and it has special category for
the book as the main job.

More Related Content

What's hot

Your Data Center Boundaries Don’t Exist Anymore!
Your Data Center Boundaries Don’t Exist Anymore! Your Data Center Boundaries Don’t Exist Anymore!
Your Data Center Boundaries Don’t Exist Anymore! EMC
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challengespaperpublications3
 
Neural Network Web-Based Human Resource Management System Model (NNWBHRMSM)
Neural Network Web-Based Human Resource Management System Model (NNWBHRMSM)Neural Network Web-Based Human Resource Management System Model (NNWBHRMSM)
Neural Network Web-Based Human Resource Management System Model (NNWBHRMSM)ijcncs
 
Keep Student information protected while improving services
Keep Student information protected while improving servicesKeep Student information protected while improving services
Keep Student information protected while improving servicesCloudMask inc.
 
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and SolutionsSecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutionsijccsa
 
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud ComputingIRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud ComputingIRJET Journal
 
Smart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud EnvironmentSmart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud EnvironmentIRJET Journal
 
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...Rida Qayyum
 
SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...
SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...
SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...ijcncs
 
FTC- Internet of Things (January, 2015)
FTC- Internet of Things (January, 2015)FTC- Internet of Things (January, 2015)
FTC- Internet of Things (January, 2015)Dr Dev Kambhampati
 
The design and implementation of trade finance application based on hyperledg...
The design and implementation of trade finance application based on hyperledg...The design and implementation of trade finance application based on hyperledg...
The design and implementation of trade finance application based on hyperledg...Conference Papers
 
PRIVACY IN CLOUD COMPUTING: A SURVEY
PRIVACY IN CLOUD COMPUTING: A SURVEYPRIVACY IN CLOUD COMPUTING: A SURVEY
PRIVACY IN CLOUD COMPUTING: A SURVEYcscpconf
 
A Secure Model for Cloud Computing Based Storage and Retrieval
A Secure Model for Cloud Computing Based Storage and  RetrievalA Secure Model for Cloud Computing Based Storage and  Retrieval
A Secure Model for Cloud Computing Based Storage and RetrievalIOSR Journals
 
A Survey on Mobile Commerce Security Issues and Applications
A Survey on Mobile Commerce Security Issues and ApplicationsA Survey on Mobile Commerce Security Issues and Applications
A Survey on Mobile Commerce Security Issues and Applicationstheijes
 
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...IRJET Journal
 
Mb0047 management information system
Mb0047   management information systemMb0047   management information system
Mb0047 management information systemsmumbahelp
 
Cloud and mobile computing for lawyers
Cloud and mobile computing for lawyersCloud and mobile computing for lawyers
Cloud and mobile computing for lawyersNicole Black
 

What's hot (20)

Ccs16
Ccs16Ccs16
Ccs16
 
Your Data Center Boundaries Don’t Exist Anymore!
Your Data Center Boundaries Don’t Exist Anymore! Your Data Center Boundaries Don’t Exist Anymore!
Your Data Center Boundaries Don’t Exist Anymore!
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challenges
 
Neural Network Web-Based Human Resource Management System Model (NNWBHRMSM)
Neural Network Web-Based Human Resource Management System Model (NNWBHRMSM)Neural Network Web-Based Human Resource Management System Model (NNWBHRMSM)
Neural Network Web-Based Human Resource Management System Model (NNWBHRMSM)
 
Keep Student information protected while improving services
Keep Student information protected while improving servicesKeep Student information protected while improving services
Keep Student information protected while improving services
 
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and SolutionsSecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
 
Data Security and Privacy in Cloud Computing
Data Security and Privacy in Cloud ComputingData Security and Privacy in Cloud Computing
Data Security and Privacy in Cloud Computing
 
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud ComputingIRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
 
Smart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud EnvironmentSmart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud Environment
 
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...
 
SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...
SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...
SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...
 
FTC- Internet of Things (January, 2015)
FTC- Internet of Things (January, 2015)FTC- Internet of Things (January, 2015)
FTC- Internet of Things (January, 2015)
 
The design and implementation of trade finance application based on hyperledg...
The design and implementation of trade finance application based on hyperledg...The design and implementation of trade finance application based on hyperledg...
The design and implementation of trade finance application based on hyperledg...
 
PRIVACY IN CLOUD COMPUTING: A SURVEY
PRIVACY IN CLOUD COMPUTING: A SURVEYPRIVACY IN CLOUD COMPUTING: A SURVEY
PRIVACY IN CLOUD COMPUTING: A SURVEY
 
A Secure Model for Cloud Computing Based Storage and Retrieval
A Secure Model for Cloud Computing Based Storage and  RetrievalA Secure Model for Cloud Computing Based Storage and  Retrieval
A Secure Model for Cloud Computing Based Storage and Retrieval
 
Citrix security booklet
Citrix security bookletCitrix security booklet
Citrix security booklet
 
A Survey on Mobile Commerce Security Issues and Applications
A Survey on Mobile Commerce Security Issues and ApplicationsA Survey on Mobile Commerce Security Issues and Applications
A Survey on Mobile Commerce Security Issues and Applications
 
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
 
Mb0047 management information system
Mb0047   management information systemMb0047   management information system
Mb0047 management information system
 
Cloud and mobile computing for lawyers
Cloud and mobile computing for lawyersCloud and mobile computing for lawyers
Cloud and mobile computing for lawyers
 

Similar to How secure is the cloud? and Amazon vs Walmart which giant will dominant?

Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkSecurity and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkIOSR Journals
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesKresimir Popovic
 
Cloud computing Risk management
Cloud computing Risk management  Cloud computing Risk management
Cloud computing Risk management Padma Jella
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0David Spinks
 
Amazon Case Study Paper
Amazon Case Study PaperAmazon Case Study Paper
Amazon Case Study PaperOlga Bautista
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar reportshafzonly
 
Iirdem a novel approach for enhancing security in multi cloud environment
Iirdem a novel approach for enhancing security in multi  cloud environmentIirdem a novel approach for enhancing security in multi  cloud environment
Iirdem a novel approach for enhancing security in multi cloud environmentIaetsd Iaetsd
 
McMahon and Associates Cloud Usage Policy Paper
McMahon and Associates Cloud Usage Policy PaperMcMahon and Associates Cloud Usage Policy Paper
McMahon and Associates Cloud Usage Policy PaperMatthew J McMahon
 
IRJET- Data Privacy and Security Industry – Opportunities and Challenges
IRJET- Data Privacy and Security Industry – Opportunities and ChallengesIRJET- Data Privacy and Security Industry – Opportunities and Challenges
IRJET- Data Privacy and Security Industry – Opportunities and ChallengesIRJET Journal
 
Cloud Computing - A future prerogative
Cloud Computing - A future prerogativeCloud Computing - A future prerogative
Cloud Computing - A future prerogativeWayne Poggenpoel
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocolIaetsd Iaetsd
 
Trends in the IT Profession Annotated BibliographyAdemola Adeleke.docx
Trends in the IT Profession Annotated BibliographyAdemola Adeleke.docxTrends in the IT Profession Annotated BibliographyAdemola Adeleke.docx
Trends in the IT Profession Annotated BibliographyAdemola Adeleke.docxwillcoxjanay
 
Identified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud ComputingIdentified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud ComputingIOSR Journals
 
Strategic Importance of Cloud Computing in the Business Organizati.docx
Strategic Importance of Cloud Computing in the Business Organizati.docxStrategic Importance of Cloud Computing in the Business Organizati.docx
Strategic Importance of Cloud Computing in the Business Organizati.docxsusanschei
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issuesAleem Mohammed
 
Data Privacy And Security Issues In Cloud Computing.pdf
Data Privacy And Security Issues In Cloud Computing.pdfData Privacy And Security Issues In Cloud Computing.pdf
Data Privacy And Security Issues In Cloud Computing.pdfCiente
 

Similar to How secure is the cloud? and Amazon vs Walmart which giant will dominant? (20)

Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkSecurity and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Cloud computing Risk management
Cloud computing Risk management  Cloud computing Risk management
Cloud computing Risk management
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Amazon Case Study Paper
Amazon Case Study PaperAmazon Case Study Paper
Amazon Case Study Paper
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
 
Iirdem a novel approach for enhancing security in multi cloud environment
Iirdem a novel approach for enhancing security in multi  cloud environmentIirdem a novel approach for enhancing security in multi  cloud environment
Iirdem a novel approach for enhancing security in multi cloud environment
 
McMahon and Associates Cloud Usage Policy Paper
McMahon and Associates Cloud Usage Policy PaperMcMahon and Associates Cloud Usage Policy Paper
McMahon and Associates Cloud Usage Policy Paper
 
IRJET- Data Privacy and Security Industry – Opportunities and Challenges
IRJET- Data Privacy and Security Industry – Opportunities and ChallengesIRJET- Data Privacy and Security Industry – Opportunities and Challenges
IRJET- Data Privacy and Security Industry – Opportunities and Challenges
 
Cloud Computing - A future prerogative
Cloud Computing - A future prerogativeCloud Computing - A future prerogative
Cloud Computing - A future prerogative
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
 
Challenges of IP protection in era of cloud computing
Challenges of IP protection in era of cloud computingChallenges of IP protection in era of cloud computing
Challenges of IP protection in era of cloud computing
 
Trends in the IT Profession Annotated BibliographyAdemola Adeleke.docx
Trends in the IT Profession Annotated BibliographyAdemola Adeleke.docxTrends in the IT Profession Annotated BibliographyAdemola Adeleke.docx
Trends in the IT Profession Annotated BibliographyAdemola Adeleke.docx
 
A017130104
A017130104A017130104
A017130104
 
Identified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud ComputingIdentified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud Computing
 
Strategic Importance of Cloud Computing in the Business Organizati.docx
Strategic Importance of Cloud Computing in the Business Organizati.docxStrategic Importance of Cloud Computing in the Business Organizati.docx
Strategic Importance of Cloud Computing in the Business Organizati.docx
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issues
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 
Data Privacy And Security Issues In Cloud Computing.pdf
Data Privacy And Security Issues In Cloud Computing.pdfData Privacy And Security Issues In Cloud Computing.pdf
Data Privacy And Security Issues In Cloud Computing.pdf
 

More from Mohammad Mydul Islam

Icebreaker, energizer games in presentation skills
Icebreaker, energizer games in presentation skillsIcebreaker, energizer games in presentation skills
Icebreaker, energizer games in presentation skillsMohammad Mydul Islam
 
Compensation management scenario in shanta garments limited
Compensation management scenario in shanta garments limitedCompensation management scenario in shanta garments limited
Compensation management scenario in shanta garments limitedMohammad Mydul Islam
 
Working from home vs. full time employment
Working from home vs. full time employmentWorking from home vs. full time employment
Working from home vs. full time employmentMohammad Mydul Islam
 
A Term Paper on Financial Statement Analysis of Square Pharmaceuticals Ltd
A Term Paper on Financial Statement Analysis of Square Pharmaceuticals LtdA Term Paper on Financial Statement Analysis of Square Pharmaceuticals Ltd
A Term Paper on Financial Statement Analysis of Square Pharmaceuticals LtdMohammad Mydul Islam
 
Management organizational behaviour all chapter key words
Management organizational behaviour all chapter key wordsManagement organizational behaviour all chapter key words
Management organizational behaviour all chapter key wordsMohammad Mydul Islam
 
Use power and politics in organization
Use power and politics in organizationUse power and politics in organization
Use power and politics in organizationMohammad Mydul Islam
 
Organizational culture in standard chartered bank (SCB)
Organizational culture in  standard chartered bank (SCB)Organizational culture in  standard chartered bank (SCB)
Organizational culture in standard chartered bank (SCB)Mohammad Mydul Islam
 

More from Mohammad Mydul Islam (20)

Branding myself
Branding myselfBranding myself
Branding myself
 
Office solutions
Office solutionsOffice solutions
Office solutions
 
Sultan muhammad al fateh
Sultan muhammad al fatehSultan muhammad al fateh
Sultan muhammad al fateh
 
Nelson Mandela
Nelson MandelaNelson Mandela
Nelson Mandela
 
Mustafa kemal ataturk
Mustafa kemal ataturkMustafa kemal ataturk
Mustafa kemal ataturk
 
Muniba mazari
Muniba mazariMuniba mazari
Muniba mazari
 
Michale phelps
Michale phelpsMichale phelps
Michale phelps
 
Khalid bin waleed
Khalid bin waleedKhalid bin waleed
Khalid bin waleed
 
J k rowling
J k rowlingJ k rowling
J k rowling
 
Ishwar chandra vidyasagar
Ishwar chandra vidyasagarIshwar chandra vidyasagar
Ishwar chandra vidyasagar
 
Icebreaker, energizer games in presentation skills
Icebreaker, energizer games in presentation skillsIcebreaker, energizer games in presentation skills
Icebreaker, energizer games in presentation skills
 
Elon musk
Elon muskElon musk
Elon musk
 
Dr mahathir-bin-mohammad
Dr mahathir-bin-mohammadDr mahathir-bin-mohammad
Dr mahathir-bin-mohammad
 
Compensation management scenario in shanta garments limited
Compensation management scenario in shanta garments limitedCompensation management scenario in shanta garments limited
Compensation management scenario in shanta garments limited
 
Cheguevara
CheguevaraCheguevara
Cheguevara
 
Working from home vs. full time employment
Working from home vs. full time employmentWorking from home vs. full time employment
Working from home vs. full time employment
 
A Term Paper on Financial Statement Analysis of Square Pharmaceuticals Ltd
A Term Paper on Financial Statement Analysis of Square Pharmaceuticals LtdA Term Paper on Financial Statement Analysis of Square Pharmaceuticals Ltd
A Term Paper on Financial Statement Analysis of Square Pharmaceuticals Ltd
 
Management organizational behaviour all chapter key words
Management organizational behaviour all chapter key wordsManagement organizational behaviour all chapter key words
Management organizational behaviour all chapter key words
 
Use power and politics in organization
Use power and politics in organizationUse power and politics in organization
Use power and politics in organization
 
Organizational culture in standard chartered bank (SCB)
Organizational culture in  standard chartered bank (SCB)Organizational culture in  standard chartered bank (SCB)
Organizational culture in standard chartered bank (SCB)
 

Recently uploaded

What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxCeline George
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptNishitharanjan Rout
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...EADTU
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17Celine George
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfstareducators107
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of PlayPooky Knightsmith
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 

Recently uploaded (20)

What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of Play
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 

How secure is the cloud? and Amazon vs Walmart which giant will dominant?

  • 1. Case Study On 1. How secure is the cloud? 2. Amazon Vs Walmart: which Giant will dominate E-Commerce? Submitted To: Air Commodore M Abdus Samad Azad, BSP ndu, Psc PhD B. Sc. (Hons) M.Sc. in Applied Physics & Electronic Engineering MBA PhD (Information System) Professor (Adjunct) & Ex-Treasurer University of Professionals (BUP) Submitted By: Mohammad Mydul Islam Roll: 2023031053 ID no: 20011378 Date of Submission 16th May, 2020
  • 2. Case Study No 1: How secure is the cloud? Case Study Question & Answer 1. What is the biggest risk of cloud computing? Answer: The biggest risk of cloud computing is that it is highly distributed. Claud applications and application mash-ups reside in virtual libraries in large remote data centres and server farms that supply business, services and data management for multiple corporate clients. 2. What is the nature of cloud computing? Answer: The dispersed nature of cloud computing makes it difficult to track unauthorized activity. Virtually all cloud providers use encryption, such as secure socket Layers, to secure the data they handle while the data are being transmitted. But if the data are stored on devices that also store other companies’ data, it’s important to ensure these stored data are encrypted as well. 3. Is there any option to prove the data security? Answer: If your data is totally secure in the cloud, you may not able to prove it. Some cloud providers don’t meet current compliance requirements regarding security and some of those providers, such as Amazon, have asserted that they don’t intend to meet those and won’t allow companies auditors on-site. 4. What security and control problems are described in this case? Answer: There is a distinct lack of transparency with cloud computing providers. One of the biggest risks of cloud computing is that it is highly distributed. Cloud applications and application mash-ups reside in virtual libraries in large remote data centres and server farms that supply business services and data management for multiple corporate clients. Cloud computing providers often distribute work to data centres around the globe. Users may not know precisely where their data are being hosted nor where the data are stored. Because cloud computing is dispersed it’s difficult to track unauthorized activity. If data are stored on devices that also store other companies’ data, it’s important to ensure these stored data are encrypted as well.
  • 3. 5. What people, organization, and technology factors contribute to these problems? Answers: The factors are given below: People: Cloud computing users and cloud providers may fall short in fully understanding the security implications involved in the newest trend of distributed computing. Users are not investigating the providers enough and making sure the providers are meeting all the necessary security requirements. Providers are not being transparent enough in clearly specifying what security services they provide, how they protect data, and how they intend to meet corporate regulatory requirements. Organization: Cloud providers must use a fault-tolerant computer system which minimizes or eliminates downtime altogether by ensuring continuous availability of computing services. Cloud users need to pay attention to their own security practices, especially access controls. Cloud users should contract with a cloud vendor that is a public company, which is required by law to disclose how it manages information. Technology: Strong encryption technology is absolutely necessary for cloud computing. Network traffic can use secure sockets layer and secure hypertext transfer protocols. Two encryption methods that can be used for secure sessions between Internet client browser software and servers are symmetric key encryption and public key encryption. Data stored on cloud servers can be protected using firewalls, intrusion detection systems, antivirus and antispyware software, and unified threat management systems. 6. How secure is cloud computing? Explain your answer Answer: Depending on which cloud provider is used, it may be difficult to fully understand how secure cloud computing is. Salesforce.com, as a public company, is required by law to disclose how it manages information. It has strict processes and guidelines for managing its data centres. Another option is to use a cloud provider that gives subscribers the option to choose where their cloud computing work takes place. Other companies like Amazon EC2 and Microsoft Azure are not liable for data losses or fines or other legal penalties when companies use their services. Both vendors offer guidance on how to use their cloud platforms securely, and they may still be able to protect data better than some companies’ home-grown facilities. Some cloud providers don’t meet current compliance requirements regarding security, and some of those providers, such as Amazon, have asserted that they don’t intend to meet those rules and won’t allow compliance auditors on-site. Some regulations call for proof that systems are securely managed, which may require confirmation from an independent audit. Large providers are unlikely to allow another company’s auditors to inspect their data Centres.
  • 4. 7. If you were in charge of your company’s information systems department, what issues would you want to clarify with prospective vendors? Answer: Issues cloud users should clarify with prospective vendors include: a) Regardless of where data are stored or transferred, are users protected at a level that meets their corporate requirements? b) Does the cloud provider store and process data in specific jurisdictions according to the privacy rules of those jurisdictions? c) How does the cloud provider segregate corporate data from other companies? d) Ask for proof that encryption mechanisms are sound. e) How will the cloud provider respond if a disaster strikes, will the provider be able to completely restore data and how long will it take? f) Will the cloud provider submit to external audits and security certifications? 8. Would you entrust your corporate systems to a cloud computing provider? Why or why not? Answer: Answers should the issues raised in Question 7. As enticing as cloud computing may be because it lowers TCO costs of IT infrastructures, some companies may need to stay away from it altogether.
  • 5. No 2: Amazon Vs Walmart: which Giant will dominate E-Commerce? Case Study Question & Answer 1. What concepts in the chapter are illustrated in this case? Answer: E – Commerce business model. 2. Analyse Amazon and Walmart.com using the value chain and competitive forces models? Answer: Supply chain is a network of organizations and business processes for procuring raw materials, transforming these materials into intermediate and finished products and distributing the finished products to customers. It links suppliers, manufacturing plants, distribution centres, retail outlets and customers to supply goods and services from source through the supply chain in both directions. Supply chain management system automate the flow of information among members of the supply chain so they can use it to make better decisions about when and how much to purchase, produce or ship. More accurate information from supply chain management systems reduces uncertainty and the impact of the bullwhip effect. Supply chain management software includes software for supply chain planning and for supply chains by providing the connectivity for organizations in different countries to share supply chain information. Improved communication among supply chain members also facilitates efficient customer response and movement toward a demand-driven model. In attaining competitive advantage Porter’s five competitive forces can be used to determine industry profitability. These forces include threat of new entrances within the market, market power of suppliers, substitutions of products and services, bargaining power of the buyers and industry competition. The internet has changed the nature of doing business, so has the competition that surrounds it. By supplying a wide range of product to the consumer, amazon.com share a market space with the likes of Wal-Mart. Rivalries among existing firms are strong as the industry is growing and the products that are being sold to the consumer are not so differentiated. 3. What are the management, organization and technology factors that have contributed to the success of both Wal-Mart and Amazon? Answer: Both of them using e-commerce is a fascinating combination of business models and new information technologies. The three major electronic commerce categories are business to consumer (B2C) e commerce, business to business (B2B) e commerce and consumer to consumer (C2C). E-commerce can be viewed as the conduct of business commercial communications and management by using Internet technologies and through electronic
  • 6. methods, such as electronic data interchange (EDI) and automated data-collection systems. It may also involve the electronic transfer of information between businesses (EDI). E-business, on the other hand, has come to refer to the automation of an organization’s internal business processes using Internet and browser technologies. In using the Internet, many organizations have looked to add more value to the tangible products they sell by providing additional ‘information-based’ services. These can include online support, order tracking, order history, etc. Many of these initiatives focus on deepening the relationship with customers and suppliers. Others have moved their trading platform either partially or entirely onto the Internet. From the website, customers can search for a specific book, topic or author, or they can browse their way through the book catalogue and then complete the sale by entering their credit card information. Orders are processed immediately and books in stock, generally bestsellers, are shipped the same day. Customers are contacted by email when their order has been dispatched. All contact with the company is done either through their World Wide Website or by email. The company has also branched out into electronic auctions. It has also pioneered technologies such as customer profiling and ‘1-click’ shopping. 4. Compare Wal-Mart’s and Amazon’s e-commerce business models. Which is stronger? Explain your answer Answer: Both sites are online merchants that have been made by an identical model, where the menu of product categories on the left page margin. The last category in Walmart, they called Halloween shop which means a category where there are seasonal products. In the middle of the page at the top of both sites have search engines for products that can be searched by all departments or for each department separately. In the middle of the page both have special offers, best-selling products, and amazon.com has the products you are currently viewing by other users. Shop Walmart is simpler and easier to reach the required product, while at amazon.com and search for products on the home page have a lot of things that detract from the required product. The product categories are more or less similar but amazon.com has a special category for the book which is understandable because it is the first business was the main job. I think that amazon still as the stronger online retailer; they always do continuing new innovative. The profiling technology has enabled Amazon to recommend books based on previous purchasing history and what other customers who have bought similar books are also reading. Even today, the company strives to maintain their founding commitment to customer satisfaction and the delivery of an educational and inspiring shopping experience. 5. Where would you prefer to make your internet purchases? Amazon or Walmart.com? Why Answer: Amazon, the product more complete than Walmart and it has special category for the book as the main job.