SlideShare a Scribd company logo
Business Case for upgrading ICT 
Data Security System of KD 
Insurance PLC to Accommodate 
Cloud Computing 
By 
Keerthi Delwatta: Chief Information 
Officer. 
9/17/2014 1
Agenda 
What is Cloud Computing 
Advantages and Disadvantages 
Business Proposal 
Financial Analysis 
Conclusion 
List of References 
9/17/2014 2
Purpose of Presentation 
To enlighten CEO, Board and Executives on Cloud 
Computing to upgrade the ICT Data Security System 
of the company to protect client’s and firm’s data. 
9/17/2014 3
Cloud Computing in Insurance 
Industry 
How the Cloud is utilized : 
Data is stored in the off site virtual server owned by 
a service provider on the basis of actual usage. 
Associated Risk: 
Loss of control over software application. 
Over Dependence on service provider for 
Maintenance, Upgrading and Management. 
Experiences of other Companies: 
Very positive and Encouraging. 
9/17/2014 4
Cloud Computing in Insurance Industry 
Advantages : 
Economies of scale 
Scalable Processing & Application 
Minimum Capital Investment 
Speedy Implementation 
Higher Productivity 
Disadvantages: 
Extreme Dependence on the Service Provider 
Loss of control over software application 
Compromise confidentiality & Privacy 
9/17/2014 5
Cloud Computing in Insurance 
Industry 
 Scope of Recommendation: 
Upgrading ICT Data security system to protect Client’s 
and Firm’s own data. 
To synchronize and ensure integrity of data on servers 
and end user devices. 
 Infrastructure Requirements: 
Cloud specific software applications 
Improved Communication Network Facilities 
9/17/2014 6
Financial Feasibility 
• Base Case Analysis: 
7 
Base case analysis of cloud computing to accommodate ICT Data security system of K D Insurance Plc. 
year 0 1 2 3 4 5 6 
Relevant benefits (millions) 
Reduced costs of capital $0 $25 $30 $30 $35 $40 $45 
Improved productivity $0 $25 $30 $40 $60 $75 $80 
Reduced insurance $0 $20 $20 $30 $40 $50 $60 
Total improvements (A) $0 $70 $80 $100 $135 $165 $185 
Relevant costs 
policy development and maintenance $0 $40 $45 $55 $55 $60 $70 
software acquisition $40 $10 $10 $10 $10 $10 $10 
support team $25 $10 $10 $10 $10 $10 $10 
incremental maintenance $0 $0 $10 $10 $10 $10 $10 
training $10 $5 $0 $0 $0 $0 $0 
Total costs (B) $75 $65 $75 $85 $85 $90 $100 
Net cash flow -$75 $5 $5 $15 $50 $75 $85 
9/17/2014
Financial Feasibility 
8 
Pay back Period 04 Years 
$ 73million 
28.4 %d 
NPV @ 10% 
IRR 
Profitability Index 1.98d 
9/17/2014
Sensitivity Analysis 
Criteria: Policy Development & Maintenance Cost: 
Recommendation: 
 Policy Development & Maintenance Cost is highly sensitive to Net Present value 
and hence should be properly controlled. 
9 
100% 
Policy 
Development & 
Maintenance 
Cost 
314% 
Net Present 
Value 
9/17/2014
Sensitivity Analysis 
Criteria: Incremental maintenance cost 
Recommendation: 
 Maintenance cost is relatively sensitive to Net Present value and hence should be 
controlled. 
10 
100% 
Maintenance 
cost 
47% 
Net Present 
Value 
9/17/2014
Sensitivity Analysis 
Criteria: Productivity 
Recommendation: 
 Productivity is highly sensitive to Net Present value and hence should be properly 
monitored to ensure desired results. 
11 
100% 
Productivity 
288% 
Net Present 
Value 
9/17/2014
Conclusion 
• Cloud Computing is highly advantageous to the 
company as it enhance the productivity , increase 
efficiency of the ICT Data Security system while 
minimizing the cost and hence I seek your 
authorization and financial support for immediate 
implementation of the project. 
9/17/2014 12
Lessons learnt from Conducting the 
Research 
The risk mitigation strategy of adopting a Private 
Virtual Infrastructure(PVI) Model to share 
responsibility for Security of Cloud Computing between 
information owner and service provider has been 
evolved which is encouraging. 
9/17/2014 13
Lessons learnt from Conducting the 
Research 
Trusted Virtual Machines Identification Technique has 
been evolved to ensure proper management of virtual 
machines in the data center that encourage cloud 
computing. 
9/17/2014 14
List of References 
1. Kenneth, C, Loudon, Jane P. Loudon 2014,Management Information systems, 
Thirteenth Edition, Pearson, England. 
2. Das, T K ., and Teng, B.S. (1999), “Managing risks in strategic Alliance”, Academy 
of Management Executives, Vol. 13 No. 4, pp. 50 -62 
3. J.Heiser and M. Nicolett, Accessing the Security Risk s of Cloud Computing, 
Gartner, inc., Stemford, Ct, 2008. 
4. M. Armbrust, A. Fox, R. Griffith et all., Above the Cloud: A Berkeley View of 
Cloud Commutating, University of California , Berkerley, Berkerly, CA, 2009, 
5. Greenberg, A., Hamilton, J., Maltz, D.A., Patel, P. (2009). “The Cost of a Cloud: 
Research Problems in Data Center Networks”, ACM SIGCOMM Computer 
Communications Review. 
6. Undheim, A., Chilwan, A., Heegaard, P. (2011). “Differentiated Availability in Cloud 
Computing SLAs”, Proc. GRID conference, pp. 129–136. 
7. Menascé, D. A, Ngo, P. (2009). “Understanding Cloud Computing: Experimentation and 
Capacity Planning”, Proc. Computer Measurement Group conference 
8. http://www.ibm.com/developerworks/cloud/about.html 
9/17/2014 15

More Related Content

Viewers also liked

Info2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemsInfo2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systems
saltashict
 
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs FilatovsDSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
Andris Soroka
 
Safety And Security Of Data 4
Safety And Security Of Data 4Safety And Security Of Data 4
Safety And Security Of Data 4
Wynthorpe
 
ICT security and Open Data
ICT security and Open DataICT security and Open Data
ICT security and Open Data
SecuRing
 
Interdisciplinary Lesson Plan ICT-Art
Interdisciplinary Lesson Plan ICT-ArtInterdisciplinary Lesson Plan ICT-Art
Interdisciplinary Lesson Plan ICT-Art
Daniela Silva
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ict
Aten Kecik
 

Viewers also liked (6)

Info2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemsInfo2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systems
 
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs FilatovsDSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
 
Safety And Security Of Data 4
Safety And Security Of Data 4Safety And Security Of Data 4
Safety And Security Of Data 4
 
ICT security and Open Data
ICT security and Open DataICT security and Open Data
ICT security and Open Data
 
Interdisciplinary Lesson Plan ICT-Art
Interdisciplinary Lesson Plan ICT-ArtInterdisciplinary Lesson Plan ICT-Art
Interdisciplinary Lesson Plan ICT-Art
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ict
 

Similar to Business case for upgrading ict data security system by keerthi delwatta u1054630

Technology Megatrends Reshaping IT: What’s Your Migration Path
Technology Megatrends Reshaping IT: What’s Your Migration PathTechnology Megatrends Reshaping IT: What’s Your Migration Path
Technology Megatrends Reshaping IT: What’s Your Migration Path
Fadi Semaan
 
Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?
Dell World
 
Accelerating hybrid-cloud adoption in banking and securities
Accelerating hybrid-cloud adoption in banking and securitiesAccelerating hybrid-cloud adoption in banking and securities
Accelerating hybrid-cloud adoption in banking and securities
McKinsey & Company
 
Rebooting IT Infrastructure for the Digital Age
Rebooting IT Infrastructure for the Digital AgeRebooting IT Infrastructure for the Digital Age
Rebooting IT Infrastructure for the Digital Age
Capgemini
 
Why group practices-should-embrace-the-cloud
Why group practices-should-embrace-the-cloudWhy group practices-should-embrace-the-cloud
Why group practices-should-embrace-the-cloud
Mark D. Huzyak DMD
 
Buying Into The Cloud
Buying Into The CloudBuying Into The Cloud
Buying Into The Cloud
myhosting
 
10-TOP-IT-INITIATIVES_6-6-16
10-TOP-IT-INITIATIVES_6-6-1610-TOP-IT-INITIATIVES_6-6-16
10-TOP-IT-INITIATIVES_6-6-16
Peak 10
 
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxEmphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
lior mazor
 
Innovation in maintenance - Accenture
Innovation in maintenance - AccentureInnovation in maintenance - Accenture
Innovation in maintenance - Accenture
Accenture the Netherlands
 
Neville Fuller
Neville FullerNeville Fuller
Neville Fuller
Neville1964
 
A Futurist Perspective
A Futurist PerspectiveA Futurist Perspective
A Futurist Perspective
Joseph M Bradley
 
DoD Cloud Computing Strategy
DoD Cloud Computing StrategyDoD Cloud Computing Strategy
DoD Cloud Computing Strategy
GovCloud Network
 
The Unpleasant Truths of Modern Business Cybersecurity
The Unpleasant Truths of Modern Business CybersecurityThe Unpleasant Truths of Modern Business Cybersecurity
The Unpleasant Truths of Modern Business Cybersecurity
Global Knowledge Training
 
DOES14 - Stephen Elliot - IDC - Delivering DevOps Business Metrics that Matter
DOES14 - Stephen Elliot - IDC - Delivering DevOps Business Metrics that MatterDOES14 - Stephen Elliot - IDC - Delivering DevOps Business Metrics that Matter
DOES14 - Stephen Elliot - IDC - Delivering DevOps Business Metrics that Matter
Gene Kim
 
Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)
Rafael Maranon
 
Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019
Jenny Jenish kyzy
 
Cloud Reshaping Banking
Cloud Reshaping BankingCloud Reshaping Banking
Cloud Reshaping Banking
Happiest Minds Technologies
 
Cloud Industry Forum Report: Cloud for Business, Why Security is No Longer a ...
Cloud Industry Forum Report: Cloud for Business, Why Security is No Longer a ...Cloud Industry Forum Report: Cloud for Business, Why Security is No Longer a ...
Cloud Industry Forum Report: Cloud for Business, Why Security is No Longer a ...
Hewlett Packard Enterprise Business Value Exchange
 
Frank Gens - Clouds and Beyond: Positioning for the Next 20 Years in Enterpri...
Frank Gens - Clouds and Beyond: Positioning for the Next 20 Years in Enterpri...Frank Gens - Clouds and Beyond: Positioning for the Next 20 Years in Enterpri...
Frank Gens - Clouds and Beyond: Positioning for the Next 20 Years in Enterpri...
innoforum09
 
Cloud webinar final
Cloud webinar finalCloud webinar final
Cloud webinar final
Ness Technologies
 

Similar to Business case for upgrading ict data security system by keerthi delwatta u1054630 (20)

Technology Megatrends Reshaping IT: What’s Your Migration Path
Technology Megatrends Reshaping IT: What’s Your Migration PathTechnology Megatrends Reshaping IT: What’s Your Migration Path
Technology Megatrends Reshaping IT: What’s Your Migration Path
 
Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?
 
Accelerating hybrid-cloud adoption in banking and securities
Accelerating hybrid-cloud adoption in banking and securitiesAccelerating hybrid-cloud adoption in banking and securities
Accelerating hybrid-cloud adoption in banking and securities
 
Rebooting IT Infrastructure for the Digital Age
Rebooting IT Infrastructure for the Digital AgeRebooting IT Infrastructure for the Digital Age
Rebooting IT Infrastructure for the Digital Age
 
Why group practices-should-embrace-the-cloud
Why group practices-should-embrace-the-cloudWhy group practices-should-embrace-the-cloud
Why group practices-should-embrace-the-cloud
 
Buying Into The Cloud
Buying Into The CloudBuying Into The Cloud
Buying Into The Cloud
 
10-TOP-IT-INITIATIVES_6-6-16
10-TOP-IT-INITIATIVES_6-6-1610-TOP-IT-INITIATIVES_6-6-16
10-TOP-IT-INITIATIVES_6-6-16
 
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxEmphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
 
Innovation in maintenance - Accenture
Innovation in maintenance - AccentureInnovation in maintenance - Accenture
Innovation in maintenance - Accenture
 
Neville Fuller
Neville FullerNeville Fuller
Neville Fuller
 
A Futurist Perspective
A Futurist PerspectiveA Futurist Perspective
A Futurist Perspective
 
DoD Cloud Computing Strategy
DoD Cloud Computing StrategyDoD Cloud Computing Strategy
DoD Cloud Computing Strategy
 
The Unpleasant Truths of Modern Business Cybersecurity
The Unpleasant Truths of Modern Business CybersecurityThe Unpleasant Truths of Modern Business Cybersecurity
The Unpleasant Truths of Modern Business Cybersecurity
 
DOES14 - Stephen Elliot - IDC - Delivering DevOps Business Metrics that Matter
DOES14 - Stephen Elliot - IDC - Delivering DevOps Business Metrics that MatterDOES14 - Stephen Elliot - IDC - Delivering DevOps Business Metrics that Matter
DOES14 - Stephen Elliot - IDC - Delivering DevOps Business Metrics that Matter
 
Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)
 
Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019
 
Cloud Reshaping Banking
Cloud Reshaping BankingCloud Reshaping Banking
Cloud Reshaping Banking
 
Cloud Industry Forum Report: Cloud for Business, Why Security is No Longer a ...
Cloud Industry Forum Report: Cloud for Business, Why Security is No Longer a ...Cloud Industry Forum Report: Cloud for Business, Why Security is No Longer a ...
Cloud Industry Forum Report: Cloud for Business, Why Security is No Longer a ...
 
Frank Gens - Clouds and Beyond: Positioning for the Next 20 Years in Enterpri...
Frank Gens - Clouds and Beyond: Positioning for the Next 20 Years in Enterpri...Frank Gens - Clouds and Beyond: Positioning for the Next 20 Years in Enterpri...
Frank Gens - Clouds and Beyond: Positioning for the Next 20 Years in Enterpri...
 
Cloud webinar final
Cloud webinar finalCloud webinar final
Cloud webinar final
 

Recently uploaded

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 

Recently uploaded (20)

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 

Business case for upgrading ict data security system by keerthi delwatta u1054630

  • 1. Business Case for upgrading ICT Data Security System of KD Insurance PLC to Accommodate Cloud Computing By Keerthi Delwatta: Chief Information Officer. 9/17/2014 1
  • 2. Agenda What is Cloud Computing Advantages and Disadvantages Business Proposal Financial Analysis Conclusion List of References 9/17/2014 2
  • 3. Purpose of Presentation To enlighten CEO, Board and Executives on Cloud Computing to upgrade the ICT Data Security System of the company to protect client’s and firm’s data. 9/17/2014 3
  • 4. Cloud Computing in Insurance Industry How the Cloud is utilized : Data is stored in the off site virtual server owned by a service provider on the basis of actual usage. Associated Risk: Loss of control over software application. Over Dependence on service provider for Maintenance, Upgrading and Management. Experiences of other Companies: Very positive and Encouraging. 9/17/2014 4
  • 5. Cloud Computing in Insurance Industry Advantages : Economies of scale Scalable Processing & Application Minimum Capital Investment Speedy Implementation Higher Productivity Disadvantages: Extreme Dependence on the Service Provider Loss of control over software application Compromise confidentiality & Privacy 9/17/2014 5
  • 6. Cloud Computing in Insurance Industry  Scope of Recommendation: Upgrading ICT Data security system to protect Client’s and Firm’s own data. To synchronize and ensure integrity of data on servers and end user devices.  Infrastructure Requirements: Cloud specific software applications Improved Communication Network Facilities 9/17/2014 6
  • 7. Financial Feasibility • Base Case Analysis: 7 Base case analysis of cloud computing to accommodate ICT Data security system of K D Insurance Plc. year 0 1 2 3 4 5 6 Relevant benefits (millions) Reduced costs of capital $0 $25 $30 $30 $35 $40 $45 Improved productivity $0 $25 $30 $40 $60 $75 $80 Reduced insurance $0 $20 $20 $30 $40 $50 $60 Total improvements (A) $0 $70 $80 $100 $135 $165 $185 Relevant costs policy development and maintenance $0 $40 $45 $55 $55 $60 $70 software acquisition $40 $10 $10 $10 $10 $10 $10 support team $25 $10 $10 $10 $10 $10 $10 incremental maintenance $0 $0 $10 $10 $10 $10 $10 training $10 $5 $0 $0 $0 $0 $0 Total costs (B) $75 $65 $75 $85 $85 $90 $100 Net cash flow -$75 $5 $5 $15 $50 $75 $85 9/17/2014
  • 8. Financial Feasibility 8 Pay back Period 04 Years $ 73million 28.4 %d NPV @ 10% IRR Profitability Index 1.98d 9/17/2014
  • 9. Sensitivity Analysis Criteria: Policy Development & Maintenance Cost: Recommendation:  Policy Development & Maintenance Cost is highly sensitive to Net Present value and hence should be properly controlled. 9 100% Policy Development & Maintenance Cost 314% Net Present Value 9/17/2014
  • 10. Sensitivity Analysis Criteria: Incremental maintenance cost Recommendation:  Maintenance cost is relatively sensitive to Net Present value and hence should be controlled. 10 100% Maintenance cost 47% Net Present Value 9/17/2014
  • 11. Sensitivity Analysis Criteria: Productivity Recommendation:  Productivity is highly sensitive to Net Present value and hence should be properly monitored to ensure desired results. 11 100% Productivity 288% Net Present Value 9/17/2014
  • 12. Conclusion • Cloud Computing is highly advantageous to the company as it enhance the productivity , increase efficiency of the ICT Data Security system while minimizing the cost and hence I seek your authorization and financial support for immediate implementation of the project. 9/17/2014 12
  • 13. Lessons learnt from Conducting the Research The risk mitigation strategy of adopting a Private Virtual Infrastructure(PVI) Model to share responsibility for Security of Cloud Computing between information owner and service provider has been evolved which is encouraging. 9/17/2014 13
  • 14. Lessons learnt from Conducting the Research Trusted Virtual Machines Identification Technique has been evolved to ensure proper management of virtual machines in the data center that encourage cloud computing. 9/17/2014 14
  • 15. List of References 1. Kenneth, C, Loudon, Jane P. Loudon 2014,Management Information systems, Thirteenth Edition, Pearson, England. 2. Das, T K ., and Teng, B.S. (1999), “Managing risks in strategic Alliance”, Academy of Management Executives, Vol. 13 No. 4, pp. 50 -62 3. J.Heiser and M. Nicolett, Accessing the Security Risk s of Cloud Computing, Gartner, inc., Stemford, Ct, 2008. 4. M. Armbrust, A. Fox, R. Griffith et all., Above the Cloud: A Berkeley View of Cloud Commutating, University of California , Berkerley, Berkerly, CA, 2009, 5. Greenberg, A., Hamilton, J., Maltz, D.A., Patel, P. (2009). “The Cost of a Cloud: Research Problems in Data Center Networks”, ACM SIGCOMM Computer Communications Review. 6. Undheim, A., Chilwan, A., Heegaard, P. (2011). “Differentiated Availability in Cloud Computing SLAs”, Proc. GRID conference, pp. 129–136. 7. Menascé, D. A, Ngo, P. (2009). “Understanding Cloud Computing: Experimentation and Capacity Planning”, Proc. Computer Measurement Group conference 8. http://www.ibm.com/developerworks/cloud/about.html 9/17/2014 15