TG 3.5-3.8 Flashcards

1
Q

how does cloud computing have a positive impact on employees

A

employees can access the info they need wherever they need it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

can cloud computing save money

A

on premise IT can be expensive, cloud computing is pretty cheap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

how would you increase storage space if you had on premise IT? if you had cloud computing?

A

build more storage// pay for more

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

can cloud computing improve org flexibility and competitiveness?

A

-> yes, use only the amount of resources they need at a given time (scale up and down easily)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

is cloud computing faster than on premise computing?

A

yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

6 risks/concerns with cloud computing?

A

1 legacy IT systems
2 reliability
3 privay
4 security
5 legal and regulatory enviornment
6 criminal use of cloud computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

concern 1: legacy IT

A

LEGACY SPAGHETTI! mix of old IT is hard to upgarde to cloud ocmputing

also professionals can have vested interests in old IT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

concern 2: reliabiltiy

A

outages can occur!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Microsofts cloud computing service name

A

AZURE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

amazon cloud computing service name

A

S3

simple storage service

or AWS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Conceern 3: privacy

A

cloud computing can not always guarantee privacy

their are legal regulations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Concern 4: security

A

very different from tradiitonal IT, so providers need to consider new security measures

Security issues include access to sensitive data, data segregation (among customers), privacy, error exploitation, recovery, accountability, malicious insiders, and account control.
The security of cloud computing services is a contentious issue that may be delaying the adoption of this technology. Security issues arise primarily from the unease of both the private and public sectors with the external management of security-based services. The fact that providers manage these services provides a great incentive for them to prioritize building and maintaining strong security services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The security of cloud computing services is a contentious issue that may be delaying the adoption of this technology. Security issues arise primarily from the unease of both the private and public sectors with the external management of security-based services. The fact that providers manage these services provides a great incentive for them to prioritize building and maintaining strong security services.
Another security issue involves the control over who is able to access and use the information stored in the cloud. (Recall our discussion of least privilege in Chapter 4.) Many organizations exercise least-privilege controls effectively with their on-premise IT infrastructures. Some cloud computing environments, in contrast, cannot exercise least-privilege controls effectively. This problem occurs because cloud computing environments were originally designed for individuals or groups, not for hierarchical organizations in which some people have both the right and the responsibility to exercise control over other people’s private information. To address this problem, cloud computing vendors are working to incorporate administrative, least-privilege functionality into their products. In fact, many have already done so.
Consider Panama City, Florida, as an example. Panama City was one of the first cities in the United States to adopt Google Apps for Government. The city was searching for a way to gain visibility into who was using Google Apps and how users were collaborating both inside and outside the city’s IT domain. Furthermore, the city had to have the ability to control and enforce data-sharing policies where necessary. The city decided to adopt Cisco Cloudlock (https://umbrella.cisco.com/products/casb).
Cloudlock provides a security system to protect its clients’ information assets located in public cloud applications like Google Apps. Cloudlock provides key data management issues such as the following:

Data inventory: How many information assets exist and what are their types?
Which information assets are shared with the public or over the Internet?
Who has access to what information asset and what information asset is accessible to whom?
Using Cloudlock, Panama City was able to notify data owners of policy violations or exposed documents containing potentially sensitive information, change or revoke excessive privilege, and audit permissions changes. Furthermore, the city’s IT manager was able to designate department leaders to manage their respective organizational unit’s data policies and usage by giving them access to the Cloudlock application.

A

The security of cloud computing services is a contentious issue that may be delaying the adoption of this technology. Security issues arise primarily from the unease of both the private and public sectors with the external management of security-based services. The fact that providers manage these services provides a great incentive for them to prioritize building and maintaining strong security services.
Another security issue involves the control over who is able to access and use the information stored in the cloud. (Recall our discussion of least privilege in Chapter 4.) Many organizations exercise least-privilege controls effectively with their on-premise IT infrastructures. Some cloud computing environments, in contrast, cannot exercise least-privilege controls effectively. This problem occurs because cloud computing environments were originally designed for individuals or groups, not for hierarchical organizations in which some people have both the right and the responsibility to exercise control over other people’s private information. To address this problem, cloud computing vendors are working to incorporate administrative, least-privilege functionality into their products. In fact, many have already done so.
Consider Panama City, Florida, as an example. Panama City was one of the first cities in the United States to adopt Google Apps for Government. The city was searching for a way to gain visibility into who was using Google Apps and how users were collaborating both inside and outside the city’s IT domain. Furthermore, the city had to have the ability to control and enforce data-sharing policies where necessary. The city decided to adopt Cisco Cloudlock (https://umbrella.cisco.com/products/casb).
Cloudlock provides a security system to protect its clients’ information assets located in public cloud applications like Google Apps. Cloudlock provides key data management issues such as the following:

Data inventory: How many information assets exist and what are their types?
Which information assets are shared with the public or over the Internet?
Who has access to what information asset and what information asset is accessible to whom?
Using Cloudlock, Panama City was able to notify data owners of policy violations or exposed documents containing potentially sensitive information, change or revoke excessive privilege, and audit permissions changes. Furthermore, the city’s IT manager was able to designate department leaders to manage their respective organizational unit’s data policies and usage by giving them access to the Cloudlock application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

concern 5: regulatory and legal environment

A

There are numerous legal and regulatory barriers to cloud computing, many of which involve data access and transport. For example, the European Union prohibits consumer data from being transferred to nonmember countries without the consumers’ prior consent and approval. Companies located outside the European Union can overcome this restriction by demonstrating that they provide a “safe harbour” for the data. Some countries, such as Germany, have enacted even more restrictive data export laws. Cloud computing vendors are aware of these regulations and laws, and they are working to modify their offerings so that they can assure customers and regulators that data entrusted to them are secure enough to meet all of these requirements.
To obtain compliance with regulations such as the Personal Information Protection and Electronic Documents Act in Canada; the Federal Information Security Management Act (FISMA), the Health Insurance Portability and Accountability Act, and the Sarbanes-Oxley Act in the United States; the Data Protection Directive in the European Union, and the credit card industry’s Payment Card Industry’s Data Security Standard (PCI DSS), cloud computing customers may have to adopt hybrid deployment modes that are typically more expensive and may offer restricted benefits. This process is how, for example, Google is able to “manage and meet additional government policy requirements beyond FISMA,” and Rackspace (www.rackspace.com) is able to claim PCI compliance. FISMA requires each federal agency to develop, document, and implement a program to provide information security for the information and information systems that support the operations of the agency, including those provided by contractors. PCI DSS is a set of requirements designed to ensure that all companies that process, store, or transmit credit card information maintain a secure environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

concern 6: criminal use of cloud computing

A

Cloud computing makes available a well-managed, generally reliable, scalable global infrastructure that is, unfortunately, as well suited to illegal computing activities as it is to legitimate business activities. We look here at a number of possible illegal activities.
The huge amount of information stored in the cloud makes it an attractive target for data thieves. Also, the distributed nature of cloud computing makes it very difficult to catch criminals.
Cloud computing makes immense processing power available to anyone. Criminals using cloud computing have access to encryption technology and anonymous communication channels that make it difficult for authorities to detect their activities. When law enforcement pursues criminals, the wrongdoers can rapidly shut down computing resources in the cloud, thus greatly decreasing the chances that there will be any clues left for forensic analysis. When criminals no longer need a machine and shut it down, other clients of cloud vendors immediately reuse the storage and computational capacity allocated to that machine. Therefore, the criminal information is overwritten by data from legitimate customers. It is nearly impossible to recover any data after the machine has been de-provisioned.
Criminals are registering for an account (with assumed names and stolen credit cards, of course) with a cloud vendor and “legitimately” using services for illegal purposes. For example, criminals are using Gmail or the text-sharing website Pastebin (www.pastebin.com) to plan crimes and share stolen information. Another example is that criminals use cloud computing in brute-force password cracking (see Chapter 4). Although such uses are prohibited by most company’s terms-of-service agreements, policing the cloud is expensive and not very rewarding for cloud providers.
Many cloud vendors offer geographical diversity—that is, virtual machines that are located in different physical locations around the world. Criminals can use this feature in transnational attacks. Such attacks place political and technical obstacles in the way of authorities seeking to trace a cyberattack back to its source.
Another weakness exploited by criminals arises from the web-based applications, or SaaS offerings, provided by cloud vendors. With millions of users commingling on tens of thousands of servers, a criminal can easily mix in among legitimate users.
Even more complicated for authorities and victims, cyberattacks can originate within cloud programs that we use and trust. For example, researchers at the security firm F-Secure reported that they had detected several phishing sites hosted within Google Docs. What made the attacks possible is a feature within Google’s spreadsheet system that lets users create web-based forms, with titles such as “Webmail Account Upgrade” and “Report a Bug.” These forms, located on a Google server, were authenticated with Google’s encryption certificate. Significantly, they requested sensitive information such as the user’s full name, username, Google password, and so on, according to the F-Secure researchers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Web services and service oriented architecture

A
17
Q

what are web services

A

apps delivered over the Internet (the cloud)

can be used on any device!

18
Q

Web services are applications delivered over the Internet (the cloud) that MIS professionals can select and combine through almost any device, from personal computers to mobile phones. By using a set of shared standards, or protocols, these applications permit different systems to “talk” with one another—that is, to share data and services—without requiring human beings to translate the conversations. Web services have enormous potential because they can be employed in a variety of environments: over the Internet, on an intranet inside a corporate firewall, or on an extranet set up by business partners. They can also perform a wide variety of tasks, from automating business processes to integrating components of an enterprisewide system to streamlining online buying and selling.
Web services provide numerous benefits for organizations:

The organization can use the existing Internet infrastructure without having to implement any new technologies.
Organizational personnel can access remote or local data without having to understand the complexities of this process.
The organization can create new applications quickly and easily.

A

Web services are applications delivered over the Internet (the cloud) that MIS professionals can select and combine through almost any device, from personal computers to mobile phones. By using a set of shared standards, or protocols, these applications permit different systems to “talk” with one another—that is, to share data and services—without requiring human beings to translate the conversations. Web services have enormous potential because they can be employed in a variety of environments: over the Internet, on an intranet inside a corporate firewall, or on an extranet set up by business partners. They can also perform a wide variety of tasks, from automating business processes to integrating components of an enterprisewide system to streamlining online buying and selling.
Web services provide numerous benefits for organizations:

The organization can use the existing Internet infrastructure without having to implement any new technologies.
Organizational personnel can access remote or local data without having to understand the complexities of this process.
The organization can create new applications quickly and easily.

19
Q

The collection of web services that are used to build a firm’s IT applications constitutes a service-oriented architecture (SOA). Businesses accomplish their processes by executing a series of these services. One of the major benefits of web services is that they can be reused across an organization in other applications. For example, a web service that checks a consumer’s credit could be used with a service that processes a mortgage application or a credit card application.

A

The collection of web services that are used to build a firm’s IT applications constitutes a service-oriented architecture (SOA). Businesses accomplish their processes by executing a series of these services. One of the major benefits of web services is that they can be reused across an organization in other applications. For example, a web service that checks a consumer’s credit could be used with a service that processes a mortgage application or a credit card application.

20
Q

Web services are based on four key protocols: XML, SOAP, WSDL, and UDDI. Extensible markup language (XML) is a computer language that makes it easier to exchange data among a variety of applications and to validate and interpret these data. XML is a more powerful and flexible markup language than hypertext markup language (HTML). HTML is a page-description language for specifying how text, graphics, video, and sound are placed on a web page document. HTML was originally designed to create and link static documents composed primarily of text (Figure TG 3.5). Today, however, the web is much more social and interactive, and many web pages have multimedia elements, such as images, audio, and video. To integrate these rich media into web pages, users had to rely on third-party plug-in applications such as Flash, Silverlight, and Java. Unfortunately for users, these add-ons require both additional programming and extensive computer processing.

A

Web services are based on four key protocols: XML, SOAP, WSDL, and UDDI. Extensible markup language (XML) is a computer language that makes it easier to exchange data among a variety of applications and to validate and interpret these data. XML is a more powerful and flexible markup language than hypertext markup language (HTML). HTML is a page-description language for specifying how text, graphics, video, and sound are placed on a web page document. HTML was originally designed to create and link static documents composed primarily of text (Figure TG 3.5). Today, however, the web is much more social and interactive, and many web pages have multimedia elements, such as images, audio, and video. To integrate these rich media into web pages, users had to rely on third-party plug-in applications such as Flash, Silverlight, and Java. Unfortunately for users, these add-ons require both additional programming and extensive computer processing.

21
Q

The next evolution of HTML, called HTML5, solves this problem by enabling users to embed images, audio, and video directly into a document without the add-ons. HTML5 also makes it easier for web pages to function across different display devices, including mobile devices and desktops. HTML5 also supports offline data storage for apps that run over the web. Web pages will execute more quickly, and they will resemble smartphone apps. HTML5 is used in a number of Internet platforms, including Apple’s Safari browser, Google Chrome, and the Firefox browser. Google’s Gmail and Google Reader also use HTML5. Websites listed as “iPad ready” are using HTML5 extensively. Examples of such sites are CTV (www.ctv.ca), Netflix (www.netflix.com), and The Globe and Mail (www.theglobeandmail.com).

A

The next evolution of HTML, called HTML5, solves this problem by enabling users to embed images, audio, and video directly into a document without the add-ons. HTML5 also makes it easier for web pages to function across different display devices, including mobile devices and desktops. HTML5 also supports offline data storage for apps that run over the web. Web pages will execute more quickly, and they will resemble smartphone apps. HTML5 is used in a number of Internet platforms, including Apple’s Safari browser, Google Chrome, and the Firefox browser. Google’s Gmail and Google Reader also use HTML5. Websites listed as “iPad ready” are using HTML5 extensively. Examples of such sites are CTV (www.ctv.ca), Netflix (www.netflix.com), and The Globe and Mail (www.theglobeandmail.com).

22
Q

Where HTML is limited to describing how data should be presented in the form of web pages, XML can present, communicate, and store data. For example, in XML a number is not simply a number. The XML tag also specifies whether the number represents a price, a date, or a postal code. Consider this example of XML, which identifies the contact information for Jane Smith.

<contact-info>
<name>Jane Smith</name>
<company>Bell Canada</company>
<phone>(416) 614-4664</phone>
</contact-info>

A

Where HTML is limited to describing how data should be presented in the form of web pages, XML can present, communicate, and store data. For example, in XML a number is not simply a number. The XML tag also specifies whether the number represents a price, a date, or a postal code. Consider this example of XML, which identifies the contact information for Jane Smith.

<contact-info>
<name>Jane Smith</name>
<company>Bell Canada</company>
<phone>(416) 614-4664</phone>
</contact-info>

23
Q

Simple object access protocol (SOAP) is a set of rules that define how messages can be exchanged among different network systems and applications through the use of XML. These rules essentially establish a common protocol that allows different web services to interoperate. For example, Visual Basic clients can use SOAP to access a Java server. SOAP runs on all hardware and software systems.
The web services description language (WSDL) is used to create the XML document that describes the tasks performed by the various web services. Tools such as Microsoft Visual Studio (www.visualstudio.microsoft.com) automate the process of accessing the WSDL, reading it, and coding the application to reference the specific web service.

A

Simple object access protocol (SOAP) is a set of rules that define how messages can be exchanged among different network systems and applications through the use of XML. These rules essentially establish a common protocol that allows different web services to interoperate. For example, Visual Basic clients can use SOAP to access a Java server. SOAP runs on all hardware and software systems.
The web services description language (WSDL) is used to create the XML document that describes the tasks performed by the various web services. Tools such as Microsoft Visual Studio (www.visualstudio.microsoft.com) automate the process of accessing the WSDL, reading it, and coding the application to reference the specific web service.

24
Q

FIGURE TG 3.5 (a) Screenshot of an HTML wrapper. This wrapper gives instructions on how to open a video associated with this book. (b) Example of XML tagging.

Universal description, discovery, and integration (UDDI) allows MIS professionals to search for needed web services by creating public or private searchable directories of these services. In other words, UDDI is the registry of descriptions of web services.
Examples of web services abound. For example, Expedia.com uses Amazon Web Services to quickly develop and deploy web applications that can be then transferred and reused in different Expedia websites around the world without having to develop those same applications again. Recently, Expedia used web services to develop a feature on its website called Expedia Suggest Service (ESS), which helps customers enter travel, search, and location information correctly. This web service uses algorithms based on customer location and aggregated shopping and booking data from past customers to display suggestions when a customer starts typing. For example, if a customer in Toronto entered “Cal” when booking a flight, the service would display Calgary, California, and other relevant destinations. Expedia launched ESS initially on its Singapore website and then quickly replicated the service to its North American and European websites. Web services provide Expedia the ability to develop web applications quickly, test them locally, and seamlessly reuse them across its network of regional websites around the world.

A

FIGURE TG 3.5 (a) Screenshot of an HTML wrapper. This wrapper gives instructions on how to open a video associated with this book. (b) Example of XML tagging.

Universal description, discovery, and integration (UDDI) allows MIS professionals to search for needed web services by creating public or private searchable directories of these services. In other words, UDDI is the registry of descriptions of web services.
Examples of web services abound. For example, Expedia.com uses Amazon Web Services to quickly develop and deploy web applications that can be then transferred and reused in different Expedia websites around the world without having to develop those same applications again. Recently, Expedia used web services to develop a feature on its website called Expedia Suggest Service (ESS), which helps customers enter travel, search, and location information correctly. This web service uses algorithms based on customer location and aggregated shopping and booking data from past customers to display suggestions when a customer starts typing. For example, if a customer in Toronto entered “Cal” when booking a flight, the service would display Calgary, California, and other relevant destinations. Expedia launched ESS initially on its Singapore website and then quickly replicated the service to its North American and European websites. Web services provide Expedia the ability to develop web applications quickly, test them locally, and seamlessly reuse them across its network of regional websites around the world.

25
Q
A