SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Cloud concepts.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of Expertise Industry Certifications
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
– Cloud classifications.
– Types of cloud computing.
PACE-IT.
Page 4
Cloud concepts.
Page 5
Cloud computing is where
the resources on the network
are not actually physical in
nature. They are provided to
the user virtually.
This can lead to a very fluid and dynamic environment, as
required resources are normally only provisioned as needed
and are decommissioned once their use is completed.
Most often, these virtual resources are not owned by the
company that uses them, but are provided by a service
provider.
While cloud computing is highly configurable and
changeable, it does have some basic structures that are
used in the classification of the type of cloud that is in use.
Cloud concepts.
Page 6
– Public cloud.
» Systems can interact with services and devices within the
public cloud and on public networks (e.g., the Internet) and
possibly other public clouds.
– Private cloud.
» Systems only communicate with services and devices within
the specified private cloud.
– Hybrid cloud.
» Combines aspects of both the public and private clouds.
– Community cloud.
» Cloud services used by private individuals, organizations, or
groups that have a common interest.
Cloud concepts.
Page 7
Cloud concepts.
Page 8
Because of the nature of
cloud computing, it is very
configurable to the needs
and desires of the purchaser.
Purchasers have many options beyond the type of
cloud services (e.g., public or private) that they want
to provision. They must also determine what type of
service they are going to require—from the most
basic to the highly complex (e.g., SaaS or PaaS).
Cloud concepts.
Page 9
– Software as a service (SaaS).
» The end user purchases the rights to use an application
(software) without the need to configure the virtual servers that
will deliver the application.
• It is usually delivered as a Web application (opened and used
from within a Web browser).
– Platform as a service (PaaS).
» The user is provided with a development platform for the
creation of software packages, without the need to configure
the virtual servers and infrastructure that delivers it.
– Infrastructure as a service (IaaS).
» The end user is provided with access to virtual servers
(configurable by the customer) and other virtual network
resources.
• Creates a highly configurable environment in which customers
can create the resources and performance that they require.
• The end user supplies the software that is going to be used on
the IaaS network.
Cloud concepts.
Page 10
It is not uncommon for the
type of cloud computing
being utilized by an
organization to be a mix.
Some departments may use IaaS, while a
development team utilizes a PaaS only. Part of the
advantage of cloud computing is only initializing
resources as they are needed.
In a private cloud situation, it is possible for the
organization that is using it to actually own the cloud
resources. If they do own the cloud resources, they
may have it on site, or they may pay to have the
resources hosted off site.
Cloud concepts.
Page 11
Cloud computing can be a
great method of conserving
company resources, but it
also has several security
considerations.
When using hosting services, there is always the need to
consider confidentiality. When the resources are out of the
physical control of the company, it may be difficult control
access to those resources. In some situations—such as
when a law requires a company to maintain physical control
of the resources—cloud computing may be unacceptable.
In addition to the physical control, there is also the problem
of reliability and availability. The purchaser is having to rely
upon the hosting service’s ability to maintain system uptime
and availability.
Cloud concepts.
Always perform due diligence research to ensure that the
cloud provider is both reputable and reliable. As part of the
research, it is also important to evaluate whether or not the
resource is appropriate to be hosted (e.g., the owner is not
required to maintain physical control of it).
Page 12
Cloud concepts.
The use of cloud computing means that network resources are provided
virtually instead of physically. This can lead to a very dynamic and fluid
computing environment. The type of cloud deployed can be classified in one
of four ways: public, private, hybrid, or community.
Topic
Cloud classifications.
Summary
The highly configurable nature of cloud computing has led to several
different types of cloud computing. In SaaS, only a software package is
provided (usually run from within a Web browser). PaaS provides a
development platform that is usually used in the creation of software
packages. With IaaS, the user configures the virtual network resources that
will be used—from virtual servers to the software packages. Cloud
computing does raise some issues with security, mainly concerning
controlling who has access to the resources, reliability, and availability.
Always research the options for the appropriateness of the solution.
Types of cloud computing.
Page 13
THANK YOU!
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

PACE-IT, Security+1.4: Common Network Protocols (part 3)
PACE-IT, Security+1.4: Common Network Protocols (part 3)PACE-IT, Security+1.4: Common Network Protocols (part 3)
PACE-IT, Security+1.4: Common Network Protocols (part 3)
 
PACE-IT: Common Threats (part 2)
PACE-IT: Common Threats (part 2)PACE-IT: Common Threats (part 2)
PACE-IT: Common Threats (part 2)
 
PACE-IT, Security+ 2.4: Basic Forensic Procedures
PACE-IT, Security+ 2.4: Basic Forensic ProceduresPACE-IT, Security+ 2.4: Basic Forensic Procedures
PACE-IT, Security+ 2.4: Basic Forensic Procedures
 
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
 
PACE-IT, Security+ 2.1: Risk Related Concepts (part 1)
PACE-IT, Security+ 2.1: Risk Related Concepts (part 1)PACE-IT, Security+ 2.1: Risk Related Concepts (part 1)
PACE-IT, Security+ 2.1: Risk Related Concepts (part 1)
 
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement TechniquesPACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement Techniques
 
PACE-IT, Security+2.9: Goals of Security Controls
PACE-IT, Security+2.9: Goals of Security ControlsPACE-IT, Security+2.9: Goals of Security Controls
PACE-IT, Security+2.9: Goals of Security Controls
 
PACE-IT, Security+ 2.1: Risk Related Concepts (part 2)
PACE-IT, Security+ 2.1: Risk Related Concepts (part 2)PACE-IT, Security+ 2.1: Risk Related Concepts (part 2)
PACE-IT, Security+ 2.1: Risk Related Concepts (part 2)
 
PACE-IT, Security+3.2: Summary of Types of Attacks (part 1)
PACE-IT, Security+3.2: Summary of Types of Attacks (part 1)PACE-IT, Security+3.2: Summary of Types of Attacks (part 1)
PACE-IT, Security+3.2: Summary of Types of Attacks (part 1)
 
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
 
PACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+3.4: Summary of Wireless AttacksPACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+3.4: Summary of Wireless Attacks
 
PACE-IT, Security+2.8: Disaster Recovery Concepts
PACE-IT, Security+2.8: Disaster Recovery ConceptsPACE-IT, Security+2.8: Disaster Recovery Concepts
PACE-IT, Security+2.8: Disaster Recovery Concepts
 
PACE-IT: Basic Forensic Concepts
PACE-IT: Basic Forensic ConceptsPACE-IT: Basic Forensic Concepts
PACE-IT: Basic Forensic Concepts
 
PACE-IT, Security+ 2.5: Incident Response Concepts
PACE-IT, Security+ 2.5: Incident Response ConceptsPACE-IT, Security+ 2.5: Incident Response Concepts
PACE-IT, Security+ 2.5: Incident Response Concepts
 
PACE-IT: IT Security Measures
PACE-IT: IT Security MeasuresPACE-IT: IT Security Measures
PACE-IT: IT Security Measures
 
PACE-IT: Physical Network Security Control
PACE-IT: Physical Network Security ControlPACE-IT: Physical Network Security Control
PACE-IT: Physical Network Security Control
 
Pace IT - Common Security Threats
Pace IT - Common Security ThreatsPace IT - Common Security Threats
Pace IT - Common Security Threats
 
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment ToolsPACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment Tools
 
PACE-IT: Common Threats (part 1)
PACE-IT: Common Threats (part 1)PACE-IT: Common Threats (part 1)
PACE-IT: Common Threats (part 1)
 

Ähnlich wie PACE-IT, Security+1.3: Cloud Concepts

Ähnlich wie PACE-IT, Security+1.3: Cloud Concepts (20)

PACE-IT: Basic Cloud Concepts - N10 006
PACE-IT: Basic Cloud Concepts - N10 006 PACE-IT: Basic Cloud Concepts - N10 006
PACE-IT: Basic Cloud Concepts - N10 006
 
Celera Networks on Cloud Computing
Celera Networks on Cloud Computing Celera Networks on Cloud Computing
Celera Networks on Cloud Computing
 
Data Security and Privacy in Cloud Computing
Data Security and Privacy in Cloud ComputingData Security and Privacy in Cloud Computing
Data Security and Privacy in Cloud Computing
 
Cloud computing usa
Cloud computing usaCloud computing usa
Cloud computing usa
 
Cloud-Computing_USA.ppt
Cloud-Computing_USA.pptCloud-Computing_USA.ppt
Cloud-Computing_USA.ppt
 
Cloud-Computing_USA.ppt
Cloud-Computing_USA.pptCloud-Computing_USA.ppt
Cloud-Computing_USA.ppt
 
Cloud-Computing_USA.ppt
Cloud-Computing_USA.pptCloud-Computing_USA.ppt
Cloud-Computing_USA.ppt
 
Cloud-Computing_USA.ppt
Cloud-Computing_USA.pptCloud-Computing_USA.ppt
Cloud-Computing_USA.ppt
 
The Nist definition of cloud computing cloud computing Research Paper
The Nist definition of cloud computing cloud computing Research PaperThe Nist definition of cloud computing cloud computing Research Paper
The Nist definition of cloud computing cloud computing Research Paper
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
2015 APHL Annual Meeting - Racing to the Clouds: How Cloud Computing is Advan...
2015 APHL Annual Meeting - Racing to the Clouds: How Cloud Computing is Advan...2015 APHL Annual Meeting - Racing to the Clouds: How Cloud Computing is Advan...
2015 APHL Annual Meeting - Racing to the Clouds: How Cloud Computing is Advan...
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
 
Building Cloud capability for startups
Building Cloud capability for startupsBuilding Cloud capability for startups
Building Cloud capability for startups
 
Cloud capability for startups
Cloud capability for startupsCloud capability for startups
Cloud capability for startups
 
Whitepaper: Security of the Cloud
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the Cloud
 
Security of the Cloud
Security of the CloudSecurity of the Cloud
Security of the Cloud
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
10 Lessons Learned from Cloud Offerings
10 Lessons Learned from Cloud Offerings10 Lessons Learned from Cloud Offerings
10 Lessons Learned from Cloud Offerings
 
Cloud Computing: Business Trends and the Challenges
Cloud Computing: Business Trends and the ChallengesCloud Computing: Business Trends and the Challenges
Cloud Computing: Business Trends and the Challenges
 
cloud services and providers
cloud services and providerscloud services and providers
cloud services and providers
 

Mehr von Pace IT at Edmonds Community College

Mehr von Pace IT at Edmonds Community College (19)

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
 
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account ManagementPACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account Management
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
 
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication ServicesPACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication Services
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
 
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data SecurityPACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
 
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
PACE-IT, Security+3.3: Summary of Social Engineering AttacksPACE-IT, Security+3.3: Summary of Social Engineering Attacks
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
 
PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)
PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)
PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)
 
PACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of MalwarePACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of Malware
 

Kürzlich hochgeladen

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Kürzlich hochgeladen (20)

Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 

PACE-IT, Security+1.3: Cloud Concepts

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of Expertise Industry Certifications  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 – Cloud classifications. – Types of cloud computing. PACE-IT.
  • 5. Page 5 Cloud computing is where the resources on the network are not actually physical in nature. They are provided to the user virtually. This can lead to a very fluid and dynamic environment, as required resources are normally only provisioned as needed and are decommissioned once their use is completed. Most often, these virtual resources are not owned by the company that uses them, but are provided by a service provider. While cloud computing is highly configurable and changeable, it does have some basic structures that are used in the classification of the type of cloud that is in use. Cloud concepts.
  • 6. Page 6 – Public cloud. » Systems can interact with services and devices within the public cloud and on public networks (e.g., the Internet) and possibly other public clouds. – Private cloud. » Systems only communicate with services and devices within the specified private cloud. – Hybrid cloud. » Combines aspects of both the public and private clouds. – Community cloud. » Cloud services used by private individuals, organizations, or groups that have a common interest. Cloud concepts.
  • 8. Page 8 Because of the nature of cloud computing, it is very configurable to the needs and desires of the purchaser. Purchasers have many options beyond the type of cloud services (e.g., public or private) that they want to provision. They must also determine what type of service they are going to require—from the most basic to the highly complex (e.g., SaaS or PaaS). Cloud concepts.
  • 9. Page 9 – Software as a service (SaaS). » The end user purchases the rights to use an application (software) without the need to configure the virtual servers that will deliver the application. • It is usually delivered as a Web application (opened and used from within a Web browser). – Platform as a service (PaaS). » The user is provided with a development platform for the creation of software packages, without the need to configure the virtual servers and infrastructure that delivers it. – Infrastructure as a service (IaaS). » The end user is provided with access to virtual servers (configurable by the customer) and other virtual network resources. • Creates a highly configurable environment in which customers can create the resources and performance that they require. • The end user supplies the software that is going to be used on the IaaS network. Cloud concepts.
  • 10. Page 10 It is not uncommon for the type of cloud computing being utilized by an organization to be a mix. Some departments may use IaaS, while a development team utilizes a PaaS only. Part of the advantage of cloud computing is only initializing resources as they are needed. In a private cloud situation, it is possible for the organization that is using it to actually own the cloud resources. If they do own the cloud resources, they may have it on site, or they may pay to have the resources hosted off site. Cloud concepts.
  • 11. Page 11 Cloud computing can be a great method of conserving company resources, but it also has several security considerations. When using hosting services, there is always the need to consider confidentiality. When the resources are out of the physical control of the company, it may be difficult control access to those resources. In some situations—such as when a law requires a company to maintain physical control of the resources—cloud computing may be unacceptable. In addition to the physical control, there is also the problem of reliability and availability. The purchaser is having to rely upon the hosting service’s ability to maintain system uptime and availability. Cloud concepts. Always perform due diligence research to ensure that the cloud provider is both reputable and reliable. As part of the research, it is also important to evaluate whether or not the resource is appropriate to be hosted (e.g., the owner is not required to maintain physical control of it).
  • 12. Page 12 Cloud concepts. The use of cloud computing means that network resources are provided virtually instead of physically. This can lead to a very dynamic and fluid computing environment. The type of cloud deployed can be classified in one of four ways: public, private, hybrid, or community. Topic Cloud classifications. Summary The highly configurable nature of cloud computing has led to several different types of cloud computing. In SaaS, only a software package is provided (usually run from within a Web browser). PaaS provides a development platform that is usually used in the creation of software packages. With IaaS, the user configures the virtual network resources that will be used—from virtual servers to the software packages. Cloud computing does raise some issues with security, mainly concerning controlling who has access to the resources, reliability, and availability. Always research the options for the appropriateness of the solution. Types of cloud computing.
  • 14. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.