scholarly journals Challenges and Security Issues in Future IT Infrastructure Components

2013 ◽  
Vol 8 (2) ◽  
pp. 845-847 ◽  
Author(s):  
Syed Mubashir Ali

Over the past 2 decades, the information technology infrastructure has gone through an exponential change with the introduction and evolution of new technologies and trends. Organizations previously having their data on-premise and their infrastructure comprising of multiple server machines on multiple server racks and dedicated client personal computers (PCs) are moving towards cloud computing & virtualization to Smartphone and tablets. This rapid advancement and constant change, although increasing productivity for the organizations is resulting in a rising number of challenges and security issues for the organizations, their managers, IT administrators and technology architects. This paper discusses the future IT infrastructure components and the challenges & security issues that arise after their implementation that needs to be taken care of in order to get the full advantage of IT.

2011 ◽  
Vol 1 (3) ◽  
pp. 1-11 ◽  
Author(s):  
Kamal Dahbur ◽  
Bassil Mohammad ◽  
Ahmad Bisher Tarakji

Cloud Computing (CC) is revolutionizing the methodology by which IT services are being utilized. It is being introduced and marketed with many attractive promises that are enticing to many companies and managers, such as reduced capital costs and relief from managing complex information technology infrastructure. However, along with desirable benefits come risks and security concerns that must be considered and addressed correctly. Thus, security issues must be considered as a major issue when considering Cloud Computing. This paper discusses Cloud Computing and its related concepts; highlights and categorizes many of the security issues introduced by the “cloud”; surveys the risks, threats, and vulnerabilities; and makes the necessary recommendations that can help promote the benefits and mitigate the risks associated with Cloud Computing.


Author(s):  
Kamal Dahbur ◽  
Bassil Mohammad ◽  
Ahmad Bisher Tarakji

Cloud Computing (CC) is revolutionizing the methodology by which IT services are being utilized. It is being introduced and marketed with many attractive promises that are enticing to many companies and managers, such as reduced capital costs and relief from managing complex information technology infrastructure. However, along with desirable benefits come risks and security concerns that must be considered and addressed correctly. Thus, security issues must be considered as a major issue when considering Cloud Computing. This paper discusses Cloud Computing and its related concepts; highlights and categorizes many of the security issues introduced by the “cloud”; surveys the risks, threats, and vulnerabilities; and makes the necessary recommendations that can help promote the benefits and mitigate the risks associated with Cloud Computing.


2012 ◽  
pp. 1644-1655
Author(s):  
Kamal Dahbur ◽  
Bassil Mohammad ◽  
Ahmad Bisher Tarakji

Cloud Computing (CC) is revolutionizing the methodology by which IT services are being utilized. It is being introduced and marketed with many attractive promises that are enticing to many companies and managers, such as reduced capital costs and relief from managing complex information technology infrastructure. However, along with desirable benefits come risks and security concerns that must be considered and addressed correctly. Thus, security issues must be considered as a major issue when considering Cloud Computing. This paper discusses Cloud Computing and its related concepts; highlights and categorizes many of the security issues introduced by the “cloud”; surveys the risks, threats, and vulnerabilities; and makes the necessary recommendations that can help promote the benefits and mitigate the risks associated with Cloud Computing.


Author(s):  
Sulistyo Heripracoyo

Cloud computing is a phenomenon that is currently a lot of attention from practitioners of information technology. Cloud computing can be composed of several types of services that are known to Saas, PaaS and IaaS, public and private cloud computing. Companies that do not invest themselves in the information technology infrastructure to use cloud computing services as a solution. By adopting and implementing a cloud computing services company can shift the cost of information technology infrastructure investments become operational costs by purchasing cloud computing services. Nevertheless, cloud computing, especially for the type of private cloud is still a bit of adopting it, whether it is caused by the absence of reference to the implementation or caused by something else. The purpose of this study was to analyze the adoption of cloud computing that suitable and beneficial for the company in its operational activities. The study was conducted by analysis of some of the literature related to cloud computing, benefits and barriers. According to the analysis of the literature can be explained some of the benefits associated with the adoption of cloud computing. Based on several studies that have been done, the benefits of implementing cloud computing is primarily financial savings and benefits of resource management that is the flexibility and scalability of the company's operations. However, some considerations still need to be done for a company that will implement cloud computing and those things are data security issues,  legal issues and the implications for the company.


Author(s):  
Mark Jeffery ◽  
Cassidy Shield ◽  
H. Nevin Ekici ◽  
Mike Conley

The case centers on Shilling & Smith's acquisition of Xteria Inc. and the resulting need to quickly scale the company's IT infrastructure to accommodate the acquisition. The case is based on a real leasing problem faced by a major retail firm in the Chicago area when it purchased a small credit card processing firm and scaled the operations to handle the retail firm's credit card transactions. The CIO of Shilling & Smith needs to determine which lease option is the best means of providing the technical infrastructure needed to support the firm after the acquisition of Xteria. Several issues will drive this decision, including the value and useful life of the equipment, as well as the strategic context of the firm. This case examines how to evaluate different lease options when acquiring data center information technology infrastructure. Specifically, the case addresses software vs. hardware leasing, different lease terms, and choosing between different lease structures depending on the strategy and needs of a company. This case enables students to understand the different types of technology leases and in which situations these leases would be employed.The Shilling & Smith case examines how to evaluate different lease options when acquiring data center information technology infrastructure. Specifically, students learn software vs. hardware leasing, different lease terms, and how to choose between different lease structures depending on the strategy and needs of the company. A secondary objective of the case is to teach students the important components and relative costs of information technology infrastructure.


Author(s):  
Abílio Cardoso ◽  
Fernando Moreira ◽  
Paulo Simões

Public and federal agencies from countries around the world are increasingly providing information technology based services via the Internet - known as e-government. Several of the general requirements of e-government services are satisfactorily met by the emerging Cloud Computing paradigm that promises a number of benefits such as service elasticity (the ability to handle peaks and troughs of demands); optimization of costs; capacity to handle large volumes of data; and a generalized model of Internet-based access for end-users. For this reason, it is no surprise that Cloud related technologies are gradually leveraging e-government platforms. In this chapter, a support framework is outlined that complies with and extends the well-known ITIL (Information Technology Infrastructure Library) set of best practices for IT (Information Technology) service management. It is suggested that the proposed framework can be usefully deployed to assist in the process of migrating e-government services provision to the Cloud Computing environment.


Author(s):  
Anggi Sukamto

Dukungan teknologi informasi yang diterapkan oleh organisasi membutuhkan suatu manajemen agar penggunaannya dapat memenuhi tujuan penerapan teknologi tersebut. Salah satu kerangka kerja manajemen layanan teknologi informasi yang dapat diadopsi oleh organisasi adalah Information Technology Infrastructure Library (ITIL). Dukungan layanan (service support) merupakan bagian dari proses ITIL. Pada umumnya, aktivitas dukungan layanan dilaksanakan dengan penggunaan teknologi yang dapat diakses melalui internet. Kondisi tersebut mengarah pada suatu konsep cloud computing. Cloud computing memungkinkan suatu instansi atau perusahaan untuk bisa mengatur sumber daya melalui jaringan internet. Fokus penelitian ini adalah menganalisis proses dan pelaku yang terlibat dalam dukungan layanan khususnya pada proses manajemen insiden, serta mengidentifikasi potensi penyerahan pelaku ke bentuk layanan cloud computing. Berdasarkan analisis yang dilakukan maka usulan model manajemen insiden berbasis cloud ini dapat diterapkan dalam suatu organisasi yang telah menggunakan teknologi komputer untuk mendukung kegiatan operasional. Kata Kunci—Cloud computing, ITIL, Manajemen Insiden, Service Support, Service Desk.


Author(s):  
Sean B. Eom

One of the important roles of information technology is to permit firms to manage organizational interdependence. Over the past two decades, the concept of inter-organizational information systems (IOISs) has emerged as a strategic tool for achieving competitive advantages and IOISs have been a major research theme. Many well-known examples of information systems that provide competitive advantages discussed in the literature are those of IOISs. This chapter provides the readers with a brief overview of foundational concepts, definitions, and the information technology infrastructure of IOIS. Finally, the chapter systematically classifies the IOIS literature of 192 bibliographic items into 10 subspecialties. Therefore, along with this survey of 192 bibliographic items, readers are referred to Ngai and Wat’s recent survey (Ngai & Wat, 2002) to comprehend the big picture of IOISs.


Author(s):  
Kornelius Irfandhi ◽  
Ariani Indrawati ◽  
Dwykie Alexandra ◽  
Krisantus Wanandi ◽  
Yanuari Harisky ◽  
...  

Information Technology (IT) is increasingly progressing. Nowadays, the success of a business of the organization/company is highly dependent on the IT infrastructure used. Therefore, organizations/companies have to manage their IT service to be optimal to their customers. Looking at this matter and the increasing dynamics of XYZ University, then Data and Information System Center (Pusdatin) - an IT provider of XYZ University began implementing IT Service Management (ITSM) from 2013 using the latest version of Information Technology Infrastructure Library (ITIL), namely ITIL v3 as a framework for implementing ITSM in its business processes. However, along the way, there are still some problems happen in Pusdatin in order that ITSM can actually support and align with the objectives of XYZ University. Through this paper, the authors want to explain how the implementation of ITSM at Pusdatin, identify the problems related to the implementation of ITSM, and provide the solutions for each problem. The methods used are direct observation to Pusdatin, conductan interview with the Head of Pusdatin and Staff of Pusdatin, and also perform a literature review of books and papers that discuss about ITIL. The result of this research is that ITSM process of Pusdatin generally works quite well but there are still some shortcomings because ITSM is not 100% implemented in all areas.


Author(s):  
Mohammad Dadashzadeh Dadashzadeh ◽  
T.J. Wharton

In this paper, we consider the application of Green Value Stream Mapping for greening the information technology functional area of organizations. We advocate the use of Information Technology Infrastructure Library (ITIL) processes to consider value stream maps for both the manufacturing side of the IT department as well as its service delivery arm. In addition, we present steps to be taken by the IT department to eliminate waste in each of seven green waste areas and consider the impact of new technologies for greening the IT department.


Sign in / Sign up

Export Citation Format

Share Document