Page 263 - Using MIS
P. 263

Q6  How Can Organizations Use Cloud Services Securely?   231
                                       IaaS Services at AllRoad

                                       As stated, IaaS provides basic hardware in the cloud. Some companies acquire servers this way
                                       and then load operating systems onto them. Doing so requires considerable technical expertise
                                       and management, and hence a small company like AllRoad is unlikely to do so.
                                           AllRoad might, however, obtain data storage services in the cloud. Amazon.com, for exam-
                                       ple, offers data storage with its S3 product. Using it, organizations can place data in the cloud
                                       and even have that data be made elastically available. Again, however, a small organization like
                                       AllRoad would more likely use SaaS and PaaS because of the added value they provide.



                            Q6         How Can Organizations Use Cloud Services

                                       Securely?


                                       The Internet and cloud services based on Internet infrastructure provide  powerful  pro-
                                       cessing and storage services at a fraction of the cost of private data centers. However, the
                                       Internet is a jungle of threats to data and computing infrastructure, as discussed in Chapter
                                       10. How can organizations realize the benefits of cloud technology without succumbing to
                                       those threats?
                                           The answer involves a combination of technologies that we will address, at a very high
                                       level, in this question. As you read, realize that no security story is ever over; attackers con-
                                       stantly strive to find ways around security safeguards, and occasionally they succeed. Thus,
                                       you can expect that cloud security will evolve beyond that described here throughout your
                                       career. We begin with a discussion of VPNs, a technology used to provide secure communica-
                                       tion over the Internet.

                                       Virtual Private Networks (VPNs)

                                       A virtual private network (VPN) uses the Internet to create the appearance of private, secure
                                       connections. In the IT world, the term virtual means something that appears to exist but in fact
                                       does not. Here, a VPN uses the public Internet to create the appearance of a private connection
                                       on a secure network.

                                       A Typical VPN
                                       Figure 6-20 shows one way to create a VPN to connect a remote computer, perhaps an employee
                                       working at a hotel in Miami, to a LAN at a Chicago site. The remote user is the VPN client. That
                                       client first establishes a public connection to the Internet. The connection can be obtained by
                                       accessing a local ISP, as shown in Figure 6-20, or, in some cases, the hotel itself provides a direct
                                       Internet connection.


                                                                                           Used during
                                            Chicago Site                                   tunnel setup

                                          Local Area
                                          Network 1
                                                                                              ISP

                                                             VPN
                                                            Server             Tunnel                      VPN Client
            Figure 6-20                                                      Internet
            Remote Access Using
            VPN; Actual Connections
   258   259   260   261   262   263   264   265   266   267   268