refer what are the requirements section
- Drawn from chapter 2 of the CompTIA Cloud+ Study Guide (Montgomery, 2016).Cloud Delivery ModelsIn this section we will take a look at the various models used to deliver cloud services. As you’ll see, the cloud computing market is rapidly evolving, and undoubtedly new models will develop over time. Also, as you’ve seen with service models earlier, it can be common to find combinations of various models offered to the market.PrivateThe private cloud model is for the use by a single organization, but may be used by many units of a company. It can be wholly owned by the organization, a third-party provider, or a combination. It can also be hosted either on-site or off-premise at a hosting facility and is usually identified as using dedicated hardware rather than a shared hardware design.PublicA public delivery model is infrastructure designed for use by the public consumers. Public clouds can be offered by private corporations, government organizations, and academia. A public delivery model hosts the service on the premise of the organization providing the service and uses shared hardware.HybridThe hybrid delivery model is a combination of two or more delivery models such as private, community, or private. Examples of a hybrid model include cloud bursting to handle peak processing loads or balancing the load between delivery models.CommunityCommunity clouds are designed for a specific community of interest and shared by companies with similar requirements for regulatory compliance, security, or policy. Community clouds can be owned and operated by a group of companies, a specialized cloud provider, or other interested parties. They can exist on or off a company’s datacenter or hosting facility.On-Premise vs. Off-Premise HostingOn-premise hosting describes creating and managing your own cloud service in-house in a private enterprise datacenter. This type of approach can be found in large enterprise environments where control of the operations and data is required to remain in corporate datacenters.Off-premise is a hosting service that is located remotely from a company’s datacenter and is usually in a cloud service company’s datacenter.Security Differences between ModelsIt is very important to take security into consideration when selecting a service model. Issues such as data confidentiality, integrity, regulatory issues, and availability must be understood and implemented.The cloud providers offer many different levels of security and services to protect information. Cloud providers can protect against security breaches, but many factors must be taken into consideration. These factors include revision level, patching of operating systems and applications, intrusion detection and prevention systems, firewall rules, and policies. Ultimately it is the owner of the data who is responsible for security.Functionality and Performance Validation Based on Chosen Delivery ModelValidation is the process of testing and verifying that your cloud deployment is operating and performing as expected. The validation and testing required will follow how your cloud is architected, with close attention paid to who is responsible for what aspects of the service and if the service level agreements are being met. We will explore this topic in later chapters.Software as a service provider may offer a single application that is shared by many customers. For example, many customers may access a single database application hosted in the cloud but only have access to their own area of the shared database application. With this multi-tenancy approach, application testing must validate that each individual customer does not have the ability to change or configure the application in any way that would affect the other customers sharing the application. Further validation should determine the maximum number of concurrent users based on hosts resources, licensing, and performance criteria.Since cloud computing is a shared resource, the cloud provider must test and validate that each cloud consumer has data segregation from other cloud consumers and the data is protected from unauthorized access. In later sections, you will learn how to segment and protect data in the SAN network fabric, the storage controllers, and using various access security mechanisms. Each cloud consumer should be provided exclusive access to their data stored in the cloud and the data should be segmented and separated between customers.Cloud service providers may offer many types of service variations with each of their offerings. IaaS, PaaS, and SaaS offerings as well as the many other types of services may be offered in a shared network or in a private and network isolation for your own exclusive.ReferencesMontgomery, T. (2016). CompTIA cloud study guide: Exam CV0-001. Indianapolis, IN: John Wiley & Sons. ISBN 978-1119243229
Prompt
For this assignment, use an online library such as EBSCOhost, ProQuest, or Google Scholar to research public, private and hybrid cloud service models, as well as cloud virtualization services used in business today. In a 3 page APA-formatted paper, address the following three components from a business perspective: What are some of the benefits to using cloud services? What are some of the drawbacks or challenges a business might face in using a cloud service? How can a company leverage virtualization services in the cloud?
- By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.

