18.12.2012 Views

Proceedings

Proceedings

Proceedings

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

The security requirements for cloud computing providers begins with the same<br />

techniques and tools as for traditional data centers, which includes the application of a<br />

strong network security perimeter. However, physical segmentation and hardware<br />

based security cannot protect against attacks between virtual machines on the same<br />

server. Cloud computing servers use the same operating systems, enterprise and Web<br />

applications as localized virtual machines and physical servers. Therefore, an attacker<br />

can remotely exploit vulnerabilities in these systems and applications.<br />

Virtualization increase the number of machines to manage, service provision becomes<br />

crucial since it directly affects service management and maintenance and operation<br />

efficiency. Automation, the next core technology, can make resources available for<br />

users through self-service without getting the service providers involved. A stable and<br />

powerful automation management program can reduce the marginal cost to zero,<br />

which in turn can promote the scale effect of cloud computing. (B Furht, A Escalante,<br />

2010)<br />

Cloud computing is a solution in today's principles competitive world when business<br />

strategies should be made quickly. Comparing with conventional IT outsourcing, an<br />

approach of cloud computing allows customers:<br />

• to reduce expense for building infrastructure, security in information<br />

strategy and business responsiveness with faster time to market coverage;<br />

• to acquire online business strategies, using online process and reducing<br />

capital investments;<br />

• staying flexible to the market by growing business efficiency without<br />

losing business control (more efficiency for business). (D Kharchenko,<br />

2010)<br />

4. GENERAL FRAMEWORK FOR INFORMATION STRATEGIES<br />

Improving productivity performance is essential to companies and not only if they are<br />

competitive at the global level and have a strong economic growth. Adoption in the<br />

business of all new technologies will lead to ensure the realization of the proposed<br />

performance and getting revenue for development.<br />

4.1. Building a complex strategy<br />

According to the terms of the business, but also financial, IT & C advanced<br />

technologies combined with innovation in the business will lead to economic<br />

transformation and the new media business in the coming years. Factors acting on<br />

entities in relation to ICT are: business environment, culture, business structure,<br />

standard procedures, business processes, policies and security management, decision<br />

management, etc.<br />

In this way, an information strategy at the entity level to obtain business directs<br />

performance. The model of information society strategies is shown in Figure 4. Based<br />

on the system of Knowledge, Understanding and Exploiting the Information<br />

Resources (KUEIR) we build information society strategies.<br />

~ 669 ~

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!