Cloud Uses and Implementation

Video Activity

The Cloud Uses and Implementation lesson discusses the following Cloud Service models: 1. Infrastructure as a Service (IaaS) 2. Platforms as a Service (PaaS) 3. Software as a Service (SaaS) 4. Database as a Service (DBaaS) 5. Communications as a Service (CaaS) 6. Business Process as a Service (BPaaS) 7. Anything as a Service (XaaS) 8. Accountabilit...

Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

2 hours 28 minutes
Video Description

The Cloud Uses and Implementation lesson discusses the following Cloud Service models: 1. Infrastructure as a Service (IaaS) 2. Platforms as a Service (PaaS) 3. Software as a Service (SaaS) 4. Database as a Service (DBaaS) 5. Communications as a Service (CaaS) 6. Business Process as a Service (BPaaS) 7. Anything as a Service (XaaS) 8. Accountability and Responsibility by Service Model we also explore the following cloud delivery models and services: 1. Private cloud 2. Public Cloud 3. Hybrid cloud 4. Community cloud 5. On Premise 6. Off premise hosting 7. Orchestration platforms Cloud characteristics and terms: 1. Elasticity 2. Pay as you grow 3. Demand driven service 4. Charge back 5. Ubiquitous service 6. Metering 7. Multi tenancy 8. Cloud bursting The module ends with object storage concepts: 1. Object ID 2. Metadata 3. Data BLOB 4. Policies 5. Replicas

Video Transcription
Welcome back to Cyberia IittIe my name's wrestling and today in module for will be covering clouds uses an implementation We're going to cover child service model the delivery model and service's characteristics in terms and objective storage concepts
The cloud service model there This is primarily what cloud is you have I s p a s s a s d b a s c a s b p a s e x a s. Also, we're also going to talk a little bit about accountability and responsibility, whether it's the customer's responsibility,
where the cloud providers responsibility,
I s is the infrastructure as a service,
infrastructure of service is outsourcing the infrastructure of a network. A good example of that is, instead of having
the domain hosted on the bill in the building, you're hosting the domain in the cloud companies that allow you to do this by IBM and Amazon. They give you servers and they give you domain Resource is so that way. All you have to do is log onto your computer and your rabble you're able to access the domain from any place.
Next time we won't talk about is platform as a service
or p. A s. The purpose behind platform and service allows programmers to be able to access the tools and be able to do what they need to do,
usually in platform message service. They have applications and programs that are hosted out to them so that away they're able to access those application programs from any machine.
All they have to do is walk into a Web and then go to the server and then able to do what they need to do to do their job. The next thing. Get software as a service and software as a service are like
Howlett 3 65 Gmail. YouTube is also a software as a service in the sense that you're able to see these sources, you're able to do what you need to do and take care of these functions from anywhere station. You don't have to be logged into the same computer that you can log in at work, log in at home or even access them on your phone.
The next thing is database as a service or D. B. A s.
What this allows you to do is to access your database over the clouds, things like SharePoint, our Web browsing function. But it's a database, so this allows you to access SharePoint or access that webpage via anywhere. So that way you don't have to be at the same place, or it doesn't have to be at your house that you can host this
in the cloud
and B you and other users are able to access what they need. Access, communication as a service or C A s allows users to be able to lease out information
in the forums of VPN, boy or PBX. The purpose behind this is that the way you can communicate as a service, Skype is a communication as a service. Google Chat is a communication as a service. Back in the old days and never people used to go on forums and talk on things like Yahoo, they were able to do that
communication. As a service, they're able to communicate and talk with their peers
and not have to pay for it. They're able to do it on a global scale. The next thing is business process as a service or B p. A s.
The purpose behind B. P. A s s that way. They're able to give out their business plans as a service to other companies if needed. Some B p. A s is whenever they offer more than one. Service is so that way you're able to access will better the communication, but still able to access the infrastructure if if needed. The last thing is
anything As a service representative,
X a s x a s utilizes everything uses utilizes a little bit of each so that away, you're able to do what you need to do when you need to do it.
The best thing about this is you can access the domain and then offer access the software so you're accessing the I s in the S A s.
But then at the same time, maybe you have a few databases and you're hosting SharePoint. Therefore, you access the P. A s last name we'll talk about is the accountability responsibility of service models. With each model, they have a particular person that they apply to the S. A s the end user. That's most of the time. The many customers that they have,
you're able to browse the web and you're able to access your
email so that applies directly to you. However, P A s is for developers, so therefore they use that to develop, so it might be a group of people access and get
I asked for administrators,
the administrators are the people that are actually acid accessing that and they're able to perform their functions and to keep their servers online based off that.
But who's responsible, for instance, with S A s if you're accessing your Gmail, But then emails start disappearing or something starts happening inside of your email.
Well, it is ultimately the providers responsibility
with P. A s.
The person responsible for that is the consumer. So therefore, it would be the database people that are responsible for that Same thing goes for I Yes, it's the administrator's responsibility to make sure that their information is held and that their information is available.
Next, we're gonna talk about a few cloud delivery models, and service is
first. We have the private cloud Public cloud hybrid, which is a combination of the two community cloud on premise off premise and also the orchestra teacher platform.
The product called is similar to the Internet,
is basically the internal network, and it allows them to be able to do what they need. For instance, Google, Google's all around the world, but they still have a product cloud that you're able to. People from the Middle East are able to access information that they have hosted here in Washington state,
and they're gonna do what they need to do inside of the whole cloud.
But yet even though it's inside the cloud as a user, you're still not able to access that information. If you're not part of the Googles Cloud, Public House is leased from a cloud provider to the customer. Most common ways of getting the public cloud is the pay as you go that you're leasing information and as you download information
you're paying for as you download it.
If you use 100 gigs one month where you're gonna pay for Ah 100 gigs, however, the next month use 10 gigs, you're gonna pay for it. Tim gigs with the data that you use. Hybrid cloud is the combination of the public in the private cloud, as mentioned earlier. You have some stuff that you offer locally,
however, you're giving those that information out to the people of the public's that were, they're able to see it, and they're able to access
what they need to access inside of your network community cloud community clouds and infrastructure shared with several organizations,
for instance, say Google, Microsoft and YouTube. They all come together and they create a cloud. So that way you're able to access information inside of each other that a person could be logged into YouTube
and be able to access what they need to access from Microsoft or Google. Some companies offer their resource is out to Microsoft Health Vault. Myself Helped Vault is a collaboration of many other companies, like Fitbit or maybe my Fitness Pal. The next time you're on premise
and on premises, where you host virtualization and information on side,
it's the organization has complete control over the information and the servers.
A good example of this
is with YouTube. Everything is offered on site for YouTube, however, they give it out to people, so therefore, they're ultimately controlling everything. The next thing is off premise. This is where things air hosted in the cloud. With YouTube, you're accessing off premise because
your videos are not safe on your computer. There, saved in the cloud there saved to YouTube.
So therefore, on premise is YouTube holding all the stuff. But off premise would be you hosting it to them and now
offer Mrs where you're giving it to YouTube, and now they're hosting it out to everybody else. One big thing to remember about off premises that the cloud provider does have control over some of the information,
and if they wanted to remove things because it breaks the terms of service,
then they can remove it if needed.
Organ structure platform is a day to day task. It allows you to perform actions at specific times if needed, that if you work from 9 to 5, well, then with or construction platforms, then you're going to be able to access your information from 9 to 5 and be able to do what you need. But then, whenever you don't need that information anymore,
you'll be able to not pay for that.
Those service is,
and it stinks business requests with infrastructure, so therefore, you're able to make sure that your business has merged with your infrastructure and you're actually paying for what you actually need, and you're not having to buy extra things Here's some common characteristics in terms that are associated with the clout. You know the elasticity, demand driven service pay as you go change back,
be Quintus. Access meriting multi tendency and cloudburst e electricity is enabling. Computing resource is to be moved as needed. It's just real. Resource is across the infrastructure, and this allows you to be able to move. Maybe maybe one of'em needs an extra court.
Well, electricity will
allow you to move one core over *** away. You can get the full functionality of their network in your infrastructure as needed. Electricity also allows you to increase were close when needed. That many large amounts of service's are needed for the
the data basis
at a particular time. Well, electricity will allow you to move. Those service is over, so that a way you can provide the databases. The proper resource is that they need.
The demand driven service allows users to be able to access with any via portal. Example is that of this
is whenever you're accessing your email from your phone,
well, then you get home. Now you're accessing the email from your laptop computer as an on demand service allows you to be able to access that whenever you need it. Whenever you want it that you go to work, you can access it there. You're driving down the road. You can access it in those locations if needed. The next service is pay as you go.
This allows you to pay for exactly what you need.
You're paying for the service is either by time hours or by data being sent instead of always paying. The same amount for service is you're paying for what you use. For example, at Christmas time, you're not really using the Internet as much. So therefore, during that time, you won't be
charge for all that excess data. Whenever you're not using it, you'll be able to save a little bit of money.
The next thing is charged back
on. What charge back allows you to do is to decentralize icy cause it basically gives a little bit of money back based on what you've been using in the past.
Another thing we charge back is that
each department pays for their service. For example, instead of I t being charged for all the data are all the information that charge back it is going to be the accounting department that is going to be charged for a little bit information for the business department or possibly just the I T department for the platform that they're using or the infrastructure that they're using.
Ubiquitous access is the same level access from anywhere
again. This is an example of
you're on your phone. You have access there were at work, were able to access your information. There you're at home, you're accessing information there. You could be on vacation and still be able to get work done. Ubiquitous access is what really helped. Most companies go to the cloud that they can go on meetings and vacation too
other countries and other places, and be able to do what they need to do
when they need to. Dio meriting is a tracking of i t. Resource is the name purpose behind this so that away your over to see what you're using and how much you're using So you're able to judge this is very similar to how electric companies give you power. They track your usage data so that they're about to see you for using more data than people around you.
or if you're using less.
Also, you can compare your results with last year. So that way you can see if you're using more data than we're using the previous year. This could help you and finding out if you've got issues inside your network. Just like with the power company, it would help you find out if you're losing power somewhere. Maybe you're a C is going out,
and therefore you're using more electricity on your A C
Well, same thing for your router. Maybe your router is causing a lot of errors, so therefore you're sending more information.
It allows you to track that Multi Tennessee allows one instance. Too many users. This is very important whenever it comes to databases as a service that a user will be accessing and database. But at the same time, 100 other users will be accessing the database and be able to use and be able to do what they need to do,
but also at the same time almost a tendency.
They're looking at their own instance. They're not looking, get what their neighbor is doing. They're able to see their own instance and be able to perform their own functions without having to interfere with the people they're working with. Cloud bursting, cloud bursting is very important when it comes to the cloud,
the main reason for cloud bursting. So you have a retail company, and in this retail company, your cells were really low during the wintertime. But it during the spring and summer time yourselves go up really high
during the wintertime. Your resource is will be on your actual land. But during the spring and summer time, your resource is will be out in the Web and then the customer is able to use their services as needed. The next time we have is injected storage concepts on objects story concept we have injected by day's metadata data. Bob
policies replicas,
Objective I. D. Is ubiquitous, identified for the data and metadata used to find the data.
The objective I d. Is mainly just a header, and it might be the name of the file, for example,
that the objective I d allows you to be able to see what you're about to access without having to open up the document and be able to read it.
Metadata describes each object in the database
used like a table for a database that contains the compounds of the data. It is the actual information inside there and allows you to
get a better detail of what you're reading.
Data Blob is a binary large objective is primarily used in databases, large amounts of binary data stored in a location to help copy between locations.
When viewing a data block, it primarily looks like a bunch of garbage, but it's meant for be meant to be. With a database step forward, they're able to see and use the information as needed. You might pull up a document up in note pad, but whenever you look at the document, it just looks like a bunch of garbage, much of ones and Cyril's maybe a few names here in there.
But as soon as you pull out a document on Excel spreadsheet,
you're able to see it's organized in columns, and it looks neat. Policies are attributes associated with objects similar to metadata, but for security mechanisms,
posses allows you to see an object and explains to you what you're allowed to do with that policy or not. For example, a common policy would be with you, too, when you access YouTube. You have to agree to their policies and their policies. Strictly say not to give this information or not to provide this for copyright reasons.
Then you have to oblige. To there
A replica is primarily just a copy of large data, and the purpose behind Replica is that away. It has a ready back up. It's just the copy. For instance, whenever you have your information coffee to G. Dr Well, you're able to say that onto your computer. That would be a replica of that information,
just a copy of it
most of time, right, because they're used with virtual hard disk that allows you to have a ready backup that virtual machine if needed. Today we talked about Cloud Service models, Claude delivery models, cloud characteristics, and I'll drink storage capacity.
My name is just a lingam with library. I t know if you guys learned a lot
Up Next