Assignment - Digital Tools and Technologies
Assignment - Digital Tools and Technologies
Assignment - Digital Tools and Technologies
By Pallavy Dananjoy
MSC Digital Marketing Year 1
Student ID: 1920953
Number of words: 5307
Pallavy Dananjoy
[email protected]
Section A;
Question 1 (i)
Introduction
Nowadays, with the advancement of information technology and the expansion of the
broadband Internet infrastructure, the way that companies generate businesses has been
revolutionized, that is from digitization to digitalization. Digitization is referred to the process
of transforming information from a physical format into a digital one whereas digitalization is
the use of digital technologies as well as digitized data in order to enhance business
processes.
An important component of those digital technologies is the cloud technology which is bring
undeniable changes and benefits in the way organizations use technology. Cloud computing
remains an integral part of the IT industry, primarily due to its proven ability to improve
existing IT infrastructure, rendering any company future-proof of any scale. Moreover, this
technology is open to any company, big or small, irrespective of sector or venue, by
providing a seamless experience for the operation of the company. According to several
studies, technology has been proven to underpin the rapid growth of the business industry by
providing access to multiple resources via the Internet. Likewise, various companies are
basing on cloud technologies for the effective implementation of a versatile technology
strategy in their business activities with maximal usage of resources.
According to the National Institute of Standards and Technology (NIST), cloud computing is
defined as, “A model for enabling ubiquitous, convenient, on-demand network access to a
shared pool of configurable computing resources that can be rapidly provisioned and released
with minimal management effort or service provider interaction.” (Special Publication 800 –
145, 2011)
In other words, cloud computing is a platform that allows any user upon request to computing
resources anywhere and are stored in ‘the cloud’ instead on personal computers or server.
These computing resources includes data, applications, databases, emails and file services.
Currently cloud computing is becoming a compulsory technology for every firm as it has
significant potential and offers effective business opportunities for those firms that has
adopted this approach.
Thus in order to meet CABS short and long term objectives, adopting this new business
model can bring various benefit to business and also provide a seamless experience in the
daily activities of CABS.
By the considering all the short term and long term objective of CABS, the adoption of
cloud computing can be beneficial as it shall impact on the production, collaboration,
data security and revenue for the continuity and growth of the business.
Question 1 a) ii)
In the modern business world, communication and accessibility are crucial, and cloud
computing provides many companies facilities to operate and improve their business
growth in various ways.
However, upon implementation of the cloud technology, many companies have to tackle
with a choice between three prevailing cloud service models that are Infrastructure-as-a-
Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-service (SaaS), based on
their needs and cloud service model capabilities. Similarly CABS will also have to opt
for a model among the models by analyzing and comparing the features and benefit of
each model that could be adopted as well as the services or activities that could be
hosted onto the cloud delivery model chosen.
1. Infrastructure-as-a-Service
As being the most dynamic model of the cloud technology, IaaS enables the
company to have scalable control over the resources and customization of the
business infrastructure according to the requirements of your company. In the IaaS
model, the cloud provider will hosts resources which is available in a data center on-
site, such as servers, storage, networking hardware along with maintenance and
support
2. Platform-as –a-Service
PaaS is the preferred choice for developers as it allows them to write their
applications and upload their coding into the cloud where the application shall be
available and can be run in a web based manner. Being a different model, PaaS
simplifies the process of developing apps which minimizes your organizational
costs. In addition, it is scalable and provides the requisite speed in the process which
will increase your development times rapidly.
3. Software-as-a-service
Software as a Service can be described as a model that offers Web applications built
on the cloud where the client manages the whole stack of computing which can be
accessed through a web browser. These programs are running on the cloud and it is
available over a paid approved subscription, or with restricted access for free. SaaS
does not need to do any modifications or upgrades in the current computing
infrastructure. This eliminates the need to install software on each of your machines,
whereby the provider takes over the maintenance and support
In the light of the above, among the three models, IaaS is much costlier to invest as
it shall provide access to a broad amount of computing resources without the need to
invest in them separately. Since CABS has just invested in acquiring his second
office in Kenya, it would be very difficult to invest in buying, upgrades of software
and maintaining IT infrastructures. Hence, CABS will not have to invest in buying
new IT infrastructures and systems to cater for the needs of both offices, therefore
decreasing the capital expenditure for the company. Likewise, the office in Kenya
can virtually connect and work in collaboration with the primary office at the same
time, thus CABS will not require to set up another server in Kenya to connect to the
primary office and also since they will be using only one platform to work, data
shall be consolidated from both office towards a central location.
Moreover, an important advantage for choosing IaaS cloud computing is that it
involves advanced security measures for data, such as data encryption. This means
that CABS would get a higher level of security and data protection in order to avoid
risks of being out of business. Additionally, the Iaas cloud service model minimizes
downtime that is if any disaster hits and knocks the office out, workers can continue
working from home and get access to all information stored in the cloud without
being disrupted, thus ensuring business continuity.
Question 1 b)
The Cloud technology is revolutionizing the IT industry, from small companies to
large enterprises, cloud computing is being adopted in business infrastructures.
However, according to some studies, a number of challenges are rising in the
adoption and implementation of cloud computing by businesses. Hence, it very
important to review and consider the challenges before CABS migrate to cloud
technology.
What are the major challenges that should be considered before migrating
cloud technology in CABS?
1. Transfer Process
One of the main challenges in the adoption and implantation of the cloud
technology in the business industry is the migration. This method describes
where a system for example, Finance System, Consulting System, Taxation
system and Auditing System is transferred to a cloud. The migration process of
moving these existing system in the cloud environment successfully will take
time and it will also involves software problems. Thus, in order for CABS to
ensure proper adoption and implementation of the cloud technology, it is
important to set up a clear migration protocol that it is:
The systems that needs to be uploaded
The datasets
The non-complex systems
The Sequence and Timing of the migration
Responsibility of the employees during the migration process
Training of staffs
3. Legislation
Legislation is one of the challenges cloud computing faces today. That is a
problem for anyone who uses backup or cloud storage services. Any time CABS
will transfer data from its internal storage to a cloud, it will be faced with the
country’s compliance regulations and laws, thus is it the responsibility for CABS
to ensure that the data to be stored and manipulated are regulated are per the
laws.
Therefore, it is important for CABS to choose a cloud provider that can provide
certified legislation abiding to the law of the country.
Question 1 c)
The Cloud technology is being the latest craze for businesses today because of all the
benefits, scalability options and affordability, it is a convenient option most companies.
These benefits are demonstrated via the cloud hosting services that provides users the ability
to share resources, customize features and pay only for what they use. Cloud hosting can
meet client needs with diverse demands because of its flexibility which is resulting in a
number of cloud hosting services subtypes. However, in order to ensure a proper continuity
of the business, certain ground rules must be set first which are defined in the form of Service
Level Agreements (SLA).
A service-level agreement (SLA) is a deal which consist a set of terms and conditions that is
negotiated between the cloud provider and the client such that all agreements of services are
contractual and validated by both parties. The importance of the SLA is to establish and
define the services that the customer will receive in a contractual basis. Therefore, SLA sets
the guidelines for the quality and performance of service providers and can impose penalties
in the event that if those expectations are not properly fulfilled according to the contract.
These agreements can be subjected to change over period of time, regardless of their type, as
web hosts supplement or update the set of services they provide.
However, before signing a service level agreement, CABS should be verify if the following
points mentioned below are highlighted in the SLA to ensure that expectations are well met.
Section B; Question 2;
a) i)
Data Science
Data Science can be described as a combination of different methods,
algorithms, and concepts of machine learning with the goal of finding hidden
patterns from the raw data.
In fact, data science is a way for tackling Big Data and thus précising the exact
information. Initially, data scientists collect data sets from different
disciplines, and then compile them. After the compilation process, data
scientist applies predictive analysis, machine learning, and sentiment analysis
in order to derive something.
Data scientist perceives data from a business point of view and provide precise
prediction and charges for the same, thereby preventing business losses.
Areas of application: Internet Research, Recommendation Systems, Image
Speech Recognition, Digital Adverts
Data Analytics
In general, people assume that data science and data analytics are identical,
and which is not true. In fact, there is a big difference in those two where data
analytics is considered to be the basic form of the data science.
Data Analytics is defined as the science of looking at raw data in order to draw
conclusions and shows the metrics and trends to avoid significant loss of data.
Data analytics are often used to validate current hypotheses and to enable
better decision-making by organizations in many industries.
Areas of application: Travels, Gaming, Healthcare, Management of Energy
Big Data Analytics
Big Data refers to the large amounts of data that come from different sources
of data and have different formats. It can be used to evaluate the perspectives
that can contribute to informed decisions and strategic business movements.
Areas of application: Communication, Retailing, Financial Services and
Education
Question 2 b)
A block chain can be defined as a distributed ledger that is entirely available to everyone.
They consist of useful security features that is once data is recorded within a block inside
a block chain, it is very hard to alter the block because each block consists of some data,
the hash of the block and the hash of the previous block.
2. Speed Inefficiency
Bitcoin is a particularly good example for possible block chain inadequacies in the
adoption of block chain for businesses. Bitcoin's "proof of work" system takes 10
minutes to add a new block to the block chain. At that rate the block chain
network is expected to be able to handle only seven transactions per second (TPS).
With this issue, the performance rate of block chains shall decrease the speed of
the processes where it can take several hours for one bitcoin exchange.
3. Privacy
Integrity of data has always been one of block chain’s major advantages since
multiple systems benefit from it. Nevertheless, considering the networking
structure, immutability can only be present if the network nodes are fairly
distributed which means that if an entity controls a block chain by owing 50 % or
more of the nodes, it makes it vulnerable for the system where there is a
possibility that somebody could track a person's identity in the network via
transactional data, just as businesses normally use web trackers and cookies.
Another issue to consider is that data cannot be removed once it’s written, which
means that if data has already been run on the block chain technology, one cannot
remove or alter the trace of the data which is against privacy rights of the
business.
Question 3 a)
HTTP
The hypertext transfer protocol (HTTP) which is text-based, is a system
through which computers all over the World Wide Web communicate to each
other, these includes computers and smart phones that request the web server
to send the content pages of the website which is retrieved and display on
browsers.
The role of the hypertext transfer protocol is to transmit the website data
across the internet and give web browsers and servers a standard way to
communicate to each other. Additionally, HTTP allows multiple connections
to simultaneously download separated elements where each element is
assigned a particular file type and therefore it speeds up transmission so that
the receiving computer can handle it faster and more efficiently.
Moreover, HTTP also enables the receiving computer to download the
extensions or plugins if additional capabilities are required to view the data
transferred. For example, these extensions includes Adobe Flash Player and
PDF document readers.
HTTPS
Hyper Text Transfer Protocol Safe (HTTPS) is the secured HTTP version
which is nowadays used in most of the e-commerce websites.
HTTPS is frequently used to protect highly confidential online transactions,
such as e-commerce platforms and online banking since the internet is an open
free platform and sharing confidential data such as passwords and credit cards
is a risk. This is why it is very important to protect data against hackers,
attacks or frauds. This protocol acts same like HTTP but with 'S' which stands
for 'Secure' means that all data transferred between your browser and the
website are encrypted using Secure Sockets Layer (SSL). Implementing SSL
on websites will secure any data transmitted between server and browser
during a session, thus ensuring data protection.
Moreover, HTTPS includes a green padlock that appears on secured website in
order to make customers feel secure for sharing their data, hence builds trust
and confidence of the customer.
b) Digital Signature is used to ensure that files that are being sent digitally
over the Internet belongs to a specified source and reaches the intended
recipient in the original format without any distortion.
How Digital Signature works?
Digital Signature introduces a widely recognized technology which is known
as the Public Key Infrastructure (PKI). The latter allows people in creating a
set of two keys for every digital transaction which are:
Public Key: The public key, which is a standardized key for encrypting
messages, is available for anyone to authenticate with the signer’s electronic
signature. It enables a sender to send a secure message to the recipient.
Private Key: The Private Key acts like a closely guarded secret key for
decrypting message which is not available to anyone. However, it ensure that
the signer’s signature is not replicated by another person other than the signer
itself.
If both keys match, then it’s a secure transaction that guarantees document and
signature authentication. However, if they don't match then it's a warning
signal that the signer’s identity was being forged.
In the digital signature process, the three below algorithms are being involved:
1. Key generation
This algorithm produces a private key from a random set of private keys
along with its corresponding public key which are linked to one another.
2. Signing
This algorithm generates a signature when a private key is received, and
the message is signed.
3. Verification
This algorithm verifies the integrity and authenticity of a message together
with the signature and the public key. However, if they are not being
matched, the message is being denied.
1. Agarwal, R. and Dhar, V., 2014. Big data, data science, and analytics: The
opportunity and challenge for IS research.
2. Akin, O.C., Matthew, F. and Comfort, D., 2014. The impact and challenges of cloud
computing adoption on public universities in Southwestern Nigeria. International
Journal of Advanced Computer Science and Applications, 5(8), pp.13-19.
3. Almorsy, M., Grundy, J. and Müller, I., 2016. An analysis of the cloud computing
security problem. arXiv preprint arXiv:1609.01107.
4. Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G.,
Patterson, D., Rabkin, A., Stoica, I. and Zaharia, M., 2010. A view of cloud
computing. Communications of the ACM, 53(4), pp.50-58.
5. Bouayad, A., Blilat, A., Mejhed, N.E.H. and El Ghazi, M., 2012, October. Cloud
computing: security challenges. In 2012 Colloquium in Information Science and
Technology (pp. 26-31). IEEE.
6. Durumeric, Z., Adrian, D., Mirian, A., Bailey, M. and Halderman, J.A., 2015,
October. A search engine backed by Internet-wide scanning. In Proceedings of the
22nd ACM SIGSAC Conference on Computer and Communications Security (pp. 542-
553).
7. Enterprise Times. 2020. Blockchain Disadvantages: 10 Possible Reasons Not To
Enthuse -. [online] Available at:
https://www.enterprisetimes.co.uk/2018/10/15/blockchain-disadvantages-10-possible-
reasons-not-to-enthuse/.
8. Garrison, G., Wakefield, R.L. and Kim, S., 2015. The effects of IT capabilities and
delivery model on cloud computing success and firm performance for cloud supported
processes and operations. International Journal of Information Management, 35(4),
pp.377-393.
9. Gorelik, E., 2013. Cloud computing models (Doctoral dissertation, Massachusetts
Institute of Technology).
10. Hayes, B., 2008. Cloud computing.
11. Intellipaat Blog. 2020. Data Science Vs Data Analytics Vs Big Data - Detailed
Comparison. [online] Available at: <https://intellipaat.com/blog/data-science-vs-data-
analytics-vs-big-data/>
12. Khajeh‐Hosseini, A., Greenwood, D., Smith, J.W. and Sommerville, I., 2012. The
cloud adoption toolkit: supporting cloud adoption decisions in the
enterprise. Software: Practice and Experience, 42(4), pp.447-465.
13. Knorr, E. and Gruman, G., 2008. What cloud computing really means. InfoWorld, 7,
pp.20-20.
14. Kocarev, L., Tasev, Z., Amato, P. and Rizzotto, G., STMicroelectronics Srl,
2005. Encryption process employing chaotic maps and digital signature process. U.S.
Patent 6,892,940.
15. Leymann, F., 2011. Cloud computing. it-Information Technology Methoden und
innovative Anwendungen der Informatik und Informationstechnik, 53(4), pp.163-164
16. Li, X., Jiang, P., Chen, T., Luo, X. and Wen, Q., 2017. A survey on the security of
blockchain systems. Future Generation Computer Systems.
17. Lin, I.C. and Liao, T.C., 2017. A survey of blockchain security issues and
challenges. IJ Network Security, 19(5), pp.653-659.
18. Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J. and Ghalsasi, A., 2011. Cloud
computing—The business perspective. Decision support systems, 51(1), pp.176-189.
19. Medium. 2020. Blockchain Advantage And Disadvantages. [online] Available at:
<https://medium.com/nudjed/blockchain-advantage-and-disadvantages-
e76dfde3bbc0>
20. Patel, P., Ranabahu, A.H. and Sheth, A.P., 2009. Service level agreement in cloud
computing.
21. Provost, F. and Fawcett, T., 2013. Data science and its relationship to big data and
data-driven decision making. Big data, 1(1), pp.51-59.
22. Rescorla, E., 2000. Http over tls.
23. Savu, L., 2011, May. Cloud computing: Deployment models, delivery models, risks
and research challenges. In 2011 International Conference on Computer and
Management (CAMAN) (pp. 1-4). IEEE.
24. Subashini, S. and Kavitha, V., 2011. A survey on security issues in service delivery
models of cloud computing. Journal of network and computer applications, 34(1),
pp.1-11.
25. Takabi, H., Joshi, J.B. and Ahn, G.J., 2010. Security and privacy challenges in cloud
computing environments. IEEE Security & Privacy, 8(6), pp.24-31.
26. VAR Sales Management Blog: News, Tips & Many More By VARStreet. 2020. What Is Digital
Signature And How It Works? | Varstreet Inc. [online] Available at:
<https://blog.varstreetinc.com/what-is-digital-signature-and-how-it-works/> [Accessed 24 May
2020].