Ethical Dilemma

Interpretation or execution of proper APA format. Word count of over 500 words for the initial thread. Minimum of 2 unique and relevant scholarly peer reviewed

Part 1.  Answer the 4 questions below about your project

1. What is an ethical dilemma that your systems analysis and design project in this course can solve using your phase 1 “HYBRID MULTI-CLOUD “project?

2. Using thorough Biblical support, write a detailed purpose statement that clearly articulates how your system problem solves an ethical dilemma.

3. Consider how Biblical principles can be applied to an efficient, optimized, secure, and healthy information system.  What elements in the new class diagram apply to the ethical dilemma outlined in the part 1?

4. Why is this important to consider within your project’s system solution?









PHASE 1 Project Plan

Hybrid Multi-Cloud

Jxxxx Qxxxx

Liberty University

BMIS 530 Systems Analysis, Modeling, and Design

Dr. Michael Hart

June 29, 2021














Introduction. 3

Problem Statement 4

Feasibility Study. 4

Project Plan. 12

Conclusion. 14



















With today’s rapidly evolving business climate, enterprises are constantly looking for new ways to modernize their business while leveraging their existing infrastructure (Gurgaon 2020). The cloud offers to save local storage and management costs and provides great convenience. But at the same time, it is difficult for data owners to manage their own data in cloud, which leads to many security risks. Therefore, security has become an imperative issue in cloud computing (Xie 2021). In order to deal with the malicious attacks in public cloud environment, researchers attempted to achieve data security by using a hybrid cloud environment. The hybrid cloud environment combines the advantages of public clouds and private clouds, users save encrypted data in public clouds while using private clouds to compute resources. There are numerous cloud architecture paradigms, ranging from hyperscale’s to micro data centers close to the edge, satisfying diverse user requirements, with each one holding its unique characteristics (Trakadas 2019). However, in spite of hybrid cloud being an extremely important enterprise paradigm, there are still important open issues to be addressed, related to intermittent connectivity, transparent support, policy enforcement management, management of resources under strict service level agreement (SLA) conditions, as well as privacy and anonymization issues related to data and workload portability across the hybrid cloud.

Customers need Cloud and Enterprise Solutions with the ability to accelerate encryption and compression workloads for widely deployed servers with a broad range of applications from the core of the data center to the edge of the network and keep their network secure.  Every cloud platform is built different and each vendors platform has different capabilities to offer. The right fit for each company would depend on their network infrastructure for their individual applications, and their business needs.

The emergence of cloud brokerage and cloud management platforms is boosting the trend of hybrid and multi-cloud, making managed cloud services providers key in supporting enterprises. Managed service providers (MSPs) will support companies with workload assessment and placement, workload migration, and hybrid cloud integration (Gale 2021). Due to an increase in encrypted HTTPS traffic, inspecting data and preventing attacks poses a significant challenge for today’s security professionals. A new SSL intercept capability solves this challenge by decrypting HTTPS traffic on a high-performance scalable platform, making clear text traffic available to third-party security services and devices, and re-encrypting traffic in a manner that is transparent to clients and servers (Gale 2021).

Global Server Load Balancing With the emergence of data center architectures that span private data centers and public and private clouds, multi-site redundancy is quickly becoming a networking essential. Building on existing GSLB functionality integrated with APV Series ADCs, this APV version adds new enhancements designed to better facilitate hybrid cloud deployments. New features include DNS NAT, GeoIP database, multi-alive datacenter, DNSSEC and SDNS HTTPS health checks. Network Functions Platform & Service Chaining The new and enhanced capabilities in this latest OS version are ideal candidates for service chaining on Network Functions Platform.







Problem Statement

This Hybrid And Multi-Cloud management Platform will allow different clouds to blend together allowing different cloud applications to be packaged into containers and moved between various public cloud environments without having to rewrite the application for the underlying cloud infrastructure allowing enterprises to run on their existing on-prem physical servers, deployed on an operating system without a hypervisor layer. The server-based data center reference architecture features Intel Xeon Gold 6240Y processors, Intel Optane persistent memory, Intel Solid State Drive DC S4500 Series and 10/25 GbE Intel Ethernet Adapters. The edge reference architecture targets the Intel NUC 10 performance kit featuring the 10th Gen Intel Core i7-10710U processor, Intel SSD Pro 7600p and Intel Ethernet Connection I219-V.

While Cloud computing offers a paradigm shifting technological solution for computational resources and software, the concerns about privacy and confidentiality of data  still  are  a  major  concern for adoption (Ferrer 2016). Public and hybrid Cloud scenarios are characterized by a constant flow of data which cannot be allocated to a place. This brings uncertainty regarding the various data protection legislations, which transcend national borders and therefore complicate the compliance with the Data Protection legislations worldwide. Enterprises or individuals using the PaaS to develop applications that handle confidential and private data need to safeguard its privacy. Therefore, from a legal point of view, providing mechanisms to enable data protection and privacy in Cloud environments should be a basic functionality.



ensures that customers can quickly deploy their enterprise applications on existing hardware, simplifying their path to hybrid- and multi-cloud approaches. Many (multi-)cloud management platforms (CMPs) are designed to cover the functional requirements. Along with growing adoption and industrial impact of such solutions, there is a need for a comparison and test environment which automatically assesses and compares existing platforms and helps in choosing the optimal one (Serhiienko 2018).

This project will show an enhanced hybrid cloud multi-authority ciphertext-policy attribute-based encryption (HCMACP-ABE) scheme that strengthens controlling of requesting users and ensures the security of data access control in hybrid clouds. The variations of cloud deployment models have important security implication on system categorization as well. One way to look at the security implications from the deployment model perspective is the differing level of exclusivity of tenants in a deployment model. A private cloud is dedicated to one consumer organization, whereas a public cloud could have unpredictable tenants co-existing with each other, therefore, workload isolation is less of a security concern in a private cloud than in a public cloud.

Another way to analyze the security impact of cloud deployment models is to use the concept of access boundaries. For example, an on-site private cloud may or may not need additional boundary controllers at the cloud boundary when the private cloud is hosted on-site within the Cloud Consumer organization’s network boundary, whereas an out-sourced private cloud tends to require the establishment of such perimeter protection at the boundary of the cloud. While private Cloud is now in the path to become mainstream, market is now evolving to shift its focus on the next step – hybrid multi-cloud computing models searching  for  the  right  balance  among  functionality,  flexibility  and  investment  protection.  A Multi hybrid cloud model allows organizations to provide, use, and manage IT resources across their private cloud set-ups and any compatible public cloud (Ferrer 2016).

Feasibility Study

In the feasibility study section, the project will focus on updating the old information system to the new private on-premises cloud-based information system, and will also cover the planning, analysis, design, implementation, and maintenance aspects of the SDLC. There are different kinds of cloud solutions that can make up a multicloud environment. Public cloud services include AWS, Microsoft Azure, Google Cloud Platform and other cloud computing services offered by third-party providers. Private clouds, on the other hand, limit access to specific organizations. The services and infrastructure are maintained on a private network, providing increased security and control compared to public clouds.

In a Multicloud Environment Workloads can be delegated to cloud platforms without interoperability between providers, Example: two public clouds, AWS+Azure.  In a Hybrid cloud Environment Workloads distributed across multiple cloud and on-premises environments highly portable and interchangeable environment  Example: a public cloud AND an on-prem customer-maintained datacenter infrastructure, so you then have a different stacks for different tasks which means an organization uses a mix of on-premises.

Recent attacks point to the importance of seeing all data across clouds and on-premises infrastructure, as well as the spaces between these environments, as data flows from one service to another. Median global dwell time for security threats is 56 days, which is more than enough time for hackers to do significant damage. The MITRE Cloud ATT&CK Matrix documents a growing number of tactics and techniques that cyber criminals use against enterprise cloud-based services. Many organizations that developed private clouds in the past decade are busy building hybrid clouds that combine both private and public cloud technologies.

how to use a hybrid cloud to store secure data in your own data center and then apply computational resources from the public cloud to run applications with that data. Hybrid clouds also enable you provide efficient backup, warm recoveries, and an easier way to manage regulatory compliance. Learn the advantages and challenges of using a hybrid cloud in your organization Create a hybrid cloud architecture by managing private and public clouds as one unified resource pool Seamlessly manage and move workloads between clouds by working with migration and service movement paths Choose a hybrid cloud solution that provides the support and advanced capabilities your organization requires









In the cloud deployment models, hybrid cloud is a cloud computing environment which uses a mix of private cloud and public cloud services with orchestration between the two platforms. By letting workloads to shift between public and private clouds as computing costs and needs change, hybrid cloud gives greater flexibility and more data deployment options (Helmi 2018). There is no single security control authorization boundary to place servers added to Cloud (AWS) environment, Nethub a new startup vendor was added in Phase 1 and is used in supporting servers in the Nethub boundary. Each project’s servers reside within their own project VPC. Nethub will be used to facilitate the controlled, secure network routing and connectivity to and from trusted cloud workloads in the AWS cloud environment and will provide the core services to support those workloads.



All the cloud users should be aware of the vulnerabilities, threats and attacks existing in the cloud. The awareness of security threats and attacks will help the organizations to carry out fast rate adoption of the cloud (Singh 2017). Cloud AWS is a control inheritance boundary for servers (and DBMS) used by the individual projects that are maintained by X Company.  Nethub Security Control boundary is specific to common security services inherited from AWS Nethub. The cloud AWS authorization boundary excludes SaaS, Nethub is not currently providing cloud-based monitoring for workloads. Cloud tools often come with their own monitoring and troubleshooting tools and services. But transforming enterprises require a solution that works across multiple clouds and services in real time to provide one comprehensive view and platform from which to act. This is where the AI modern application management platform for infrastructure monitoring and troubleshooting comes in, which will be deployed in Phase 3.


Companies wanting to enjoy the benefits of cloud computing are having the option to use the services of a public cloud (i.e. Google cloud, Amazon EC2, Microsoft Azure) or to make their own private cloud infrastructure. There are many elements that cloud affect the cloud integrity and because the security is maintained by a third party, misconfiguration could arise (Gordin 2018). Recent attacks point to the importance of seeing all data across clouds and on-premises infrastructure, as well as the spaces between these environments, as data flows from one service to another. Taking in all data eliminates blind spots in distributed systems and the AI modern application management platform in cloud gives the capability to maintain server security configuration compliance within micro-segmented environment. Azure Cloud a control inheritance boundary for servers (and DBMS) used by the individual projects that are maintained by X Company.


The multicloud and hybrid cloud stack makes it difficult to see across the entire

IT landscape. Data trapped in silos means that it takes longer to detect and resolve

issues The AI MAM Platform has 3 virtual machines with different operating systems and checks the hypervisor-based virtual machines isolation. This new software takes on the security threats found on multi-tenant environment on and provides concrete solutions for each situation and how to address them using patches or appropriate alternative solutions. The AI MAM provides the hybrid cloud with Access Control (User), Audit / Logging, Authentication, Configuration Mgt, Continuous Monitoring, Data Loss Prevention, Encryption Key Mgt, Vulnerability Mgt. AI MAM is an accelerating cloud-driven platform to enhance IT, DevOps and security teams, so they can secure, operate and innovate faster across multicloud and hybrid cloud environments.


Project Plan

The project schedule has 14 tasks and is estimated to take 12months in 3 phases.


Project Project Manager Date
AI Modern Application Management Platform in cloud       Jerry Quarles June 29, 2021


Confronted by the challenges and opportunities of a multicloud and hybrid cloud environment, organizations need a single, unified solution to centralize all their data, provide real-time insights and promote action based on analytics. AI MAM will provide a solution so business enterprises can secure, operate and innovate faster across multicloud and hybrid cloud environments.


Goals & Objectives
                                      WORK BREAKDOWN STRUCTURE


Task Name Duration Start Finish
INITIATION 7 days 6/29/2021  7/07/2021
Install Software 3 days 6/29/2021 7/03/2021
Format Software 3 days 7/03/2021 7/06/2021
Test Software 1 days 7/06/2021 7/07/2021
PLANNING 32 days 7/07/2021 8/09/2021
Create Project Plan               9 days 7/07/2021 7/16/2021
Create Resource Plan               5 days 7/16/2021 7/21/2021
Create Financial Plan                 5 days 7/21/2021 7/26/2021
Create Risk Plan               6 days 7/26/2021 8/02/2021
Contact Suppliers               6 days 8/02/2021 8/08/2021
Perform Stage-Gate                1 days 8/08/2021 8/09/2021
EXECUTION 18 wks 8/09/2021 12/23/2021
           Build Deliverables   8 wks 8/09/2021 10/09/2021
  Phase 1   2 wks 10/09/2021 10/23/2021
  Phase 2   3 wks 10/23/2021 11/14/2021
  Phase 3   3 wks 11/14/2021 12/06/2021
          Monitoring and Controls   2 wks 12/06/2021 12/23/2021
          Perform Stage-Gate
Perform Project Closure  7 days 12/23/2021 01/02/2022
Review Project Completion  6 days 01/02/2022 01/08/2022
Collect Reports  5 days 01/08/2022 01/13/2022
Summarize Results/Present  5 days 01/13/2022 01/19/2022





The Start date and the end date for the final deliverable

Project                 Start                  Finish

Initiation               6/29/2021         7/07/2021

Project Closure    12/23/2021        1/02/2022


The estimated time and total costs for the project


Project Team Role      Quantity Estimated Time
Customer Project Lead 1 1312 hours x $40/Hour
Project Manager 1 1272 hours x $40/Hour
Project Communication Lead 3 1272 hours x $20/Hour
IT Support 5 1049 hours x $30/Hour
Accounting Lead 1 1049 hours x $30/Hour
IT Director 1 1049 hours x $40/Hour
Contract Developers 12 200 hours x $10/Hour
Software Architect 1 500 hours x $60/Hour
Software Developer 5 500 hours x $50/Hour


List the people, materials, equipment, etc., which you’ll need to execute the project.

Project Team Role
Customer Project Lead
Project Manager
Project Communication Lead
IT Support
Accounting Lead
IT Director
Contract Developers
Software Architect
Software Developer









Team Responsibilities
Each team member and their role and responsibility in the project.


Task No. Task                                                     Description Task                         Owner
1 Initiation Phase  
1.1 Set up hardware Victor C.
1.1.1 Install software Erin N.
1.1.2 Format software Pete C.
1.1.3 Tests software Peggy C.
2 Planning Phase  
2.1 Create Project Plan Sam B.
2.1.1 Create Resource Plan Nick S.
2.1.2 Create Financial Plan Larry K.
2.1.3 Create Risk Plan Jacob S.
2.2 Contact Suppliers Henry W.
2.2.1 Perform Stage-Gate Ron B.
3 Execution Phase  
3.1 Phase 1 Victor C.
3.1.1 Phase 2 Erin N.
3.1.2 Phase 3 Larry K.
3.1.3 Monitoring and Controls Pete C.
3.1.4 Perform Stage-Gate Peggy C.
4 Close Phase  
5.1 Perform Project Closure Larry K.
5.1.1 Review Project Completion Sam B.
5.1.2 Collect Reports Jacob S.
5.1.3 Summarize Results/Present Peter C







In order for these hybrid multi-cloud approaches to develop further and cope with expectations, the cloud has to become an element of a multi-faced approach to service delivery   within an enterprise’s broader digital infrastructure, heading towards a truly hybrid strategy and  tackling  all  Cloud  layers. The digital infrastructure of  the future has to provide with a variety of service delivery venues where users will be able to schedule and automate the delivery of   application to the most suitable clouds (private/public) depending on application specific   characteristics, SLAs and policies.

This paper presented different counter measures to address the security issues at different area in the cloud. helps organizations overcome complexity and realize the power of cloud transformation: becoming more agile, optimizing costs, securing what matters and reducing downtime. Many kinds of distributed Cloud environments are to relate to one another to achieve bigger and better things for the IT, which is invariably mandated to do more with less.

The hybrid cloud is the connection between internally managed resources within an organization’s own datacenter or datacenters and externally managed resources purchased from cloud providers such as Amazon, Google, and Microsoft. Managing these resources efficiently is the key challenge for many organizations. Currently, the private and public clouds are frequently managed as separate entities. This leads to inefficiencies in resource utilization and leads to higher costs overall when the least expensive service is not chosen for a given workload. There are several challenges for an organization that wants to use the hybrid cloud efficiently. Moving workloads between the private and public clouds is frequently a manual task. As such, migrations are error-prone and can lead to downtime. Migrations are not usually seamless to end users and therefore are not performed as often as they could be. This solution provides efficient backup and warm recovery can mean significant cost savings for organizations that use both private and public clouds.




Intel and Google Cloud Simplify Hybrid and Multi-Clouds Deployment, Anthos. (2020, Dec 01).

PCQuest, Gurgaon



Global IaaS Market Rises as Enterprises Opt for Hybrid and Multi-Cloud Deployment

Models. (2019, June 1). Investment Weekly News, 135. Retrieved from https://bi-gale-

New Array Networks Software Guards Against Distributed Denial of Service, Provides

Visibility into Encrypted Traffic and Enables Multi-Site Redundancy for Hybrid Cloud Deployments. (2017, April 5). Computer Weekly News, 325. Retrieved from

Mande Xie, Yingying Ruan, Haibo Hong, Jun Shao,

A CP-ABE scheme based on multi-authority in hybrid clouds for mobile devices,

Future Generation Computer Systems, Volume 121, 2021, Pages 114-122,

ISSN 0167-739X,


Trakadas, P., Nomikos, N., Michailidis, E. T., Zahariadis, T., Facca, F. M., Breitgand, D., Rizou,

S., Masip, X., & Gkonis, P. (2019). Hybrid Clouds for Data-Intensive, 5G-Enabled IoT Applications: An Overview, Key Issues and Relevant Architecture. Sensors, 19(16)

Ana Juan Ferrer, David García Pérez, Román Sosa González,

Multi-cloud Platform-as-a-service Model, Functionalities and Approaches,

Procedia Computer Science, Volume 97, 2016, Pages 63-72, ISSN 1877-0509,


  1. Serhiienko and J. Spillner, “Systematic and Recomputable Comparison of Multi-cloud

Management Platforms,” 2018 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2018, pp. 107-114, doi: 10.1109/CloudCom2018.2018.00032.

Suehring, Steve. Hybrid and Multicloud Solutions. 1st edition. Sebastopol, CA: O’Reilly Media,

  1. Print.,language%3DEN&svc_dat=CTO&u.ignore_date_coverage=true&vid=01LIBU_INST:Services

Abdelrahman M. Helmi, Marwa S. Farhan, Mona M. Nasr,

A framework for integrating geospatial information systems and hybrid cloud computing,

Computers & Electrical Engineering, Volume 67, 2018, Pages 145-158, ISSN 0045-7906,


Ashish Singh, Kakali Chatterjee,

Cloud security issues and challenges: A survey, Journal of Network and Computer Applications, Volume 79, 2017, Pages 88-115, ISSN 1084-8045,


  1. Gordin, A. Graur, A. Potorac and D. Balan, “Security assessment of OpenStack cloud using

outside and inside software tools,” 2018 International Conference on Development and Application Systems (DAS), 2018, pp. 170-174, doi: 10.1109/DAAS.2018.8396091.




Interpretation or execution of proper APA format. Word count of over 500 words for the initial thread. Minimum of 2 unique and relevant scholarly peer reviewed


Part 1.  Answer the 4 questions below about your project

  1. What is an ethical dilemma that your systems analysis and design project in this course can solve using your phase 1 “HYBRID MULTI-CLOUD “project?
  2. Using thorough Biblical support, write a detailed purpose statement that clearly articulates how your system problem solves an ethical dilemma.
  3. Consider how Biblical principles can be applied to an efficient, optimized, secure, and healthy information system.  What elements in the new class diagram apply to the ethical dilemma outlined in the part 1?
  4. Why is this important to consider within your project’s system solution?



I will do Part 2

Part 2.  Embed at least two unique class diagrams as a video from your systems analysis and design project in this course.  One class diagram should be of the old system and one class diagram should be of the new system.



Complete Answer:

Get Instant Help in Homework Asap
Get Instant Help in Homework Asap
Calculate your paper price
Pages (550 words)
Approximate price: -
Open chat
Hello 👋
Thank you for choosing our assignment help service!
How can I help you?