StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Database Dangers in the Cloud - Research Paper Example

Cite this document
Summary
The paper "Database Dangers in the Cloud" aims to answer the question "How does a company apply their security to the data they store in the Cloud or what is the standard to protect your data?" The author states that One of the recommended ways to secure data stored in the Cloud is through encrypting…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.7% of users find it useful
Database Dangers in the Cloud
Read Text Preview

Extract of sample "Database Dangers in the Cloud"

Database Dangers in the Cloud How does a company apply their security to the data they store in the Cloud or what is the standard to protect your data? One of the recommended ways to secure data stored in the Cloud is through encrypting [Lem12]. However, there are other related issues reported with encrypting as a security application. One of the prevalent concerns is the usability and fitting encrypted data in a predefined block size. As such, other standard protection protocols include: selecting good and unique passwords; as well as practicing backing up the data [Bosnd].

Also, it was appropriately advised “to select a (security) provider who ensures that each client has a separate, private environment and maintains the most up-to-date server security” [Mor11].What are some examples of Co-Mingling Data: and what are the dangers? An example of co-mingling of data is “data (which) could become unavailable to you just because it was being stored on the same server as data belonging to someone else” (Trappler, 2012, par. 2). The danger of co-mingling of data, as noted, include inability to access the data; information being disclosed to other parties and thus, compromising the privacy and confidentiality nature of the information; being exposed to legal sanctions; among others.

As emphasized, “with cloud computing, data from multiple customers is typically commingled on the same servers. That means that legal action taken against another customer that is completely unrelated to your business could have a ripple effect… a search warrant issued for the data of another customer could result in your data being seized as well” (Trappler, 2012, par. 2).How hard is it to migrate data that is stored in the Cloud? Data migration was reported to be a major concern in cloud computing especially in cases when cloud providers encounter significant and unforeseen problems.

Traditionally, data migration to be stored in the cloud was revealed to supposedly pose no evident dilemmas. According to Goodenough (2013), migrating the data to the cloud should consider factors like the size of the data to be migrated, as well as the time or schedule for migration. As emphasized, “once you decide to migrate to cloud storage, be sure to create a strategy to direct the migration process” [Goo134]. Therefore, the ability to manage data migration depends on the organization’s strategy and consideration of relevant factors identified in storing, migrating, and accessing.

What are the dangers in making changes to hardware or configurations in the company or in the Cloud? Making unscheduled or unplanned changes to hardware or configurations in the company or in the Cloud could pose some dangers in terms of usability, access to information, and apparent dangers in security. It was revealed that:“Companies should have a policy that states that only tested product configurations… can be deployed within the data center. Only specific versions of firewall hardware can be deployed in the various data centers.

Another danger is to have a lack of options, such as single-sourced software or hardware, for various infrastructure components. If there is a common flaw in hardware or bug in software it could lead to a dramatic failure in multiple data centers” [Mac121]. Thus, the overall danger that these changes could inflict to the organization is disruption of the regular course of operations which could mean financial losses and damage in the company’s reputation and image.ReferencesLem12: , (Lemos, 2012), Bosnd: , (Boston University, n.d.), Mor11: , (Morgan, 2011, p. 1), Goo134: , (Goodenough, 2013, p. 1), Mac121: , (Machler, 2012, p. 1),

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Database Dangers in the Cloud Research Paper Example | Topics and Well Written Essays - 500 words”, n.d.)
Database Dangers in the Cloud Research Paper Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1626288-database-dangers-in-the-cloud
(Database Dangers in the Cloud Research Paper Example | Topics and Well Written Essays - 500 Words)
Database Dangers in the Cloud Research Paper Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1626288-database-dangers-in-the-cloud.
“Database Dangers in the Cloud Research Paper Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1626288-database-dangers-in-the-cloud.
  • Cited: 0 times

CHECK THESE SAMPLES OF Database Dangers in the Cloud

Hijacking, Cloud Security and Data Loss

People using internet –capable cell phones, tablets, and computers can save their files in the cloud computing sites.... This review ''Hijacking, Cloud Security and Data Loss'' discusses that cloud computing entails saving and retrieving files from the cloud computing server sites.... The computer hijacking may cause security threats on the cloud computing clients' confidential data.... The persons using the cloud service do know the hardware or software used by the cloud service providers....
10 Pages (2500 words) Literature review

Design Methods and Technology

he robots can improve security significantly and can deal with dangers perpetrated by various people by putting in place strategic measures.... This essay "Design Methods and Technology" is about the use of robots in security.... nbsp;Many lives have been lost in the maintenance of security, and the use of technology can reduce the toll to a significant minimum....
6 Pages (1500 words) Essay

Experiences of Participants in the Three Extreme Sports

The paper "Experiences of Participants in the Three Extreme Sports" highlights that extreme sports teach humanity to respect fear.... Most athletes indulge in it for the pleasure that they derive from it.... Extreme sports have become so popular that there are several TV channels dedicated to this sport....
5 Pages (1250 words) Coursework

Economical Set of Recommendations to LDA for Implementing Suitable Logical Topology

hellip; Generally speaking, as bandwidth in CSL shall be mostly used for accessing cloud-based services, including updating of online database.... The change that cloud computing offers compared to conventional models of autonomic computing, utility computing, or distributed computing is to expand possibilities beyond the boundaries of an organization.... lthough many cloud computing infrastructures and its deployments are working on conventional models like a grid, support autonomic features and used on the basis of billing utilities, the idea of a cloud is comparatively different and opposite to the features of the grid, for example, SaaS, Utility Computing, etc....
12 Pages (3000 words) Coursework

Web Technologies & Management Systems

ence credit card is a blessing yet can be a curse too if they land up in the wrong hands or are used without consideration of security check because in that case, it will not only lead to financial dangers but also other potential threats to life property etc.... This paper stresses that the widespread use of database management systems coupled with web technologies allows organizations to collect maintain and sell vast amounts of private personal data fast and cheaply....
5 Pages (1250 words) Assignment

Key Aspects of Data Storage Management

Thereafter, it will become easier to decide about the type of required data storage device or cloud service that will fit the bill.... This coursework "Key Aspects of Data Storage Management" describes the important data and software in available USB devices.... Thi paper outlines the security threat posed by USB drives, implementing USB security, strategy for data storage management, information lifecycle management....
6 Pages (1500 words) Coursework

Cloud Storage and Bad Model in Terms of Security and Privacy

The apache server which the cloud is connected to is the point of connection for access and retrieval of stored data.... This coursework "cloud Storage and Bad Model in Terms of Security and Privacy" describes cloud storage is the way forward for many organizations, but many offer a bad model in terms of security and privacy.... This paper outlines the key features of the right cloud storage.... nbsp;… cloud storage is a component of cloud computing without which cloud computing cannot be of any importance (Coyne, Gopalakrishnan, and Sing 2014)....
10 Pages (2500 words) Coursework

Opportunities and Pitfalls of Cloud Computing

These are; the shifting of the control from the technology users to the 3rd parties servicing the cloud due to the outsourcing and the offshoring of the ICT functionality to the cloud.... Thirdly, the interconnections of the multiple servers across the cloud (Nelson, 2009).... The paper "Opportunities and Pitfalls of cloud Computing" presents that although the concept of cloud computing can be traced back to the 1950s, its vitality in providing the access to digital content has over the recent past become evident over the last ten years....
10 Pages (2500 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us