StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

- Emerging Technologies - Case Study Example

Cite this document
Summary
Case Study - Emerging Technologies Name Institution Case Study - Emerging Technologies Article Review: Cloud Computing is a Contribution The article trends and issues in crime and criminal justice that addresses challenges and future directions of cloud computing is a contribution of Kim-Kwang Raymond Choo…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.8% of users find it useful
Case Study - Emerging Technologies
Read Text Preview

Extract of sample "- Emerging Technologies"

Download file to see previous pages

Traditionally, cloud computing allows applications and data that are supported and or support operating systems are usually installed and stored in a computing environment where they can be referenced with high degree of ease. Therefore, according to Choo, cloud computing allows individuals and businesses to share data and computer applications without necessarily requiring physical machines thereby increasing the efficiency and ease of accessing such data and applications (Choo, 2010). Nonetheless, the use of data and compute applications within a given cloud usually requires restrictions since if there are no such restrictions, data and applications stored in such clouds may be abused or missed used.

Hence, cloud computing can only be used effectively and efficiently in a corporate world or with the paper with same interest of data and computer applications. According to Choo and as it is a fact, the application of cloud computing has increased among private and public institutions; thus, posing great risk to the security of applications and data stored in the cloud. Some of the risks associated with the cloud computing includes attacks that usually targets shared cloud environments. It should be noted that a virtual machine that runs its own applications and has operations systems just like physical machine (Choo, 2010).

Choo notes that virtual machine may have a series of operating systems with which storing operation and or data from specific clients. Despite the requirement that each virtual machine should never know the component of the other, some computer data criminals have developed ways to determine components of virtual machines that they are never assigned to or they have never stored their information. These natures of event have put the data and operation systems within cloud computer to be vulnerable to alteration and linkage among other cyber insecurities.

Additionally, it has been noted that cloud computing id also vulnerable to installation of backdoor botnet hosting. This state of events usually allows installation of malicious codes on the virtual machine without the knowledge of the owner (Choo, 2010). Notably, such actions lead to illegal access of other persons’ information or data thereby increasing cyber crime. Therefore, according to Choo, which is a fact, the cybercriminals are usually potential abusers of cloud computing services.

Their access to the systems usually links the real owners’ private among other personal information to the public and to the wrong persons. Moreover, to some extent, the criminals’ distributed denial –of- services sometimes deny the legitimate owners from accessing their data. In terms of national security, it has been noted that virtualized infrastructures can be used as avenues of launching new attacks particularly through the use of password guess. In other words, guessing is quite dangerous for security systems at that are automated based on authentication.

It is vital to note that virtual computing is quite fatal to businesses and persons who store their data or information to could software especially in cases of natural disaster (Choo, 2010). Wiping of the entire cloud due to a natural disaster will translate to lose of data, information, or applications that were stored in such clouds, and according to Choo, such a scenario will lead to discontinuity of business that entrusted their data in such affected clouds (Choo, 2010). Despite the anticipated advantages of

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Case Study - Emerging Technologies Example | Topics and Well Written Essays - 750 words”, n.d.)
Case Study - Emerging Technologies Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/information-technology/1482294-case-study-emerging-technologies
(Case Study - Emerging Technologies Example | Topics and Well Written Essays - 750 Words)
Case Study - Emerging Technologies Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/information-technology/1482294-case-study-emerging-technologies.
“Case Study - Emerging Technologies Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1482294-case-study-emerging-technologies.
  • Cited: 0 times

CHECK THESE SAMPLES OF Case Study - Emerging Technologies

Technical Challenges in Production of $100 Laptop by Nicholas Negroponte

Emerging Technologies such as Internet-enabled cell phones were cheaper and have more consumer acceptance in poor countries.... Different designs and technologies were being tried, to make it cost effective, and to overcome the problem of lack of electricity availability among its users.... The emerging markets were likely to be wireless-centric rather than PC- centric....
10 Pages (2500 words) Case Study

Emerging Technology Case Studay

Basically, these security attacks differ from using modern and innovative ways and tools of using standard weapons to making use of extraordinary technologies such as lasers to launch attacks.... emerging TECHNOLOGY CASE STUDY emerging Technology Case Study Author Author's Affiliation Date Abstract This paper presents an analysis of risks associated with a given scenario....
3 Pages (750 words) Case Study

Business Strategy of IKEA Group

IKEA group has been founded by Ingvar Kamprad who has successfully led the company to become a profitable global venture (Nattrass and Altomare, 1999).... The company opened its first furniture showroom in 1953 and is now present in thirty one countries across five continents (Rothacher, 2004).... hellip; This home furnishings retailer owes its success to its low priced and wide product range, smart purchasing and distribution activities and retail function (Nattrass and Altomare, 1999). Based on the history of IKEA given in the Appendices section, this report aims to evaluate the business strategies of IKEA....
7 Pages (1750 words) Case Study

Nursing and Healthcare

The paper "Nursing and Healthcare" presents that trends in UK general healthcare and nursing reveal a shift towards 'whole systems' thinking.... This development is driven by an explicit focus on improving both service efficiencies and how the needs of service users are met using effective nursing....
6 Pages (1500 words) Case Study

A Case Study as a Research Method

The practical speed of change is limited by the ever increasing and changing knowledge and assimilation regarding technologies vi.... The change in the approach towards IT has brought out a revolution in the users, organization's and designers approach in networking technologies 3.... The confrontation with emerging technology has provided the network planners with an opportunity to bring innovation in the design and building of newer markets and industries....
1 Pages (250 words) Case Study

Why Did UPS Decide That It Was Time to Develop the Next Generation DIAD

Therefore, UPS in designing the new generation DIAD V was as a result of Emerging Technologies that previous DIAD IV did not possess.... The new DIAD V has the following features: designed using state-of-the-art mobile technologies that will be virtually indestructible-both shockproof and waterproof ()....
3 Pages (750 words) Case Study

Robin Hood's Methods for Strategic Development

The high rate of change in the industry with new technologies, however, made it a prime environment for growth.... The emerging internal conflict in his organization and changes outside of his organization provide a platform to understand the dynamic nature of strategic leadership....
3 Pages (750 words) Case Study

The Use of Livestream Technology into K-12 Class Sessions

Teachers in every department such as mathematics and social sciences will establish elaborate explanations as well as justifications for use of Emerging Technologies in their disciplines.... cholars define Emerging Technologies as concepts, tools, advancements, and innovations applied in different educational setups and serving diverse functions related to education.... Transformations in information and communication technology provide a range of Emerging Technologies that stakeholders in the learning of K-12 students can apply today to make learning effective....
10 Pages (2500 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us