StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Securing the Cloud - Essay Example

Cite this document
Summary
Further, the advantage of cloud computing are also referred to along with brief references given to other forms of computing as well. The privacy challenges that are…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.2% of users find it useful
Securing the Cloud
Read Text Preview

Extract of sample "Securing the Cloud"

Download file to see previous pages

Cloud computing provides for dynamically scalable and virtualized sources on the internet for online business applications which utilize software and data resources which are stored in the servers. Cloud Computing has also been defined as a revolutionary development of certain existing computing technologies and approaches into a form that is capable of separating the application and database from the infrastructure and mechanisms that are employed to deliver them. Cloud computing augments the cooperation, suppleness, size, accessibility and also offers significant cost reduction with the use of optimized and competent computing techniques, (Armbrust, and Griffith, et al., 2009). Cloud computing is basically the use of group of services, data sources and technical applications, all of which can be swiftly rearranged, reconditioned, implemented and also decommissioned with the help of an allocation model.

In order to increase the scope of the services offered, the resources are set away from the infrastructure that is employed to deliver the results. For example, for a particular service to be based upon cloud computing technology, the internet can be utilized for transport and the browser as an accessibility tool – which states that the sources are at all the times shared in a multi-tenant surroundings exterior to the “boundary.” The users, who are serviced through cloud computing services, do not possess any kind of infrastructure, the user only pays for the resources they utilize and therefore avoid the capital costs by renting the infrastructure from a third part owner.

The infrastructure behind the cloud computing is composed of efficient services through the use of virtual data centers that are based upon virtualization technologies, (Armbrust, and Griffith, et al., 2009). The cloud computing services can be

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Securing the Cloud Essay Example | Topics and Well Written Essays - 4000 words”, n.d.)
Securing the Cloud Essay Example | Topics and Well Written Essays - 4000 words. Retrieved from https://studentshare.org/miscellaneous/1559246-securing-the-cloud
(Securing the Cloud Essay Example | Topics and Well Written Essays - 4000 Words)
Securing the Cloud Essay Example | Topics and Well Written Essays - 4000 Words. https://studentshare.org/miscellaneous/1559246-securing-the-cloud.
“Securing the Cloud Essay Example | Topics and Well Written Essays - 4000 Words”, n.d. https://studentshare.org/miscellaneous/1559246-securing-the-cloud.
  • Cited: 0 times

CHECK THESE SAMPLES OF Securing the Cloud

Cloud Computing

Securing the Cloud: Cloud Computer Security Techniques and Tactics.... The company has greatly benefited from the cloud computing services offered through Amazon Web Services (AWS) in terms of cost reductions, remote access, on demand availability and automated software updates.... Through the cloud computing services, Ericsson does not incur costs of maintaining the system and does not need to employ many highly skilled professionals to manage the systems....
3 Pages (750 words) Case Study

Cloud Computing Services

the cloud computing is a newly emerged and most attractive information technology (IT) trend which ensures the implementation of the utility computing model broadly making use of the Virtualization technologies.... Additionally, the cloud technology based service can be executed like a public cloud, or as a private cloud computing architecture on AT&T's communication network based infrastructure, which will be linked to a client data center through AT&T's network (Bradley, 2009; Data Center Knowledge, 2009)....
10 Pages (2500 words) Research Paper

Requirements for the Corporate Computing Function

Two reasons for this are the complexity of incorporating software from different vendors in the cloud, and the fact that the management would incur additional costs if it tried to handle the integration on its own (Corbató, 2012).... Unforeseen costs can also arise from the need to test the software before migrating to the cloud.... These costs are only unexpected if the management doesn't fully understand the cloud model.... The management wants to start using cloud computing in a big way and has evaluated services from several vendors, but its affiliate company which could be either the provider of goods and services has limited its cloud usage so far because the economics are not yet suitable....
3 Pages (750 words) Assignment

Integrated system design for cloud enterprise network and a secure BYOD

Companies need to address the threats brought by BYOD in its IT strategy and formulate better ways of Securing the Cloud network even from the mobile devices' end.... Organizations should also include a BYOD policy in employee contracts to ensure inclusivity in efforts to protect the BYOD, the cloud system and the entire integrated computer network.... The use of mobile devices have made the introduction of BOYD to organizations simpler, because organizations do not provide BYOD devices, rather they allow employees to use their own… Mobile devices have made the implementation of the BYOD technology simpler and less bound by time and physical boundaries, as employees can share can share and receive information on its cloud network on time regardless of their BYOD By + Definition of Key Words for BYOD Mobile Technology Consumerization of IT as a trend has improved with the introduction of modern mobile devices....
2 Pages (500 words) Essay

Management Information Techniques: Software-As-A-Service Goes Mainstream

The users also do not have to worry about maintaining the software applications as this is the responsibility of the cloud system provider (Winkler, Vic 2011).... The software as a service (SAAS) cloud computing model has so many advantages to users.... The study "Management Information Techniques: Software-As-A-Service Goes Mainstream" discusses the main advantages and disadvantages of the software-as-a-service model, some of the challenges facing Salesforce as it continues its growth, the business types that benefit from switching to salesforce....
5 Pages (1250 words) Case Study

Internet Needs More Rules and Regulations

The essay "Internet Needs More Rules and Regulations" highlights that since the Internet is a tremendously changing avenue, there is a need to regulate its use so that it serves its purpose efficiently.... There is a need for ethics and an acceptable moral code which is the major problem with the use of the internet....
5 Pages (1250 words) Essay

Privacy and Security in Cloud Services

Users no longer need to use their own PCs or invest in hardware or software or network infrastructure because the cloud service provider avails all these resources on any platform such as a PC, tablet, mobile phone, and so on.... … The paper "Privacy and Security in cloud Services" is a great example of a literature review on logic and programming.... The paper "Privacy and Security in cloud Services" is a great example of a literature review on logic and programming....
20 Pages (5000 words) Literature review

Internet-Based Security Risks and Attacks

cloud Computing is a cost-effective, flexible, as well as a recognized delivery platform that offers consumer or business IT services through the Internet.... However, cloud Computing is plagued with security issues, mainly because crucial services are regularly outsourced to a third party.... cloud Computing is a cost-effective, flexible, as well as a recognized delivery platform that offers consumer or business IT services through the Internet....
8 Pages (2000 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us