Cloud Computing Security - Essay Example

Comments (0) Cite this document
Summary
Cloud Computing Security Name Institution Cloud Computing Security Introduction The rising cost of computing resources has been a matter of concerns for many organizations whether large, medium, or small. As a result, many organizations are struggling to adopt a cost effective computing resources for their business applications…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94.7% of users find it useful
Cloud Computing Security
Read TextPreview

Extract of sample "Cloud Computing Security"

Download file to see previous pages This paper will compare some of the journal articles that address cloud-computing security. Bisong and Rahman (2011) note that many business organizations are beginning to adopt the cloud computing technology as a strategy for cutting down cost so as to increase the company’s profitability. They argue that cloud many companies, which have adopted this concept, have reaped a lot of benefits by cutting down cost, saving time and maximizing their flexibility. Despite the benefits, Bisong, and Rahman (2011) cautions that there is a number of security issues associated with cloud computing technology that an organization has to deal with effectively to maintain confidentiality, integrity, and reliability. As a result, Bisong and Rahman (2011) addresses all the security concerns associated with cloud computing technology in an organization such as the threat, vulnerability and risks in their journal article titled, “An Overview of the Security Concerns in Enterprise Cloud Computing” Qaisar and Khawaja (2012) through a journal article titled, “Cloud Computing: Network/Security Threats and Countermeasure”s agree with the view expressed by Bisong and Rahman (2011) that many companies today are looking forward to adopting the cloud computing concept since it is economical in terms of cost thereby resulting in improved profitability. In this article, Qaisar and Khawaja (2012) explore the security concerns associated with cloud computing concept. However, unlike in the previous article by Bisong and Rahman (2011) the article by Qaisar and Khawaja (2012) goes further to discuss the various types of cloud computing that are available for use. The third article “Is Cloud Computing Secure?” by Brittanny Lyons (2011) also acknowledges that cloud computing has been of great benefits to many companies, which have managed to adopt the concept. Lyons (2011) gives an example of Amazon and Google that uses the cloud computing technology to manage their networks. However, the article like the previous two articles examines how safe the technology is for managing business networks in an organization. Lyons (2011) argues that cloud computing is secure just as the standard computing technology. Nevertheless, the article also agrees with the other articles that there are security issues that must be taken into consideration before adopting the concept in an organization. This includes hackers, viruses, worms, and cyber-terrorists. Other risks noted include lack of privacy since the providers are able to access the data being relayed through the system. With regard to style used, the first two scholarly journals are written in formal academic styles. This is evident as the articles have the abstract, introduction section, conclusion and the bibliography/reference sections. The content is also thoroughly and detailed, as the researchers appear to have gone deep when conducting the research. For instance, it can be seen that the two scholarly journals went deep to discuss the cloud computing security related issues by giving examples as well as how to counter the threats as noted in the article by Qaisar and Khawaja (2012). The two scholarly journals also have a number of charts and graphs, which have been used for illustrating information. For instance, the article by Bisong ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cloud Computing Security Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1465272-cloud-computing-security
(Cloud Computing Security Essay Example | Topics and Well Written Essays - 1000 Words)
https://studentshare.org/information-technology/1465272-cloud-computing-security.
“Cloud Computing Security Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1465272-cloud-computing-security.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Cloud Computing Security

Cloud Computing and Security Issues

...helps the user in using the service as and when needed. The concept behind cloud computing is truly revolutionary as it allows small organizations to scale up their operations to high proportions without buying hardware and software and without hiring a fleet of IT experts. The immense potential offered by cloud computing is acknowledged across the industry, and yet, there is hesitation in its rapid adoption by many organizations (Armbrust et al, 2010). This is because the rapid growth in the technology is also accompanied by growing concerns about security related issues. Cloud computing, being an innovative method of...
51 Pages(12750 words)Dissertation

Cloud Computing and Security

...Cloud Computing and Security In the last few years, the paradigm of cloud computing has evolved from a talented business idea to one of the rapidly developing tools of information technology all over the world. Additionally, with its talent to offer users animatedly extendable and collective business resources over the web based technology like internet cloud computing prevents from large level business expenses. In addition, cloud computing guarantees to modernize the future of business as well as corporate computing environment extensively. At the present,...
7 Pages(1750 words)Term Paper

Wireless Network Security - Cloud Computing Network

...?COMPUTER SCIENCES AND INFORMATION TECHNOLOGY WIRELESS NETWORK SECURITY-CLOUD COMPUTING NETWORK S S GRADE 31ST OCTOBER 2011 PERSONAL STATEMENT Perhaps the gradual trigger to the interest in wireless networking security can be traced back from the vast time that I dedicated to the study and teaching Information technology. In my Undergraduate and Masters Studies at King Abdulaziz University, Jeddah; I encountered several cases of computing data hacking and unauthorized access to data centers. This did not auger well with the ethics of data computing, privacy and security. This gave me the reason to think...
3 Pages(750 words)Personal Statement

Security Concerns in Cloud Computing

...? Full Paper Introduction Cloud computing is considered to be a value driven technology, as it saves cost along with advanced virtualization of business functions that is globally accessible. Organizations consider it a cost effective tools, as the requirement of maintaining a complex technology infrastructure along with resources is not essential. Likewise, risk factors are also been considered, as the risk, mentioned in the underpinning contract is now owned by a third party i.e. cloud computing vendors. Martin Sandler, who is a director of HP systems security Lab says, “People often think of virtualization as adding to security...
5 Pages(1250 words)Research Paper

Cloud Computing Security

...ID # Cloud Computing Security Cloud computing is an attractive information technology (IT) trend which ensures the implementation of the utility computing model broadly using Virtualization technologies. Keeping in mind the numerous advantages of cloud computing, an increasing number of business organizations have begun offering and making use of cloud-enabled architectures and services to support their business operations. On the other hand, the advancement of cloud computing has also created a wide variety of new challenges to existing techniques and...
5 Pages(1250 words)Dissertation

Cloud computing (Opportunities and concerns (security))

...? Cloud Computing Insert Insert Grade Insert Insert Table of Contents Table of Contents 2 Cloud Computing 3 0 Introduction 3 1.1 Opportunities 3 1.1.1 Time to market products and services can be reduced 3 1.1.2 Reduction in cost of IT investment 3 1.1.3 Reduction of barrier of entrance 4 1.1.4 Pay as you go 4 1.1.5 Business opportunity 4 1.1.6 New Markets 5 1.1.7 On Demand Self Service 5 1.1.8 Opportunity to enhance IT systems 5 1.1.9 Rapid elasticity 5 1.1.10 Availability 5 1.2 Security Concerns 6 1.2.1 Privileged User Access 6 1.2.2 Regulatory compliance 6 1.2.3 Data location 7 1.2.4 Data segregation 7 1.2.5 Data Recovery 7 1.2.6 Investigative support 7...
8 Pages(2000 words)Essay

Security issues in delivering infrastructure as a service in cloud computing and business

...?Security Issues in Delivering Infrastructure as A Service in Cloud Computing and Business By Table of Contents Security Issues in Delivering Infrastructure as A Service in Cloud Computing and Business 1 Abstract 2 Introduction 3 Cloud Computing 7 Infrastructure as a service (IaaS) 10 Security Considerations in adoption of IaaS 14 Other Issues and Solutions 20 Conclusion 28 References 29 Abstract Cloud computing has emerged as a prominent computing paradigm, that promises to provide a cost and worry free solutions to consumer problems so...
24 Pages(6000 words)Literature review

Cloud based computing security

...Table of Contents: Introduction: Security Overview: Computing Resources and Cloud Computing: How Security Issues Impact upon Cloud Computing: CurrentTrends: Security Concerns: Using the Cloud Safely: Data Storage: Conclusion: Name Date Professor’s Name Course Section/# Cloud Based Computing Security Introduction: Many enterprises rely on database systems for day-to-day operations and decision making; as such, the security of data managed by these systems becomes critical. Misuse or damage of data can affect not only a...
8 Pages(2000 words)Essay

Cloud computing risks & security concerns

...Cloud Computing Risks and Security Concerns Introduction Cloud computing is an emergent technology that has revolutionised the operations of organisations to a great extent. This terminology has been defined in numerous ways but the US National Institute of Standards and Testing, NIST definition has received worldwide recognition: cloud computing refers to a model that fosters a convenient, on-demand and ubiquitous access to a network that is shared by a pool of computing resources that could be configured and that could be provisioned and released rapidly with limited service provider interaction or...
12 Pages(3000 words)Essay

Cloud Computing Security Policy

...Cloud Computing Security Policy for SNPO-MC Cloud Computing Security Policy for SNPO-MC Purpose The policy outlines the security practices and processes for using cloud services in the daily operations, data manipulation and storage and use of applications at SNPO-MC organization. Scope The policy will be used by managers, executive, staff and as a guide to negotiating terms with cloud providers. Definitions Employees of the organization are people who work in the organization. Executives who are on the loan are referred to as loaned staff members, and they usually telework for the...
5 Pages(1250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Cloud Computing Security for FREE!

Contact Us