StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Cloud Computing Security - Essay Example

Cite this document
Summary
From the paper "Cloud Computing Security" it is clear that information is literary important because it gives students a chance to develop critical thinking skills as well as lifelong learning skills which are necessary for better performance and decision-making…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.1% of users find it useful
Cloud Computing Security
Read Text Preview

Extract of sample "Cloud Computing Security"

? Cloud Computing Security Cloud Computing Security Introduction The rising cost of computing resources has been a matter of concerns for many organizations whether large, medium, or small. As a result, many organizations are struggling to adopt a cost effective computing resources for their business applications. In this regard, many organizations have moved towards adoption cloud-computing concept in their business environment in a bid to reduce cost. Iyer and Henderson (2010) define cloud computing as a collection of information technology resources such as servers, applications and databases, which are accessible upon demand and provided by a service corporation online allowing for resource pooling among several users. This paper will compare some of the journal articles that address cloud-computing security. Bisong and Rahman (2011) note that many business organizations are beginning to adopt the cloud computing technology as a strategy for cutting down cost so as to increase the company’s profitability. They argue that cloud many companies, which have adopted this concept, have reaped a lot of benefits by cutting down cost, saving time and maximizing their flexibility. Despite the benefits, Bisong, and Rahman (2011) cautions that there is a number of security issues associated with cloud computing technology that an organization has to deal with effectively to maintain confidentiality, integrity, and reliability. As a result, Bisong and Rahman (2011) addresses all the security concerns associated with cloud computing technology in an organization such as the threat, vulnerability and risks in their journal article titled, “An Overview of the Security Concerns in Enterprise Cloud Computing” Qaisar and Khawaja (2012) through a journal article titled, “Cloud Computing: Network/Security Threats and Countermeasure”s agree with the view expressed by Bisong and Rahman (2011) that many companies today are looking forward to adopting the cloud computing concept since it is economical in terms of cost thereby resulting in improved profitability. In this article, Qaisar and Khawaja (2012) explore the security concerns associated with cloud computing concept. However, unlike in the previous article by Bisong and Rahman (2011) the article by Qaisar and Khawaja (2012) goes further to discuss the various types of cloud computing that are available for use. The third article “Is Cloud Computing Secure?” by Brittanny Lyons (2011) also acknowledges that cloud computing has been of great benefits to many companies, which have managed to adopt the concept. Lyons (2011) gives an example of Amazon and Google that uses the cloud computing technology to manage their networks. However, the article like the previous two articles examines how safe the technology is for managing business networks in an organization. Lyons (2011) argues that cloud computing is secure just as the standard computing technology. Nevertheless, the article also agrees with the other articles that there are security issues that must be taken into consideration before adopting the concept in an organization. This includes hackers, viruses, worms, and cyber-terrorists. Other risks noted include lack of privacy since the providers are able to access the data being relayed through the system. With regard to style used, the first two scholarly journals are written in formal academic styles. This is evident as the articles have the abstract, introduction section, conclusion and the bibliography/reference sections. The content is also thoroughly and detailed, as the researchers appear to have gone deep when conducting the research. For instance, it can be seen that the two scholarly journals went deep to discuss the cloud computing security related issues by giving examples as well as how to counter the threats as noted in the article by Qaisar and Khawaja (2012). The two scholarly journals also have a number of charts and graphs, which have been used for illustrating information. For instance, the article by Bisong and Rahman (2011) has the first chart on cloud computing resources while the second is presenting the cloud-computing provider. In addition, the article has a diagram of an overview of cloud computing to enable its audience understand the information being communicated with ease. Similarly, the article by Qaisar and Khawaja (2012) also has detailed diagrams, graphs ands charts used to represent some of the information being communicated to the audience. For instance, the article has the first diagram illustrating the various types of cloud computing and the second showing the cross site scripting. Unlike the two scholarly journal articles, the article by Lyons (2011) is not so detailed rather only entails an expression of opinion plus some research conducted to come up with the conclusion. For instance, Lyons is trying to express his opinion in relation to the question as to whether or not cloud-computing technology is secure or not. It is also evident that this type of article has no use of charts, graphs, and diagrams for illustrations of information, as is the case with the first two scholarly journal articles. This article also unlike the scholarly journals is not written in a formal academic style since it lacks the introductory section, conclusion, and reference section. The audience of the article by Bisong, and Rahman (2011) is the professional organization and student pursuing a course in computer engineering and information technology. For instance, the information is meant to help corporate organization intending to adopt the system to be able to understand both the benefits and the risks associated with adopting the cloud computing technology in an organization. With regard to students, the information will be helpful for purposes of research and development in the field of security networking. The article by Qaisar and Khawaja (2012) also appears to address a similar audience as the information contained in the journal is well researched for use by scholars and students in the field of information technology. However, the article by Lyons appears to address the general audience with an interest on knowing some issues to do with cloud computing security. The purpose of the scholarly journals by Qaisar and Khawaja (2012), Bisong, and Rahman (2011) are both meant to report the original research conducted on cloud computing technology with the intention of making the information available to students and the scholarly world. The purpose of the article by Lyons (2011), on the other hand, is meant to avail general information to the general audience with some interest on the topic. This is seen, as the article is just an expression of opinion in relation to cloud computing security. In conclusion, this information is literary important because it gives students a chance to develop critical thinking skills as well as lifelong learning skills which are necessary for better performance and decision making. References Bisong, A., & Rahman, S.M. (2011). An overview of the security concerns in enterprise cloud computing. International Journal of Network Security & Its Applications (IJNSA), Vol. 3, No. 1. Pp.30-45. Iyer B, Henderson JC (2010). Preparing for the future: understanding the seven capabilities of cloud computing. MIS Q Exec; Vol. 9 No. 2, pp. 117-131. Lyons, B. (2011). Is Cloud Computing Secure? Retrieved from: http://www.infosecisland.com/blogview/17690-Is-Cloud-Computing-Secure.html. Qaisar, S., & Khawaja, K.F. (2012). Cloud Computing: Network/security threats and countermeasures. Interdisciplinary Journal of Contemporary Research in Business. Vol. 3, No. 9. Pp. 1323-1329. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cloud Computing Security Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1465272-cloud-computing-security
(Cloud Computing Security Essay Example | Topics and Well Written Essays - 1000 Words)
https://studentshare.org/information-technology/1465272-cloud-computing-security.
“Cloud Computing Security Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1465272-cloud-computing-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Cloud Computing Security

Cloud Computing: Security Issues and Solutions

This article "cloud computing: Security Issues and Solutions" discusses the developments in the area of information technology that have offered wonderful opportunities to business organizations.... This paper discusses some of the important security issues in cloud computing.... In this scenario, organizations believe that there emerge a number of security issues for business organizations due to the cloud computing environment.... This paper discusses some of the important security issues in cloud computing....
13 Pages (3250 words) Article

Cloud Computing Security Models

The main focus of the paper will be to survey the popular Cloud Computing Security models as well as the diverse parameters of cloud security which will involve virtualization, compliance, framework, risk management, dynamic access security, internet access security and access management.... Therefore, Cloud Computing Security plays a major role because the customers outsource computation tasks and data on cloud computing servers which are managed by cloud providers who cannot be trusted (Amarnath, 2010)....
5 Pages (1250 words) Essay

Cloud Computing Security Policy for SNPO-MC

cloud computing services comprise of an infrastructure, resources and applications that SNPO-MC can access over the Internet.... The service shall be implemented with security protocols both from the vendor and SNPO-MC. The cloud vendor shall provide servers to host the companies website,… It shall also include networking equipment and VPN configurations. The cloud provider shall implement a hybrid cloud where a private cloud dedicated to providing services to SNPO-MC, and it shall also allow The private network shall be hosted off the premises of SNPO-MC but will be managed by both the cloud vendor and IT staff from SNPO-MC....
5 Pages (1250 words) Essay

Network Security and Its Main Aspects

hellip; In this similar context, 'Cloud Computing Security' is fundamentally described as a set of standardized procedures that are designed to deliver the utmost security as well as information assurance within the environment of cloud computing.... 'Cloud Computing Security' brings about considerable restrictions for end-users as well as different cloud service providers.... 'Cloud Computing Security'.... Moreover, certain diagrams have also been portrayed in the discussion in order to acquire a better understanding of the important concept of 'Cloud Computing Security'....
8 Pages (2000 words) Term Paper

An Investigation into Threats to Cloud Computing Security

The paper "An Investigation into Threats to Cloud Computing Security" examines which solutions hold applicable in present-day mobile technology and which require a more elaborate set-up.... Other than that, there is abuse and nefarious use of cloud computing, use of insecure interfaces and APIs, presence of undocumented malicious insiders, shared technology issues especially in inter-cloud scenarios, and entry of unknown risk profiles.... According to Hu et al's presentation at the first International Conference of cloud computing, using a SACPL (Semantic Access Control Policy Language) that is derived on ontology, to describe ACPs in the cloud environment would be a workable solution....
10 Pages (2500 words) Coursework

The Main Security Issues and Aspects in Cloud Computing Based Technology Arrangement

The paper "The Main Security Issues and Aspects in cloud computing Based Technology Arrangement" analyzes security-related aspects and highlights them with a view of current technology-based hindrances in the way of successful application of new technology-based cloud computing arrangements.... cloud computing is considered to be a rising computing platform and the model which facilitates users/clients to keep their personal data and information from a remote location into a framework known as the cloud....
14 Pages (3500 words) Research Proposal

Security Risks in Cloud Computing

The third section discusses cases of Cloud Computing Security attacks.... The author of this paper "Security Risks in cloud computing" gives detailed information about the possible security risks that are associated with cloud computing with reference to the CIA (confidentiality, integrity, and availability) triad.... In the first section, a brief history of cloud computing and its advantages and disadvantages are presented.... The second section discusses the risks that are associated with cloud computing and the different ways in which they violate the three components of the CIA....
8 Pages (2000 words) Term Paper

Security Challenge in Cloud Computing

This essay brings in a comprehensive analysis of the security challenges in Cloud Computing Security, by mainly concentrating on denial of service, and how the company's research and development (R&D) can be used to alleviate the situation.... … The paper “Security Challenge in cloud computing” is a meaningful variant of literature review on information technology.... cloud computing is defined as an IT service set that is offered to a customer through a network on a hired basis as well as with the capacity to scale down or up the requirements of their services....
12 Pages (3000 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us