Nobody downloaded yet

Cloud security, DATA LOSS and HIJACKING - Literature review Example

Comments (0) Cite this document
Summary
Cloud computing entails the collection of several services, using layered cloud computing structures (Borko, 2010). Cloud computing includes grid computing…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91.4% of users find it useful
Cloud security, DATA LOSS and HIJACKING
Read TextPreview

Extract of sample "Cloud security, DATA LOSS and HIJACKING"

Download file to see previous pages Users can upload and access uploaded pictures, documents, music files. www.dropbox.com cloud computing site offers possible free 18 gigabytes of memory to its users (Blaisdell, 2012).
Further, the users of cloud computing can choose between public or private computing types. The public computing type allows anyone to access the data saved in the remote server (Howell, 2012). Under the private type computing, unauthorized persons are not allowed to access the data saved on the remote server. The term cloud equates to being invisible. Cloud computing entails outsourcing data storage to another location, cloud (Shor, 2011).The cloud is user-prioritized, filling the computing needs of the users (Gillam, 2010). The persons using the cloud service do know the hardware or software used by the cloud service providers. Likewise, the cloud service clients do not know where the files are saved, the location of the cloud service providers being “hidden” from the cloud service users. People using internet –capable cell phones, tablets, and computers can save their files in the cloud computing sites. They can then access their files from the cloud server sites from any available computer, tablet, or internet- capable cell phones. Consequently, the users of the cloud computing sites do not need unnecessarily high gigabyte capacity memory cards or drives to save their huge files on their cell phones, tablets, or computers. To ensure high quality cloud computing service, data loss and hijacking must be reduced to allowable levels.
In addition, the above picture shows how the basic cloud computing setup works. One cloud computing person can access the same files from the same cloud computing site from a tablet, cell phone or any computer terminal. Some cloud computing sites offer either the free or paid membership its users (Jamsa, 2011). One cloud computing service provider offers the file saving privileges to many clients. ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cloud security, DATA LOSS and HIJACKING Literature review”, n.d.)
Retrieved from https://studentshare.org/information-technology/1674137-cloud-security-data-loss-and-hijacking
(Cloud Security, DATA LOSS and HIJACKING Literature Review)
https://studentshare.org/information-technology/1674137-cloud-security-data-loss-and-hijacking.
“Cloud Security, DATA LOSS and HIJACKING Literature Review”, n.d. https://studentshare.org/information-technology/1674137-cloud-security-data-loss-and-hijacking.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Cloud security, DATA LOSS and HIJACKING

Cloud Computing and Security

...applications and considerably enhance their communications resources, and can get all the facilities and technology based solutions at minor outlay. On the other hand, when more critical information of corporations and individuals is stored on corporate cloud framework, fears are starting to elevate regarding just how protected an arrangement it could be considered. In addition, storing a large amount of data creates a circumstance similar to keeping massive funds, which means drawing additional normal attacks from increasingly experienced and extremely provoked invaders in computing environment. Accordingly, communication security is a particular concern which users contemplate when...
7 Pages(1750 words)Term Paper

Public Cloud a Source of Danger to Businesses

.... Moreover, unauthorized people should not be allowed to have access to sensitive data and information. On the other hand, at the present we can see a number of cases of data loss and leakage. Despite the fact that public cloud is a shared and distributed technology based arrangement that involves a wide variety of technologies and services. At any end of such distributed technology based arrangement a security breach can take place. Thus, the use of public cloud can create a lot of security challenges for the organizations (Cloud Security Alliance, 2010; Rittinghouse & Ransome, 2009). So...
8 Pages(2000 words)Essay

Cloud Computing Security

..., making use of cheap, simply available tools to launch application-layer based security attacks. In this scenario, a main cause they have been successful is that corporation data center because cloud operators are not effectively equipped to defend beside them. Given below are some of the well-known security issues that can minimize the effectiveness of cloud computing (Burns; Jansen; Bruening and Treacy). Denial of Service (DoS) attacks Loss of confidential data Managing complexity and risk Downtime due to a cloud outage Employee ‘personal clouds’ Lack of visibility Changes in...
5 Pages(1250 words)Dissertation

Security and Loss Prevention

...? Security and Loss Prevention Security and Loss Prevention Given the situation, discuss some of the options the company has for handling this situation. The options the company has for handling this situation are as follows: (1) status quo or do nothing; (2) verify the information: the director of the internal auditing department, Donald Reynolds, must verify the validity and authenticity of the information, received as an anonymous tip; and (3) if the information was verified and indeed it was apparent that an embezzlement supposedly exists and is perpetuated by the identified plant controller, an investigation of the allegations must be made. According to Carnie...
3 Pages(750 words)Assignment

Security and Loss Prevention

...? Security and Loss Prevention 24 May Security significantly affects the loss prevention program of any company. The research centers on the importance of establishing a comprehensive control program. The research includes a study on installing fraud reduction procedures. Fraud reduction ensures more reliable financial reports. There are many benefits of a comprehensive control program. First, the program will reduce the statistics of the American Institute of Criminology & Research indicating employee theft is responsible for more than $50 billion worth of losses in the United States (Tryon, 1997). Second, the internal control program will discourage the...
4 Pages(1000 words)Assignment

Security in the Cloud

...? Security in the Cloud Security in the Cloud Introduction In recent decades, the computation worldhas changed from centralized to distributed systems and this has enabled users to get back to virtual centralization, or what is commonly referred to as cloud computing. Data location and processes makes the difference in the computation realm (Kandukuri et al, 2009). This is evident by the fact that on one hand, a user has complete control on processes and data in his or her device. On the other hand, however, the user has cloud computing where a vendor provides the data and service...
8 Pages(2000 words)Essay

Data Communication & the Cloud

...embedded application because of the performance and correctness constraints but some of these strategic embedded military applications include the critical command and control systems, in-field data and information analysis, image data processing onboard missiles as well as other intelligence areas. The main challenges of cloud computing are the need for wide bandwidth, concerning security, concern for malfunctions of the cloud, legal and political issues and concern for the rights of the users which pose a challenge to the increasing number of the Cloud users in effecting their business ideologies. According to Magoules, Pan & Teng...
6 Pages(1500 words)Research Paper

Data Loss Prevention

...the existing IT legislation and the need for improvement, and throws some light on the duties of the IT manager responsible for data control in different organizations. Research Case Studies Although the number of incidents regarding personal data loss would normally be expected to decrease due to the huge amounts of both financial and social losses incurred, it is still on the rise. According to Mary Monahan, a senior analyst at Javelin Strategy & Research, a Pleasanton research organization, 312 security breaches occurred in 2006 in the United States, giving away 20 million records, while in 2007, 446 security breaches occurred...
8 Pages(2000 words)Essay

Security and Loss Prevention

...Security and loss prevention How I would research my area of interest and determine whether the position I chose would be right for me and I would be right for it. The first and foremost research to conduct involves job security (McKay, 2007). This gives the assurance that there exists the job for another day. This concept promotes planning of life, both in the long and short term. The stability of the family depends on the family head, with assistance from the other members of putting food on the table every day. In addition, the security at the job place plays a part in selection the job to do. As stated above, the risks and dangers involved, both on-the job and...
1 Pages(250 words)Essay

Security and Loss prevention

...SECURITY AND LOSS PREVENTION Security and Loss Prevention In order to curb theft during shipping and receiving of goods adequately, one has to deal with loopholes that enable these thieves to access the products as well as the routes they use to get the loot out of the facility. During shipping, whoever is responsible for order picking might pick the wrong order intentionally, hence, get the wrong particulars packed. To avert this, order pickers should be properly scrutinized before delegating such sensitive responsibilities, and in this screening, they must provide their felony records to ensure whoever is entrusted with the inventory has a clean background. On the same...
1 Pages(250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Literature review on topic Cloud security, DATA LOSS and HIJACKING for FREE!

Contact Us