StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Nobody downloaded yet

The Cloud Computing in Business Security - Report Example

Comments (0) Cite this document
Summary
The paper "The Cloud Computing in Business Security" highlights that concept of cloud computing is generally separated into two sets of models, such as deployment models and service models. The deployment models refer to the “location and management of the cloud’s infrastructure”…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93% of users find it useful
The Cloud Computing in Business Security
Read Text Preview

Extract of sample "The Cloud Computing in Business Security"

Download file to see previous pages The service models relate to the particular nature of services that can be accessed through the cloud computing platform. The attributes and characteristics of the paradigm of cloud computing are still evolving and the definitions, issues and risk factors involved to it would undergo transformations through the involvement of both the private and the public sectors. The model of cloud computing has emerged and gained importance in the recent few years due to its ability to enable convenient access to “a shared pool of configurable computing resources” (Harding 198) which can be released with least management effort or interaction on part of the service provider. The computing resources are available to the clients when they need them via the internet and are charged on the basis of their usage. Besides, the clients are benefited since due to the outsourcing of a major portion of the technical duties, the employees can concentrate on the other aspects of their responsibilities better than before. The five characteristic properties of the cloud are that it is service-based, scalable and elastic, shared, metered by use and use internet technology. According to some experts, the services offered by cloud computing can be categorized as “Infrastructure as a Service (IaaS), Platform as a Service (Paas) and Software as a Service (SaaS)” (Wang, Ranjan and Chen 226). The explanation given above looks at the concept of cloud computing from the perspective of end-users. From the viewpoint of the service provider, the data center is the major component of the cloud. The hardware resources required for different computing and storage processes are contained in the data centre. They classify the cloud system as private and public (“Grid and Cloud Computing” 48). Cloud computing is a radical concept in the field of information technology and is capable of redefining the role of the corporate IT sector.  This concept has established its associations with the concept of security thereby exciting lots of security professionals. ...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(The Cloud Computing in Business Security Report Example | Topics and Well Written Essays - 5000 words, n.d.)
The Cloud Computing in Business Security Report Example | Topics and Well Written Essays - 5000 words. https://studentshare.org/information-technology/1792632-the-cloud-computing-in-business-security
(The Cloud Computing in Business Security Report Example | Topics and Well Written Essays - 5000 Words)
The Cloud Computing in Business Security Report Example | Topics and Well Written Essays - 5000 Words. https://studentshare.org/information-technology/1792632-the-cloud-computing-in-business-security.
“The Cloud Computing in Business Security Report Example | Topics and Well Written Essays - 5000 Words”. https://studentshare.org/information-technology/1792632-the-cloud-computing-in-business-security.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF The Cloud Computing in Business Security

Cloud Computing and Security Issues

...The Cloud Computing in Business Security... The Cloud Computing in Business Security... Introduction 1 Research Background Cloud computing is a new and emerging trend in the IT industry that is set to revolutionize the way people approach and use computing. There has been an exponential growth in new technologies that have converged to develop cloud computing services. Cloud computing services offer an innovative and cost effective means of utilizing IT capabilities, and as such are being offered as long term solutions for numerous educational, governmental, defense, and private businesses. Cloud computing can provide rapid scalability and enhanced IT capabilities to business operations with the investment of minimal costs. It allows the users to ...
51 Pages (12750 words) Dissertation

Cloud Computing and Security

...The Cloud Computing in Business Security... The Cloud Computing in Business Security... Cloud Computing and Security In the last few years, the paradigm of cloud computing has evolved from a talented business idea to one of the rapidly developing tools of information technology all over the world. Additionally, with its talent to offer users animatedly extendable and collective business resources over the web based technology like internet cloud computing prevents from large level business expenses. In addition, cloud computing guarantees to modernize the future of business as well as corporate computing environment extensively. At the present, recession-hit businesses are progressively considering that only by establishing a strong connection...
7 Pages (1750 words) Term Paper

Cloud Computing Security

...The Cloud Computing in Business Security... The Cloud Computing in Business Security... ID # Cloud Computing Security Cloud computing is an attractive information technology (IT) trend which ensures the implementation of the utility computing model broadly using Virtualization technologies. Keeping in mind the numerous advantages of cloud computing, an increasing number of business organizations have begun offering and making use of cloud-enabled architectures and services to support their business operations. On the other hand, the advancement of cloud computing has also created a wide variety of new challenges to existing techniques and approaches to build up and change software intensive systems (Babar and Chauhan; Meng, Wang, Hu, and Li). In...
5 Pages (1250 words) Dissertation

Cloud Computing Security

...The Cloud Computing in Business Security... The Cloud Computing in Business Security... Cloud Computing Security Cloud Computing Security Introduction The rising cost of computing resources has been a matter of concerns for many organizations whether large, medium, or small. As a result, many organizations are struggling to adopt a cost effective computing resources for their business applications. In this regard, many organizations have moved towards adoption cloud-computing concept in their business environment in a bid to reduce cost. Iyer and Henderson (2010) define cloud computing as a collection of information technology resources such as servers, applications and databases, which are accessible upon demand and provided by a service...
4 Pages (1000 words) Essay

Security issues in delivering infrastructure as a service in cloud computing and business

...The Cloud Computing in Business Security... The Cloud Computing in Business Security... Issues in Delivering Infrastructure as A Service in Cloud Computing and Business By Table of Contents Security Issues in Delivering Infrastructure as A Service in Cloud Computing and Business 1 Abstract 2 Introduction 3 Cloud Computing 7 Infrastructure as a service (IaaS) 10 Security Considerations in adoption of IaaS 14 Other Issues and Solutions 20 Conclusion 28 References 29 Abstract Cloud computing has emerged as a prominent computing paradigm, that promises to provide a cost and worry free solutions to consumer problems so that they can consume the services provided by the cloud without worrying about the maintenance and updating of the services they are...
24 Pages (6000 words) Literature review

Folio paper-cloud computing foe E-learning

...The Cloud Computing in Business Security... The Cloud Computing in Business Security... Paper-Cloud Computing For E-Learning Introduction This folio will contain a list of scholarly papers which have been utilised in the preparation of the project. The list of scholarly papers will include books as well as various academic journals. The folio includes a list of websites as well from which data has been gathered while compiling this paper. Certain conference papers regarding cloud computing have been mentioned in this folio. Furthermore, this folio includes the identification of the individuals related to this topic and also the list of products and companies that are utilising cloud computing. List of Scholar Papers Author Title IBSN/ ISSN Other...
4 Pages (1000 words) Assignment

Security Issues in Delivering Infrastucture as a Service in Cloud Computing and Business

...The Cloud Computing in Business Security... The Cloud Computing in Business Security... The main purpose of this document is to explore the infrastructure as service (IaaS) paradigm introduced by cloud computing. Cloud Computing has introduced new traditions of administration and management of computing assets. It allows offering the computing resources to public as a service. Now a day’s many cloud service provider are adopting the trend to provide resources following the infrastructure as a service model. Cloud computing is a very rapidly and extensively evolving paradigm in the world of information technology and it is basically the resultant of the trend of service provision to remote users. The theme of cloud computing is that all computatio...
4 Pages (1000 words) Literature review

Cloud computing risks & security concerns

...The Cloud Computing in Business Security... The Cloud Computing in Business Security... Cloud Computing Risks and Security Concerns Introduction Cloud computing is an emergent technology that has revolutionised the operations of organisations to a great extent. This terminology has been defined in numerous ways but the US National Institute of Standards and Testing, NIST definition has received worldwide recognition: cloud computing refers to a model that fosters a convenient, on-demand and ubiquitous access to a network that is shared by a pool of computing resources that could be configured and that could be provisioned and released rapidly with limited service provider interaction or management effort (Mather, Kumaraswamy & Latif 2009). They...
12 Pages (3000 words) Essay

Cloud Computing Security Policy

...The Cloud Computing in Business Security... The Cloud Computing in Business Security... Computing Security Policy for SNPO-MC Cloud Computing Security Policy for SNPO-MC Purpose The policy outlines the security practices and processes for using cloud services in the daily operations, data manipulation and storage and use of applications at SNPO-MC organization. Scope The policy will be used by managers, executive, staff and as a guide to negotiating terms with cloud providers. Definitions Employees of the organization are people who work in the organization. Executives who are on the loan are referred to as loaned staff members, and they usually telework for the group on specific days of the week. Volunteers regularly telework from their homes a...
5 Pages (1250 words) Essay

Cloud Computing Virtualisation Security Threats

...The Cloud Computing in Business Security... The Cloud Computing in Business Security... Computing Virtualization Security Threats Virtualization is now common all through the world and without it, the cloud environment would perhaps have a totally different form (Abdul, 2012). The software type which functions as the necessary building block when implementing virtualized solutions within data centers is referred to as hypervisor (CMeier,Mnovellino, 2013). Because the hypervisor sits between the guest system and the OS it is important that the component is given maximum security (Tyson T. Brooks, Carlos Caicedo, Joon S. Park, 2012) otherwise if the hypervisor is left vulnerable to exploits, it becomes the main target of the attackers (SZepher,...
6 Pages (1500 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Report on topic The Cloud Computing in Business Security for FREE!

Contact Us