StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Cyber Securiy and Cloud Computing - Research Proposal Example

Cite this document
Summary
This paper 'Cyber Securiy and Cloud Computing' tells that banks and other security agencies have also used cloud computing for backup purposes. In all of these, a single breach could lead to millions of vital information getting into wrong hands, including cyber crimes and theft…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.4% of users find it useful
Cyber Securiy and Cloud Computing
Read Text Preview

Extract of sample "Cyber Securiy and Cloud Computing"

Download file to see previous pages

several information technology (IT) based processing including cloud computing, social media networking, international communication, and global positioning system (GPS) navigation. Another aspect of the revolution is accessibility of the internet, whereby it has become easier for a person to have access to the internet today than two decades back. With the use of media devices such as smart phones, smart watches, and tablet computers, the internet is today one of the most portable technological inventions that can fit into every corner and space (Ziltrain, 2008).

Indeed it cannot be denied that the revolution that has characterised the internet has several benefits to offer the ordinary user. In the estimation of Rehmeyer (2007), not only does the use of the internet today offers advantages but that the absence or non-usage of the internet comes with so much discomfort and disadvantages. Even though this position cannot be debated, the risks and vulnerabilities that the complexity of the internet poses to individual, organisations and nations cannot be denied.

In the opinion of Owens and Lin (2009), the best way to make the most out of the internet in today’s complex dynamic Web 2.0 environment is to ensure adequate cyber security for users. Without this, the list of how beneficial the internet is in today’s environment can go on but the real value that is expected to be derived may never be achieved to its fullest. The reason for this claim is that as news of cyber breaches continues to flood the airwaves, people become sceptical about their fate in using the complex and dynamic Web 2.

0 for various purposes including cloud computing and electronic commerce (e-commerce) (Ziltrain, 2008). In such an atmosphere of mistrust and fear, the Web 2.0 will be seen as useful only for some of the most conventional purposes that come with limited or no risk such as gaming, information search, and downloading. Meanwhile as it has been hinted already, there are several other useful purposes that the internet can serve. Regrettably, the more useful the need for the internet, the more demanding the type of information or data to be stored is required.

For example national agencies have used cloud computing for high class usage such as storing payroll information (Zhang et al., 2001). Banks and other security agencies have also used cloud computing for backup purposes. In all of these, a single breach could lead to millions of vital information getting into wrong hands, including cyber crimes and theft (Gordon & Loeb, 2006). It is against this background that a much pragmatic approach to cyber security is required to make the use of the internet safer in today’s world.

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cyber securiy and cloudl computing Research Proposal”, n.d.)
Cyber securiy and cloudl computing Research Proposal. Retrieved from https://studentshare.org/information-technology/1698681-cyber-securiy-and-cloudl-computing
(Cyber Securiy and Cloudl Computing Research Proposal)
Cyber Securiy and Cloudl Computing Research Proposal. https://studentshare.org/information-technology/1698681-cyber-securiy-and-cloudl-computing.
“Cyber Securiy and Cloudl Computing Research Proposal”, n.d. https://studentshare.org/information-technology/1698681-cyber-securiy-and-cloudl-computing.
  • Cited: 0 times

CHECK THESE SAMPLES OF Cyber Securiy and Cloud Computing

Analytics, Interfaces, and Cloud Technology

In this paper "Analytics, Interfaces, and cloud Technology" major emphasis lays on presenting the necessity to implement Analytics, Interfaces, and cloud Technology at the company.... Analytics and cloud Technology has become one of the most essential elements for the success of any company in the global market.... In this sense, the notion of coming up with a strategic plan on the implementation of Analytics, Interfaces, and cloud Technology is a subject of great concern in promoting the success of Auction Analytics (Hugos and Hulitzky, 2011)....
6 Pages (1500 words) Case Study

Cloud-based BPM Model

This paper “cloud-based BPM Model” seeks to evaluate managing the business processes in an efficient change-adaptive way.... BPM involves activities, events and factors that can be interactively processed to deliver value to the customers.... hellip; The author explains that BPM involves activities, events and factors that can be interactively processed to deliver value to the customers....
9 Pages (2250 words) Essay

Integrating Major and Core

Most organizations feared cloud computing because of its ability to be flexible within user domains.... In addition, there are many opinions regarding technology scientists discussing the functionality of networks, specifically in regards of private clouds, who have a great capability to maintain a secured environment and be integrated with a public cloud.... One of the major obstacles regarding cyber bullying is the dire consequences that result in taking acting against it....
2 Pages (500 words) Essay

Problem solving

cloud computing is one of the major fascinating and substantial advancement in the field of information technology particularly in computing and data storage.... Over the last decade many organizations and businesses with huge computational needs have embraced the use of cloud… Many attribute this to the convenience and reliability among other advantages that comes with cloud computing.... Several surveys and studies have been done in the past year to ascertain the status of cloud computing....
2 Pages (500 words) Research Paper

Cyber Threat Analysis Services

This coursework "cyber Threat Analysis Services" discusses the concepts of cyber threat analysis and technologies involved in accomplishing the task.... It discusses companies that provide cyber threat analysis services and future speculations about the integration of cyber threat analysis.... The rise of computers and the internet that led to the development of the global world witnessed a similar rise in cyber crimes that also conducted through the internet and by the use of computers....
6 Pages (1500 words) Coursework

The ISMS for Mr. Manos Llewellyn

Likewise, the implementation element also involves security related to network, applications and computing devices.... This case study "The ISMS for Mr.... Manos Llewellyn" focuses on Mr.... Manos Llewellyn's decision to implement a new network.... The network will use the latest technology in terms of both hardware and software....
10 Pages (2500 words) Case Study

Security Protocols

hellip; cloud computing seems like a more feasible option.... Not only would cloud computing help the company improve its security, but would also provide it with better services and features.... However, a more thorough analysis of the cost, requirements and benefits of cloud computing is needed before any decision regarding the future of the company is made.... The provided recommendations would defiantly boost the company's security and would make sure that the company's network is more resistant to future cyber attacks....
13 Pages (3250 words) Coursework

Cloud Client Computing

hellip; This essay discusses that cloud computing has recently become very popular, but there are also many problems.... When these things are not done, the costs of cloud computing soar making the idea of the cloud not as cost beneficial as previously thought.... The first article by Boulton talks of the wastes that are associated with cloud computing.... The researcher of this essay aims to analyze Cloud/Client computing.... It deals with bringing together of cloud and mobile computing with the aim of promoting the development of applications that are centrally coordinated and thus be delivered to any device....
7 Pages (1750 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us