Back to School Offer

Get 20% of Your First Order amount back in Reward Credits!

Get 20% of Your First Orderback in Rewards

All papers examples
Get a Free E-Book! ($50 Value)
HIRE A WRITER!
Paper Types
Disciplines
Get a Free E-Book! ($50 Value)

Cloud Computing, Research Paper Example

Pages: 2

Words: 673

Research Paper

The world is becoming a global space, and every company would wish to have a perfect connection with the rest of the world. The computer era has made everything possible, and cloud computing has even added weight to the issue of making the world a global village (Aljabre, 2012).  Cloud computing is the putting into use of the computing resources, hardware and software. These resources configured to deliver services over a network, through the Internet.  There are various advantages associated with cloud computing:  it is virtual, flexible, scalable, affordable, and openness. However, one ought to know exactly what happens in cloud computing and how to go about it. This paper discusses about cloud security.

Cloud security

Cloud computing bases its infrastructure in the internet, thus all the activities involved are vulnerable to hack attacks.  To minimize the problem of cloud computing, the first thing a company ought to do is to study and critically examine the provider’s security policies. If the policies are suitable enough, then one can go ahead and sign a contract with them.

Providing and implementing security for a cloud environment

A security program provides the structure used for the management of information security. It also offers information on the risks and threats regarding the targeted environment. If anything happens, leading to a security breach, then the security program is responsible for the provision of crucial information regarding the protection of the cloud (Aljabre, 2012).  It also offers information regarding the responses to threats, while accounting for the management of events. The considerations in implementing a security program include;

  1. Evaluation and documentation of the organization’s culture as related to general security
  2. Evaluation of the current industry and organization requirements in the establishment of best practices for secure infrastructure
  3. If the company’s competitive advantage bases on trade secrets, the corporate security program specifies the compliance requirements
  4. If company’s data comprises of export controls it is essential to address to specific compliance methodology for data
  5. Critical evaluation of each proposed cloud application done to assess its appropriateness. Thereafter, cloud computing safely installed.  An evaluation is done to evaluate the workability of the cloud-computing model deploy (Daiva & Zalieckaitė, 2012).

Current security models and recommended extensions to protect information stored in cloud environments

There exist three types of security models; public, private and hybrid.

In the private cloud delivery model, there is no sharing of resources with any other company. A single organization owns and operates a private cloud and delivers IT services within a constrained own network perimeter.

In the public cloud-computing model, a billed service provides the IT activities and functions. The services provided on a subscription basis, at a billed on a pay-per-use, or through the internet (Narayanan, 2012).

Hybrid models embrace both public and private cloud computing.  Hybrid models help in meeting specific business and technology requirements. In this case, there is the allocation of activities and tasks to traditional IT, external or internal clouds, as appropriate, helping to optimize security and privacy with a minimum investment in fixed IT costs.

While all the three models serve best, there is the need for privatization, where the service providers should make a specific cloud line for every company, more especially in the case of public cloud computing model.

In Conclusion, we could say that cloud computing associated with risks. However, the risks are manageable as it only takes the involvement of the company in making wise decisions. After all, the advantages associated outweigh the limitations. Once the issues of security resolved, the rest of the processes go on smoothly, thereby providing substantial benefits for the company.

References

Aljabre, Abdulaziz. (2012). Cloud Computing for Increased Business Value.  International Journal of Business & Social Science. Vol. 3 (1), p234-239. 6p.

Daiva H. & Zalieckaitė, Laima. (2012). Cloud Computing Application In Small And Medium-Sized Enterprises. Issues of Business & Law. Vol. 4, p199-130. 12p.

Narayanan, Vineeth.(2012). Harnessing the Cloud: International Law Implications of Cloud-Computing.  Chicago Journal of International Law. Vol. 12( 2), p783-809. 27p.

Singh, Karamjit, Kharbanda, Isha, & Kaur, Navdeep. (2012). Security issues occur in Cloud Computing and there Solutions.  International Journal on Computer Science & Engineering. May2012, Vol. 4(5), p945-949. 5p.

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Research Paper Samples & Examples

Oracle Corp Reported Decline in Financial Performance and Its Market Share, Research Paper Example

This report aims to examine the financial performance of the oracle and its impact on share prices. Oracle is a technology firm that supplies software [...]

Pages: 7

Words: 1790

Research Paper

A Community Response to HIV/AIDS in Nigeria, Research Paper Example

The article NELA: A Community Response to HIV/AIDS in Nigeria discusses how NELA collaborates with various organizations in the fight against HIV/AIDS. They attempt to [...]

Pages: 11

Words: 3085

Research Paper

Efficient Exercise for Weight Loss, Research Paper Example

Exercise is a great way to lose weight and improve physical fitness. Finding the right exercise program can be challenging due to the numerous options [...]

Pages: 4

Words: 1040

Research Paper

Cons of Human Cloning for Reproductive Cloning, Research Paper Example

Cloning has been found to have many potential benefits from a reproductive perspective. While the advantages are numerous, it is also important to take into [...]

Pages: 1

Words: 361

Research Paper

The Expositor’s Bible Commentary, Research Paper Example

Introduction The purpose of this analysis is to provide a deeper understanding of 2 Timothy 3:10-17, which intends to demonstrate that it is important for [...]

Pages: 10

Words: 2802

Research Paper

Just Because It Has Wings Does Not Mean It’s an Angel, Research Paper Example

Experienced writers who use allegoric literary devices often leave the readers wanting to know the real meanings behind the metaphoric examples. Set during an undefined [...]

Pages: 11

Words: 3140

Research Paper

Oracle Corp Reported Decline in Financial Performance and Its Market Share, Research Paper Example

This report aims to examine the financial performance of the oracle and its impact on share prices. Oracle is a technology firm that supplies software [...]

Pages: 7

Words: 1790

Research Paper

A Community Response to HIV/AIDS in Nigeria, Research Paper Example

The article NELA: A Community Response to HIV/AIDS in Nigeria discusses how NELA collaborates with various organizations in the fight against HIV/AIDS. They attempt to [...]

Pages: 11

Words: 3085

Research Paper

Efficient Exercise for Weight Loss, Research Paper Example

Exercise is a great way to lose weight and improve physical fitness. Finding the right exercise program can be challenging due to the numerous options [...]

Pages: 4

Words: 1040

Research Paper

Cons of Human Cloning for Reproductive Cloning, Research Paper Example

Cloning has been found to have many potential benefits from a reproductive perspective. While the advantages are numerous, it is also important to take into [...]

Pages: 1

Words: 361

Research Paper

The Expositor’s Bible Commentary, Research Paper Example

Introduction The purpose of this analysis is to provide a deeper understanding of 2 Timothy 3:10-17, which intends to demonstrate that it is important for [...]

Pages: 10

Words: 2802

Research Paper

Just Because It Has Wings Does Not Mean It’s an Angel, Research Paper Example

Experienced writers who use allegoric literary devices often leave the readers wanting to know the real meanings behind the metaphoric examples. Set during an undefined [...]

Pages: 11

Words: 3140

Research Paper

Get a Free E-Book ($50 in value)

Get a Free E-Book

How To Write The Best Essay Ever!

How To Write The Best Essay Ever!