By clicking “Check Writers’ Offers”, you agree to our terms of service and privacy policy. We’ll occasionally send you promo and account related email
No need to pay just yet!
About this sample
About this sample
Words: 638 |
Page: 1|
4 min read
Updated: 16 November, 2024
Words: 638|Page: 1|4 min read
Updated: 16 November, 2024
One of the main advantages offered by technological mobility is its capacity to provide employees with access to organizational data, regardless of their location. Additionally, the flexibility of services enables business development without the need for additional infrastructure (Whitton, 2011).
What this technology promises is related to the design and implementation of application infrastructure solutions that are more efficient and cost-effective. However, the main challenges of these applications remain the platform used, which is an insecure environment: the Internet. Issues like data availability, environment security, performance unpredictability, and supplier dependency characterize Cloud Computing technology.
When discussing data security and confidentiality, numerous disputes and suspicions arise. The implementation of cloud computing in company activities faces primary hindrances such as supplier or middle-man dependency (Internet connection) and the lack of security for the data stored in the Cloud, as a service undertaken without the use of physical components. Companies' hesitation is justified considering that confidential company information is collected, stored, and potentially processed by third-party companies, which may have connections to other entities that might be interested in this data (ENISA, 2009).
Data location can also pose a problem, considering data confidentiality laws that restrict data access and circulation across borders for certain data categories. These types of restrictions must be considered, given the fact that suppliers are not always transparent when referring to data location or providing guarantees that these restrictions are complied with.
Data protection is currently a weak point for Cloud Computing. The technology is still in its infancy, and thus data safety cannot be guaranteed in the cloud. Data protection refers to controls, and control means visibility. The main disadvantage of this technology is that the organization cannot control what it cannot see. Data integrity and confidentiality pertain to the reading and modification of data only by authorized personnel. The server location is unknown, as well as the data transfer network. Moreover, there is no guarantee that the supplier will react dynamically to the company’s demands and expectations (ISACA, 2009).
Because the network and server handle data for thousands of clients, there is a risk, due to incorrect authentication, that this data could be accessed by service supplier personnel or even someone from another organization. However, the risk of data loss is not specific to this technology; it can occur even when using your own hard drives, as these are "rudimentary" computer components that can fail at any time, leading to data loss (Fitz-Gerald, 2010).
Despite this, it is fair to say that the data of many companies, especially SMBs, is more exposed to risk within their own organizational environment than in a well-structured and secure Cloud.
Another insecure territory is the relationship between the supplier and the company. The loss or theft of information is a sensitive aspect, but the failure of the provided service also means a loss of business. Using well-known suppliers like IBM, Google, or Salesforce.com, which have sufficient means of maintaining online security, can alleviate some of the enterprises' concerns regarding information vulnerability.
The main solutions for eliminating protection risks and data security concerns are the careful selection of the supplier, the negotiation of an advantageous and well-defined contract, and a close collaboration between the two business partners to prevent the loss of control (Cambell, 2010). Cloud Computing suppliers must ensure data security through providing access, data and information usage control, protecting applications against fraudulent usage, error prevention protection, service availability through the reduction of network components (server, network, terminal), information concerning physical infrastructure security, and continuous improvement.
There is talk about a new business era considering informational technology, the accelerated motion of the globalization phenomenon, and the world crisis. For SMBs, using this solution offers a real advantage as it ensures access to a complex infrastructure. This capability allows businesses to focus on innovation and growth rather than infrastructure management, thus fostering a more competitive market presence.
Whitton, N. (2011). Technology and Organizational Development. Publisher.
ENISA. (2009). Cloud Computing: Benefits, Risks and Recommendations for Information Security. European Network and Information Security Agency.
ISACA. (2009). Cloud Computing: Business Benefits With Security, Governance and Assurance Perspectives. Information Systems Audit and Control Association.
Fitz-Gerald, A. (2010). Data Security in Cloud Computing. Publisher.
Cambell, J. (2010). Risk Management in Cloud Computing. Publisher.
Browse our vast selection of original essay samples, each expertly formatted and styled