By clicking “Check Writers’ Offers”, you agree to our terms of service and privacy policy. We’ll occasionally send you promo and account related email
No need to pay just yet!
About this sample
About this sample
Words: 638 |
Page: 1|
4 min read
Published: Sep 19, 2019
Words: 638|Page: 1|4 min read
Published: Sep 19, 2019
One of the main advantages offered is technology mobility because it allows access to the employees to the organization data, wherever they are and the service flexibility enables business development without the appeal to additional infrastructure (Whitton, 2011).
What this technology promises is related with design and implementation of applications infrastructure solutions that are more efficient and cheaper. Still, the main challenges of these applications remain the used platform, which is an unsecure environment: the Internet. Issues like data availability, environment security, performance unpredictability and supplier dependency characterize the Cloud Computing technology.
When talking about data security and confidentiality, there are a lot of disputes and suspicions. Cloud computing implementation in company activity has as main hindrances supplier or middle-man dependency (Internet connection) and the lack of security for the data that are stored in the Cloud, as a service undertaken without the use of physical components.
The companies hesitation is justified when considering that confidential company info are collected, stored and maybe processes by third-party companies, which can be connected to other people contracted which may or may not be interested in these data (ENISA, 2009). Data location can also be a problem considering data confidentiality laws which restricts data access and circulation over borders for certain data categories. These types of restrictions must be taken into consideration given the fact that suppliers are not so clear when referring to data location or supplying some guaranties that these restrictions are complied.
Data protection is nowadays a weak point for Cloud Computing. The technology is still young and thus data safety can’t be guaranteed in cloud. Data protection refers to controls and control mean visibility. The main disadvantage of this technology is that the organization can’t control what it can’t see. Data integrity and confidentiality refers to the reading and modification of data only by authorized personnel. The server location is unknown as well as the data transfer network. Also there is no guarantee that the supplier will react dynamically to the company’s demands and expectations (ISACA, 2009).
Because the network and server are in charge of data for thousands of clients there is a risk, because of a wrong authentication, for those data to be accessed by the service supplier personnel or even by somebody from another organization. Still, data lost risk is not specific to this technology, but you can find it even when using your own hard drives, given the fact that these are “rudimentary” computer components, that can break at any time leading to data loss (Fitz-Gerald, 2010).
Despite that it’s fair to say that the data of a lot of companies, especially SMBs are a lot more exposed to risk in their own organizational environment rather than in a well-structured and secure Cloud.
Another unsecure territory is the relationship between supplier and company. The loss or theft of information is a sensible aspect, but the fall of the provided service also means loss of business. Using well known suppliers like IBM, Google or Salesforce.com, that have sufficient means of maintaining online security, puts some of the enterprises worries concerning information vulnerability to ease.
The main solutions for the elimination of protection risks and data security are the careful pick of the supplier, the negotiation of an advantageous and well defined contract, a tight collaboration between the two business partners in order to prevent the loss of control (Cambell, 2010).
The Cloud Computing suppliers offer must ensure data security through: supplying access, data and information usage control, protecting the applications against fraudulent usage, error prevention protection, service availability through the reduction of network components (server, network, terminal), information concerning physical infrastructure security and perpetual improvement.
There is talk about a new business era considering informational technology, the accelerate motion of the globalization phenomenon and the world crisis. For SMBs using this solution is a real advantage because it ensures access to a complex infrastructure.
Browse our vast selection of original essay samples, each expertly formatted and styled