close
This essay has been submitted by a student. This is not an example of the work written by professional essay writers.

Current and Future Trends of Information System Infrastructure

downloadDownload printPrint

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

Get your price

121 writers online

Current and Future Trends of Information System Infrastructure essay
Download PDF

One of the main advantages offered is technology mobility because it allows access to the employees to the organization data, wherever they are and the service flexibility enables business development without the appeal to additional infrastructure (Whitton, 2011).

What this technology promises is related with design and implementation of applications infrastructure solutions that are more efficient and cheaper. Still, the main challenges of these applications remain the used platform, which is an unsecure environment: the Internet. Issues like data availability, environment security, performance unpredictability and supplier dependency characterize the Cloud Computing technology.

When talking about data security and confidentiality, there are a lot of disputes and suspicions. Cloud computing implementation in company activity has as main hindrances supplier or middle-man dependency (Internet connection) and the lack of security for the data that are stored in the Cloud, as a service undertaken without the use of physical components.

The companies hesitation is justified when considering that confidential company info are collected, stored and maybe processes by third-party companies, which can be connected to other people contracted which may or may not be interested in these data (ENISA, 2009). Data location can also be a problem considering data confidentiality laws which restricts data access and circulation over borders for certain data categories. These types of restrictions must be taken into consideration given the fact that suppliers are not so clear when referring to data location or supplying some guaranties that these restrictions are complied.

Data protection is nowadays a weak point for Cloud Computing. The technology is still young and thus data safety can’t be guaranteed in cloud. Data protection refers to controls and control mean visibility. The main disadvantage of this technology is that the organization can’t control what it can’t see. Data integrity and confidentiality refers to the reading and modification of data only by authorized personnel. The server location is unknown as well as the data transfer network. Also there is no guarantee that the supplier will react dynamically to the company’s demands and expectations (ISACA, 2009).

Because the network and server are in charge of data for thousands of clients there is a risk, because of a wrong authentication, for those data to be accessed by the service supplier personnel or even by somebody from another organization. Still, data lost risk is not specific to this technology, but you can find it even when using your own hard drives, given the fact that these are “rudimentary” computer components, that can break at any time leading to data loss (Fitz-Gerald, 2010).

Despite that it’s fair to say that the data of a lot of companies, especially SMBs are a lot more exposed to risk in their own organizational environment rather than in a well-structured and secure Cloud.

Another unsecure territory is the relationship between supplier and company. The loss or theft of information is a sensible aspect, but the fall of the provided service also means loss of business. Using well known suppliers like IBM, Google or Salesforce.com, that have sufficient means of maintaining online security, puts some of the enterprises worries concerning information vulnerability to ease.

The main solutions for the elimination of protection risks and data security are the careful pick of the supplier, the negotiation of an advantageous and well defined contract, a tight collaboration between the two business partners in order to prevent the loss of control (Cambell, 2010).

The Cloud Computing suppliers offer must ensure data security through: supplying access, data and information usage control, protecting the applications against fraudulent usage, error prevention protection, service availability through the reduction of network components (server, network, terminal), information concerning physical infrastructure security and perpetual improvement.

There is talk about a new business era considering informational technology, the accelerate motion of the globalization phenomenon and the world crisis. For SMBs using this solution is a real advantage because it ensures access to a complex infrastructure.

Remember: This is just a sample from a fellow student.

Your time is important. Let us write you an essay from scratch

experts 450+ experts on 30 subjects ready to help you just now

delivery Starting from 3 hours delivery

Find Free Essays

We provide you with original essay samples, perfect formatting and styling

Cite this Essay

To export a reference to this article please select a referencing style below:

Current and Future Trends of Information System Infrastructure. (2019, August 27). GradesFixer. Retrieved October 20, 2021, from https://gradesfixer.com/free-essay-examples/current-and-future-trends-of-information-system-infrastructure/
“Current and Future Trends of Information System Infrastructure.” GradesFixer, 27 Aug. 2019, gradesfixer.com/free-essay-examples/current-and-future-trends-of-information-system-infrastructure/
Current and Future Trends of Information System Infrastructure. [online]. Available at: <https://gradesfixer.com/free-essay-examples/current-and-future-trends-of-information-system-infrastructure/> [Accessed 20 Oct. 2021].
Current and Future Trends of Information System Infrastructure [Internet]. GradesFixer. 2019 Aug 27 [cited 2021 Oct 20]. Available from: https://gradesfixer.com/free-essay-examples/current-and-future-trends-of-information-system-infrastructure/
copy to clipboard
close

Sorry, copying is not allowed on our website. If you’d like this or any other sample, we’ll happily email it to you.

    By clicking “Send”, you agree to our Terms of service and Privacy statement. We will occasionally send you account related emails.

    close

    Attention! This essay is not unique. You can get a 100% Plagiarism-FREE one in 30 sec

    Receive a 100% plagiarism-free essay on your email just for $4.99
    get unique paper
    *Public papers are open and may contain not unique content
    download public sample
    close

    Sorry, we could not paraphrase this essay. Our professional writers can rewrite it and get you a unique paper.

    close

    Thanks!

    Please check your inbox.

    Want us to write one just for you? We can custom edit this essay into an original, 100% plagiarism free essay.

    thanks-icon Order now
    boy

    Hi there!

    Are you interested in getting a customized paper?

    Check it out!
    Having trouble finding the perfect essay? We’ve got you covered. Hire a writer
    exit-popup-close

    Haven't found the right essay?

    Get an expert to write you the one you need!

    exit-popup-print

    Professional writers and researchers

    exit-popup-quotes

    Sources and citation are provided

    exit-popup-clock

    3 hour delivery

    exit-popup-persone