This essay has been submitted by a student. This is not an example of the work written by professional essay writers.

Current and Future Trends of Information System Infrastructure

downloadDownload printPrint

Remember! This is just a sample.

You can get your custom paper by one of our expert writers.

Get custom essay

121 writers online

Current and Future Trends of Information System Infrastructure essay
Download PDF

One of the main advantages offered is technology mobility because it allows access to the employees to the organization data, wherever they are and the service flexibility enables business development without the appeal to additional infrastructure (Whitton, 2011).

What this technology promises is related with design and implementation of applications infrastructure solutions that are more efficient and cheaper. Still, the main challenges of these applications remain the used platform, which is an unsecure environment: the Internet. Issues like data availability, environment security, performance unpredictability and supplier dependency characterize the Cloud Computing technology.

When talking about data security and confidentiality, there are a lot of disputes and suspicions. Cloud computing implementation in company activity has as main hindrances supplier or middle-man dependency (Internet connection) and the lack of security for the data that are stored in the Cloud, as a service undertaken without the use of physical components.

The companies hesitation is justified when considering that confidential company info are collected, stored and maybe processes by third-party companies, which can be connected to other people contracted which may or may not be interested in these data (ENISA, 2009). Data location can also be a problem considering data confidentiality laws which restricts data access and circulation over borders for certain data categories. These types of restrictions must be taken into consideration given the fact that suppliers are not so clear when referring to data location or supplying some guaranties that these restrictions are complied.

Data protection is nowadays a weak point for Cloud Computing. The technology is still young and thus data safety can’t be guaranteed in cloud. Data protection refers to controls and control mean visibility. The main disadvantage of this technology is that the organization can’t control what it can’t see. Data integrity and confidentiality refers to the reading and modification of data only by authorized personnel. The server location is unknown as well as the data transfer network. Also there is no guarantee that the supplier will react dynamically to the company’s demands and expectations (ISACA, 2009).

Because the network and server are in charge of data for thousands of clients there is a risk, because of a wrong authentication, for those data to be accessed by the service supplier personnel or even by somebody from another organization. Still, data lost risk is not specific to this technology, but you can find it even when using your own hard drives, given the fact that these are “rudimentary” computer components, that can break at any time leading to data loss (Fitz-Gerald, 2010).

Despite that it’s fair to say that the data of a lot of companies, especially SMBs are a lot more exposed to risk in their own organizational environment rather than in a well-structured and secure Cloud.

Another unsecure territory is the relationship between supplier and company. The loss or theft of information is a sensible aspect, but the fall of the provided service also means loss of business. Using well known suppliers like IBM, Google or, that have sufficient means of maintaining online security, puts some of the enterprises worries concerning information vulnerability to ease.

The main solutions for the elimination of protection risks and data security are the careful pick of the supplier, the negotiation of an advantageous and well defined contract, a tight collaboration between the two business partners in order to prevent the loss of control (Cambell, 2010).

The Cloud Computing suppliers offer must ensure data security through: supplying access, data and information usage control, protecting the applications against fraudulent usage, error prevention protection, service availability through the reduction of network components (server, network, terminal), information concerning physical infrastructure security and perpetual improvement.

There is talk about a new business era considering informational technology, the accelerate motion of the globalization phenomenon and the world crisis. For SMBs using this solution is a real advantage because it ensures access to a complex infrastructure.

Remember: This is just a sample from a fellow student.

Your time is important. Let us write you an essay from scratch

experts 450+ experts on 30 subjects ready to help you just now

delivery Starting from 3 hours delivery

Find Free Essays

We provide you with original essay samples, perfect formatting and styling

Cite this Essay

To export a reference to this article please select a referencing style below:

Current and Future Trends of Information System Infrastructure. (2019, August 27). GradesFixer. Retrieved August 11, 2022, from
“Current and Future Trends of Information System Infrastructure.” GradesFixer, 27 Aug. 2019,
Current and Future Trends of Information System Infrastructure. [online]. Available at: <> [Accessed 11 Aug. 2022].
Current and Future Trends of Information System Infrastructure [Internet]. GradesFixer. 2019 Aug 27 [cited 2022 Aug 11]. Available from:
copy to clipboard

Where do you want us to send this sample?

    By clicking “Continue”, you agree to our terms of service and privacy policy.


    Be careful. This essay is not unique

    This essay was donated by a student and is likely to have been used and submitted before

    Download this Sample

    Free samples may contain mistakes and not unique parts


    Sorry, we could not paraphrase this essay. Our professional writers can rewrite it and get you a unique paper.



    Please check your inbox.

    We can write you a custom essay that will follow your exact instructions and meet the deadlines. Let's fix your grades together!


    Hi there!

    Are you interested in getting a customized paper?

    Check it out!
    Don't use plagiarized sources. Get your custom essay. Get custom paper

    Haven't found the right essay?

    Get an expert to write you the one you need!


    Professional writers and researchers


    Sources and citation are provided


    3 hour delivery