close
test_template

Current and Future Trends of Information System Infrastructure

About this sample

About this sample

close

Words: 638 |

Page: 1|

4 min read

Published: Sep 19, 2019

Words: 638|Page: 1|4 min read

Published: Sep 19, 2019

One of the main advantages offered is technology mobility because it allows access to the employees to the organization data, wherever they are and the service flexibility enables business development without the appeal to additional infrastructure (Whitton, 2011).

'Why Violent Video Games Shouldn't Be Banned'?

What this technology promises is related with design and implementation of applications infrastructure solutions that are more efficient and cheaper. Still, the main challenges of these applications remain the used platform, which is an unsecure environment: the Internet. Issues like data availability, environment security, performance unpredictability and supplier dependency characterize the Cloud Computing technology.

When talking about data security and confidentiality, there are a lot of disputes and suspicions. Cloud computing implementation in company activity has as main hindrances supplier or middle-man dependency (Internet connection) and the lack of security for the data that are stored in the Cloud, as a service undertaken without the use of physical components.

The companies hesitation is justified when considering that confidential company info are collected, stored and maybe processes by third-party companies, which can be connected to other people contracted which may or may not be interested in these data (ENISA, 2009). Data location can also be a problem considering data confidentiality laws which restricts data access and circulation over borders for certain data categories. These types of restrictions must be taken into consideration given the fact that suppliers are not so clear when referring to data location or supplying some guaranties that these restrictions are complied.

Data protection is nowadays a weak point for Cloud Computing. The technology is still young and thus data safety can’t be guaranteed in cloud. Data protection refers to controls and control mean visibility. The main disadvantage of this technology is that the organization can’t control what it can’t see. Data integrity and confidentiality refers to the reading and modification of data only by authorized personnel. The server location is unknown as well as the data transfer network. Also there is no guarantee that the supplier will react dynamically to the company’s demands and expectations (ISACA, 2009).

Because the network and server are in charge of data for thousands of clients there is a risk, because of a wrong authentication, for those data to be accessed by the service supplier personnel or even by somebody from another organization. Still, data lost risk is not specific to this technology, but you can find it even when using your own hard drives, given the fact that these are “rudimentary” computer components, that can break at any time leading to data loss (Fitz-Gerald, 2010).

Despite that it’s fair to say that the data of a lot of companies, especially SMBs are a lot more exposed to risk in their own organizational environment rather than in a well-structured and secure Cloud.

Another unsecure territory is the relationship between supplier and company. The loss or theft of information is a sensible aspect, but the fall of the provided service also means loss of business. Using well known suppliers like IBM, Google or Salesforce.com, that have sufficient means of maintaining online security, puts some of the enterprises worries concerning information vulnerability to ease.

The main solutions for the elimination of protection risks and data security are the careful pick of the supplier, the negotiation of an advantageous and well defined contract, a tight collaboration between the two business partners in order to prevent the loss of control (Cambell, 2010).

The Cloud Computing suppliers offer must ensure data security through: supplying access, data and information usage control, protecting the applications against fraudulent usage, error prevention protection, service availability through the reduction of network components (server, network, terminal), information concerning physical infrastructure security and perpetual improvement.

Get a custom paper now from our expert writers.

There is talk about a new business era considering informational technology, the accelerate motion of the globalization phenomenon and the world crisis. For SMBs using this solution is a real advantage because it ensures access to a complex infrastructure.

Image of Alex Wood
This essay was reviewed by
Alex Wood

Cite this Essay

Current and Future Trends of Information System Infrastructure. (2019, August 27). GradesFixer. Retrieved March 29, 2024, from https://gradesfixer.com/free-essay-examples/current-and-future-trends-of-information-system-infrastructure/
“Current and Future Trends of Information System Infrastructure.” GradesFixer, 27 Aug. 2019, gradesfixer.com/free-essay-examples/current-and-future-trends-of-information-system-infrastructure/
Current and Future Trends of Information System Infrastructure. [online]. Available at: <https://gradesfixer.com/free-essay-examples/current-and-future-trends-of-information-system-infrastructure/> [Accessed 29 Mar. 2024].
Current and Future Trends of Information System Infrastructure [Internet]. GradesFixer. 2019 Aug 27 [cited 2024 Mar 29]. Available from: https://gradesfixer.com/free-essay-examples/current-and-future-trends-of-information-system-infrastructure/
copy
Keep in mind: This sample was shared by another student.
  • 450+ experts on 30 subjects ready to help
  • Custom essay delivered in as few as 3 hours
Write my essay

Still can’t find what you need?

Browse our vast selection of original essay samples, each expertly formatted and styled

close

Where do you want us to send this sample?

    By clicking “Continue”, you agree to our terms of service and privacy policy.

    close

    Be careful. This essay is not unique

    This essay was donated by a student and is likely to have been used and submitted before

    Download this Sample

    Free samples may contain mistakes and not unique parts

    close

    Sorry, we could not paraphrase this essay. Our professional writers can rewrite it and get you a unique paper.

    close

    Thanks!

    Please check your inbox.

    We can write you a custom essay that will follow your exact instructions and meet the deadlines. Let's fix your grades together!

    clock-banner-side

    Get Your
    Personalized Essay in 3 Hours or Less!

    exit-popup-close
    We can help you get a better grade and deliver your task on time!
    • Instructions Followed To The Letter
    • Deadlines Met At Every Stage
    • Unique And Plagiarism Free
    Order your paper now