How security and integrity of their data can be maintained

Assignment Help Computer Engineering
Reference no: EM13325083

Students are required to write an academic report as per the format outlined in chapter 5 of the textbook. The report must follow Harvard citation and referencing guidelines.Please note that the prescribed textbook uses APA referencing guidelines. See also the Referencing Style subsection below.

The report is to be based on the following scenario about security and privacy in cloud computing.

Recently increased use of mobile devices and the growth of the Internet in current business practices have led to the provision of Cloud Computing which relies on sharing computing resources rather than having local servers or personal devices handle software applications.Cloud Computing can be thought of as many different computers pretending to be one computing environment. It provides the delivery of computer and storage resources as a service to end-users usingthe Internet.

There is a significant benefit to organisationsin the leverage of Cloud Computing services, not least of which is the potential for significant cost savings.But security concerns have led organisations to be wary of moving critical resources to the Cloud. Businesses and individuals are concerned about how security and integrity of their data can be maintained in this new environment. Providers of Cloud Computing argue that they have in place security benefits which they offer to their customers who choose to move their data and information systems to the Cloud.

For more information on Cloud Computing watch this video entitled "Cloud Computing in Plain English":

https://www.youtube.com/watch?v=txvGNDnKNWw

You are the ICT manager of a large organisation (1000 employees) based in Melbourne. Your supervisor has asked you to research Cloud Computing and write a report to be presented at the next executive meeting. You are required to prepare a report that explores:

1. The advantages and disadvantages to an organisation of using Cloud Computing, for example, the potential to reducecosts, the risk of making the organisation's data more vulnerable to hacking.

2. The security implications for staff and customers of the organisation.

3. The opportunities to grow the business using Cloud Computing.

Your report should include recommendations that provide guidelines for the organisation with respect to implementing Cloud Computing practices.

Reference no: EM13325083

Questions Cloud

What is bitcoin mining : Discuss BitCoin. What are they? Who made them? How long have they been around? What is BitCoin Mining? In your opinion, will BitCoins stick around? Why or Why Not?
Problem on crawler program : Which parts of the assignment were you not able to complete fully? For each, explain why you were unable to complete this part and what steps you took to attempt to complete it. Give me as much detail as possible such that I may award partial cred..
In what direction should the plane head : An airplane whose air speed is 628km/h is supposed to fly in a straight path 33.0? north of east. But a steady 88km/h wind is blowing from the north. In what direction should the plane head
What is the final temperature of the drink : A 25 g glass tumbler contains 370 mL of water at 24°C. If two 11 g ice cubes each at a temperature of -3°C are dropped into the tumbler, what is the final temperature of the drink
How security and integrity of their data can be maintained : The advantages and disadvantages to an organisation of using Cloud Computing, for example, the potential to reducecosts, the risk of making the organisation's data more vulnerable to hacking.
How long did it take the first stone to reach the ground : A stone is dropped from the roof of a building; 1.90s after that, a second stone is thrown straight down with an initial speed of 25.0m/s , How long did it take the first stone to reach the ground
What is the greats height reached by the ball : A ball is launched directly upward from the ground level with an initial speed 24 m/s. What is the greats height reached by the ball
State solution that has a concentration of hydrochloric acid : 1. Find the pH of a solution that has a concentration of hydrochloric acid equal to 0.001 M. 2. Find the normal pH of rainfall (not acid rain). Would a rain sample with a pH of 5.0 be considered "acid rain"
Describe an experience that you had working on a team : Describe an experience that you had working on a team. As part of your response discuss how the team was evaluated.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd