What you should know before moving to the cloud

Assignment Help Software Engineering
Reference no: EM131480010

Write reply to this post.

Cloud computing is quickly becoming a new and emerging way for companies to operate. By conducting their business on the cloud, business owners have flexibility to provide services to a large group of customers without the concern for regulating bandwidth, storage congestion, or large volume equipment expenses. All these advantages, with several other pros, translates to a bottom line of cost savings for the business. In a web article for Lifewire magazine, Priya Viswanaathan confirms this fact stating, Cloud computing is probably the most cost efficient method to use, maintain and upgrade (Viswanaathan, 2017).

It is for these reasons I believe Cloud computing is the next big focus for business's Chief Information Officers Although there are many advantages to cloud computing, there are likewise disadvantages that should be weighed in the decision to use this service. Security attacks are on the rise in this emerging technology and over the past year there has been several high profile attacks which by attacking one cloud service provider, thousands of businesses transactions were critically interrupted[1].

Posted in their Internet Security Threat Report, one key finding stated by anti-virus giant Symantec concluded, widespread adoption of cloud applications in corporations, coupled with risky user behavior that the corporation may not even be aware of, is widening the scope for cloud-based attacks (Symantec, 2017). Denial of Service, Ransomware, cyber fraud and identity theft either by data breeches or risky behavior of employees, are all on the rise through attacks on the cloud.

User Behavior Analysis (UBA) is critical to identifying risky users and identifying and preventing exploits such as data exfiltration, data destruction, and account compromise. (Symantec, 2017). Education of company policies and training in the proper use for employees is one way to assist the security process. In a concluding statement on the advantages and disadvantages of cloud computing, contributing authors were in agreement saying We conclude that while Cloud computing technology can prove to be a great asset to companies, it could also cause harm if not understood and used properly (Fujita, H., Tuba, M., & Sasaki, J., 2013).

Reference Viswanathan, P. (2017). What You Should Know Before Moving to the Cloud. Retrieved April 26, 2017, Fujita, H., Tuba, M., & Sasaki, J. (2013).

Recent advances in applied computer science and digital services: proceedings of the 13th international conference on applied computer science (ACS '13), proceedings of the 2nd international conference on digital services, internet and applications (DSIA '13): Morioka City, Iwate, Japan, April 23-25, 2013. Greece: WSEAS Press. Symantec: Internet Security Threat Report (ISTR), Volume 22. (2017, April). The Cloud is a Dangerous Place

Verified Expert

The Seven Areas of Responsibility contain a comprehensive set of Competencies and Sub-competencies defining the role of the health education specialist. These Responsibilities were verified by the 2015 Health Education Specialist Practice Analysis (HESPA) project and serve as the basis of the CHES exam beginning in October 2016

Reference no: EM131480010

Questions Cloud

Write an abstract of this case : Aviation Law Case: The Comair Flight 5191 crash in Lexington.Write an abstract of this case with references.
Macroeconomic benefits of a balanced budget : What are the macroeconomic benefits of a balanced budget?
Part of the financial plan for a startup is consideration : Part of the financial plan for a startup is consideration of sources of funding. Do you agree or disagree with the arguments? Why?
What is a currency board : What is a currency board? Describe the strict rules about the composition of reserves and domestic credit that apply to this type of monetary arrangement.
What you should know before moving to the cloud : Write reply to this post -  identifying risky users and identifying and preventing exploits such as data exfiltration,
Should terrorists have legal protection : Explain whether or not the government should extend the same civil rights to terrorism suspects that American citizens enjoy.
What if the future deficits are anticipated : Suppose that a country's money supply is $1,200 million and its domestic credit is equal to $800 million in the year 2005. The country maintains a fixed.
Government should be concerned : Why do think the U.S. government should be concerned? Should the government be equally concerned, if it were a surplus?
Handful of powerful men controlled commerce : Antitrust laws were enacted at a time when it seems that a handful of powerful men controlled commerce.

Reviews

inf1480010

5/19/2017 5:13:20 AM

You have an everlasting client in me. I'd like to utilize you for future solicitations. In case you're a rehash client, would you say you are permitted to ask for the same author? Respects.

Write a Review

Software Engineering Questions & Answers

  Research report on software design

Write a Research Report on software design and answer diffrent type of questions related to design. Report contain diffrent basic questions related to software design.

  A case study in c to java conversion and extensibility

A Case Study in C to Java Conversion and Extensibility

  Create a structural model

Structural modeling is a different view of the same system that you analyzed from a functional perspective. This model shows how data is organized within the system.

  Write an report on a significant software security

Write an report on a significant software security

  Development of a small software system

Analysis, design and development of a small software system.

  Systems analysis and design requirements

Systems Analysis and Design requirements

  Create a complete limited entry decision table

Create a complete limited entry decision table

  Explain flow boundaries map

Explain flow boundaries map the dfd into a software architecture using transform mapping.

  Frame diagrams

Prepare a frame diagram for the software systems.

  Identified systems and elements of the sap system

Identify computing devices, which could be used to support Your Improved Process

  Design a wireframe prototype

Design a wireframe prototype to meet the needs of the personas and requirements.

  Explain the characteristics of visual studio 2005

Explain the characteristics of Visual Studio 2005.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd