Reference no: EM131639393 , Length: word count:300
Write review on this article with three references that includes bible, book listed below and other reference. book:- Richardson, T., & Thies, C. (2013).
Secure software design (2nd ed.). Burlington, MA: Jones & Bartlett Learning. ISBN: 9781449626327.
Cloud Computing is a fairly new method used by big organizations as well as the individual user. Technology continues to evolve based on the both ease of use for the consumer and specifications of the device.
Because of the consumer's need for comfortability and ease of use electronic devices have continued to become smaller and updated. A laptop for example, came standard with a standard size hard drive and CD ROM drive, but now the tablet is standardized to come with limited storage and no CD ROM drive.
The amount of storage that is needed by the consumer has not changed, so in an effort to provide portability at no cost to the capabilities of the device a cloud is used to store files across Internet on a server that is not physically located with the consumer. Cloud computing is normally managed by a third party that can sometimes charge the organization a set cost for their services.
If the cloud computing services are publically managed, however they are free to the user and may only require credentials to access the data. Cloud computing security can be used to protect the data as it travels through the network, secure and educate the end user, or security could be used to focus on the facility that stores the cloud computing server.
If I had to focus my security towards one service I would focus on the services as they pass through the network. Jeremiah 46:27 states, "But you, my servant Jacob, do not be afraid, and do not be discouraged, Israel, for without fail I will save you from far away and your descendants, from the land of their captivity!
Jacob will return and have calm and quiet with no one to frighten him." When using cloud computing security must be implement in depth no matter of the location of the servers.
The Lord declared punishment of the false Gods of Israel, but assured Jacob that he and his descendants would be safe and secure from all harm.
Holy Bible, red-letter edition: Holman Christian Standard Bible. (2004). Nashville: HolmanBible. Lewis, G. A. (2017). Cloud computing. Computer, 50(5), 8-9. doi:10.1109/MC.2017.141 Richard,T., & Thies, C.N. (2013). Secure software design. Burlington, Mass: Jones & Bartlett Learning Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation Computer Systems, 28(3), 583-592. doi:10.1016/j.future.2010.12.006
What would be the probability of getting given numbers
: If all 10 possible digits had the same probability, what would be the probability of getting a 1, 2, or 3?
|
What is the total rate of return on the bond
: Find the bond's price today and six months from now after the next coupon is paid. What is the total rate of return on the bond?
|
Analyze three health care practices that create conflicts
: Analyze three health care practices that create conflicts of interest for stakeholders involved (e.g., physician who receive samples from drug representatives).
|
Depreciation expense for fina furniture corp
: The firm's tax rate is 30 percent. What is the depreciation expense for Fina's Furniture Corp.?
|
Write review on article - secure software design
: Write review on this article with three references that includes bible, book listed below and other reference. book:- Richardson, T., & Thies, C.
|
Determine the amount of net income or loss
: Determine the amount of net income or loss Deen reported on its 2017 income statement. (Hint: Remember that stock issues, net income, and dividends)
|
How would you respond to mccloskeys question
: McCloskey specifically discusses the free will argument, asking "might not God have very easily so have arranged. How would you respond to McCloskey's question?
|
Implement in actual application
: Which one would be the easiest to implement in actual application? The most difficult.
|
What is the probability that the needle crosses a line
: What is the probability that the needle crosses a line? You can find both a solution by mathematics and a simulation at George Reese's site.
|