Tuesday, May 14, 2019

Case Study - Emerging Technologies Example | Topics and Well Written Essays - 750 words

- Emerging Technologies - berth Study ExampleTraditionally, haze over computing allows applications and data that are supported and or support operational systems are commonly installed and stored in a computing environment where they can be referenced with blue degree of ease. Therefore, according to Choo, cloud computing allows individuals and businesses to share data and computer applications without necessarily requiring physical machines thereby increasing the efficiency and ease of additioning such data and applications (Choo, 2010). Nonetheless, the use of data and compute applications within a given cloud usually requires restrictions since if there are no such restrictions, data and applications stored in such clouds may be abused or missed used. Hence, cloud computing can only be used effectively and efficiently in a corporate world or with the paper with said(prenominal) interest of data and computer applications. According to Choo and as it is a fact, the applica tion of cloud computing has increase among private and public institutions thus, posing great risk to the security of applications and data stored in the cloud. Some of the risks associated with the cloud computing includes attacks that usually targets shared cloud environments. It should be noted that a virtual(prenominal) machine that runs its testify applications and has operations systems just like physical machine (Choo, 2010). Choo notes that virtual machine may oblige a series of operating systems with which storing operation and or data from specific clients. Despite the requirement that each virtual machine should never know the component of the other, some computer data criminals have developed ship canal to determine components of virtual machines that they are never assigned to or they have never stored their information. These natures of event have put the data and operation systems within cloud computer to be vulnerable to alteration and gene linkage among other cybe r insecurities. Additionally, it has been noted that cloud computing id also vulnerable to installing of backdoor botnet hosting. This state of events usually allows installation of malicious codes on the virtual machine without the knowledge of the owner (Choo, 2010). Notably, such actions lead to illegal access of other persons information or data thereby increasing cyber crime. Therefore, according to Choo, which is a fact, the cybercriminals are usually potential abusers of cloud computing services. Their access to the systems usually links the real owners private among other personalized information to the public and to the wrong persons. Moreover, to some extent, the criminals distributed denial of- services sometimes deny the legitimate owners from accessing their data. In terms of national security, it has been noted that virtualized infrastructures can be used as avenues of launching new attacks particularly through the use of password guess. In other words, guessing is q uite dangerous for security systems at that are automated based on authentication. It is vital to note that virtual computing is quite deathly to businesses and persons who store their data or information to could software especially in cases of natural disaster (Choo, 2010). Wiping of the built-in cloud due to a natural disaster will translate to lose of data, information, or applications that were stored in such clouds, and according to Choo, such a scenario will lead to discontinuity of business that entrusted their data in such affected clouds (Choo, 2010). Despite the anticipated advantages of

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.