Wednesday, May 6, 2020
Essay on Cloud Computing Physical System
Question: Describe about the Essay on Cloud Computing for Physical System. Answer: Introduction: A very new trend in the IT is the Cloud Computing. Cloud Computing is basically a technology that is used for assessment of various services over the internet. The people are free to access their files from anywhere with the help of cloud computing. A very important impact has been made by the cloud computing on the ways by which the applications are run and stored. The collaborations of the teams have been become more easy with the help of cloud computing. These are basically the data and the applications that can be accessed through various servers around the world that are known as clouds and that can be reached at any time. 1: The cloud computing has impacted the businesses to a large extent since the last few decades by making it easier for the corporate to access their files anywhere and anytime. The virtualization is taken one step ahead by the help of the cloud computing. The cloud computing makes it easy to run multiple operating systems on a single physical system. The corporate and the personal world have changed a lot with the help of the cloud computing. 2: The largest impact of the cloud computing is on the IT infrastructure. It is very difficult and costly to maintain a traditional IT environment as it requires buying various servers and hardware, implementation of the infrastructure and installation of the software. The cloud computing is beginning to make serious inroads in to changing the ways in which the internet IT shops operate. The significant changes in the IT landscape are the players. During the initial years cloud computing was referred to as data centre housing that had a direct connection with the customer but now there is high speed internet based VPN and much improvements in the hosting technologies that has led to dramatic cost reduction across the board. (C, 2016)The landscape offering the cloud computing services are not limited to the IBM, EDS Perot, CSC and ACS. There are several other players who are offering the cloud computing services that include the Google, Amazon etc. 3: Though cloud computing has proven out to be very advantageous for the business but it is not free from the risks and the threats. Some of the threats and the risks associated with the cloud computing are: Session Riding: Under this an attacker steals the cookies of the user to use the application in the name of the user. The attacker can achieve various things by sending different requests to the user. Virtual machine escape: There are various virtual machines run on the physical server in the virtualized environment. The hyper vision can be attacked by the attacker remotely by the use of vulnerability that is present in the hypervisor.(Lukan, 2014) Availability and reliability of service: it is expected that the cloud services are always available when the user needs them but this is not the case always especially in the bad weather when there is lot of lightning. The CSPs have uninterrupted power supplies. Data protection and portability: the problems of data movement and deletion needs to be dealt with while moving and choosing for the cloud computing. The old CSP deletes all the data that is stored in the data centre so that data is not left lying afterwards.(Potey, 2013) 4: The risks that are associated with the cloud services are less severe but are very much damaging. These risks can be minimized by the following ways: 5: Implementing the critical projections that include the prohibition of sharing the account credentials between the users no matter how trusted the business partner is. The user shall perform effective due diligence when researching for the cloud service provider. The security history of the CSP shall be reviewed well in advance by the user. There shall be the utilization of the single sign on in an organization. The user shall work in the conjunction with the expert so that the cloud security is assured on regular basis; the expert shall be either the consultant of the business or can perform the third party audits.(Parms, 2016) There shall be implementation of the end to end encryption. It shall be made ensured that the solutions are available for the encrypted data in transit.(Calyptix, 2016) The systems that are being used shall be up to date and there shall be in-house applications. The job of the CSP is impossible if it has to support out dated software with the known security risks. Conclusion: This includes answer 6, 7 and 8 The cloud computing has been becoming popular increasingly. There are various industry leaders like Google, Microsoft and IBM that are in continuous promotion of the cloud computing and have gained a lot of customers. Still there are many people who are researching about the cloud computing and feeling unease to migrate themselves to cloud computing. (Bernard, 2009)There are many benefits associated with the migration towards the cloud computing if there is caution and open eyes at the disposal of the user. The user is bound to pay attention to the paid measures that can be undertaken so that the malicious attacks can be prevented at the various stages that includes the networking, transmission, application security, storage and the user access. But the fact is that there are risks associated in the IT sector weather the user manages the IT in house or remotely. Though it has been proved that the cloud computing is very advantageous for the businesses in the coming future due to its fast and reliable applications. If various measures are taken by the users beforehand than the cloud computing can prove out to be a blessing for an organization.(Forrester., 2008) Bibliography Bernard, G. (2009). Cloud Computing: What Clayton Christensen Can Teach Us. Retrieved October 6, 2016, from https://www.cio.com/article/476362/Cloud_Computing_What_Clayton_Christensen_Can_Teach_Us C, M. (2016). Cloud Technologies are Changing the IT Landscape. The ServerSide . Calyptix. (2016, March 17). Top 5 Risks of Cloud Computing. Calyptix Blog . Forrester. (2008). Is Cloud Computing Ready For The Enterprise? Retrieved October 6, 2016, from https://www.forrester.com/rb/Research/is_cloud_computing_ready_for_enterprise/q/id/44229/t/2. Lukan, D. (2014, November 21). The top cloud computing threats and vulnerabilities in an enterprise environment. Security, Vulnerabilities . Parms, J. (2016). How to mitigate your cloud computing risks. Potey, M. (2013). Cloud Computing Understanding Risk, Threats,. International Journal of Computer Applications , 67.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.