Cloud assignment on CSP, computer science homework

User Generated

1994_

Computer Science

Description

This week you are researching and writing on data protection within CSPs. 

Using the four CSPs you used for the week 3 Assignment, conduct additional research on information they provide to prospective customers on data security. Specifically look for protection while data is at rest (stored), while data is being processed, and while data is in transit. If you find that the original concerns still exist, provide an opinion on why there has been no change. If you find the concerns have been addressed, what contributed to the change?  Also research and discuss encryption used by the CSP.  What type do they use? 
Lastly, include steps for confirming their data protection practices. 

Your assignment should be in a Word compatible document with proper attention to spelling, punctuation, and grammar. All references and citations must be in APA or MLA format. You should be included a list of references at the end in addition to citing information taken from those references. 

Attach the document to this assignment link. This assignment should be a minimum of two pages in length and is due at the end of the academic week. It is worth 50 points, and a good discussion of the topic will get full credit. Any misspellings or grammar issues will result in deductions from the total score. This assignment's score will appear in the online grade book following the end academic week.




note : Please find the ttached file of week assignment and look at those CSP and answer this assignmnet , please no plagarism and need original content ...with APA format adn citations

week_3__assignment__21074952.docx

Unformatted Attachment Preview

1 RUNNING HEAD: CLOUD COMPUTING PROVIDERS. Service providers are portfolios that offer customer software storage and services via a private cloud or network accessed via the internet. The four companies discussed in this section will be Zoho, Carbonite, Dimension Data and LogMeIn. The difference in functionality, cost, and security of the Cloud Services Providers are as follows; Cost Zoho currently provides a 15-day free trial to all new clients who feel like subscribing to their services. The pricing of their services comes in three packages depending on the size and demands of the organization of the clients. The standard package cost $12 per user in a month, the professional one goes for $20 per in a month, and finally the enterprise package goes for $35 per user in a month (www.zoho.com/crm/zohocrm-pricing.html). Carbonite provides backup services at a cost of $ 59.99 per annum. This package comes with unlimited storage potential hence the client does not have to worry about the size of data of the organization. The Plus upgrade option cost $99.99 since it allows the backup of external drives. The last plan it provides is the Prime plan that costs $149 and provides automatic video backup (http://www.pcmag.com/article2/0, 2817, 2371307, 00.asp). Dimension Data charges their clients according to the CPU/RAM hours or whether the storage is of standard or high quality. For instance, CPU cost $0.34 per hour while the Ram hours cost 0.2125 per hour. A standard storage will cost 0.0003 per hour while a high storage will cost 0.0006 per hour (http://cloud.dimensiondata.com/am/en/about/why-dimension-data). LogMeIn was providing free remote services until the 28th January 2014 when it enrolled out a $ 49 per year package for two computers. The new package provides premium features 2 RUNNING HEAD: CLOUD COMPUTING PROVIDERS. including remote printing, transfer of files and cloud data access (http://www.alphr.com/blogs/2014/01/21/free-alternatives-to-logmein). Functionality Zoho provides the easy navigation of data records through its two navigational options, the page-level, and record-level navigation. Zoho also provides the search options of records as per alphabet, information or criteria. One can also create and import records using Zoho. Carbonite Personal Backup provides automatic cloud backups for files and photos. Once installed in the home or office personal computer, it will automatically backup all data available including pictures to the cloud. Also newly introduced files will automatically be back-upped too. Carbonite also provides quick recovery of files and hardware restore from bare metal. Dimension Data advise its clients on cloud preparedness and the structure of the technology. It also provides integration services in private, public and hybrid services. Through compute-as-a-Service (CaaS) services such as virtual servers and tiered storage are provided. Dimensions also provide patch management, device configuration and backup of data. LogMeIn has a remote access and administration software to its clients. It also provides network virtualization and VPN services. Also, the clients get access to remote back-up services. Through the medium package, the client uses the cloud identity, access manager and the team password manager. Security Zoho has formulated some practices, technologies, and policies for the security purposes of the client’s data services. It has grouped the measures into four categories namely physical 3 RUNNING HEAD: CLOUD COMPUTING PROVIDERS. security and network security. The data centers are located in the most secure facilities that cannot be affected by natural disasters such as fires, earthquakes, and floods. The data centers are guided by private guards all the time. Video cameras keep watch of the facilities all the time. Network security is highly valued by Zoho. The network security team and infrastructure employed help the organization fight against any sophisticated electronic attack. All data communication to Zoho is encrypted to ensure secure communication. To prevent unauthorized access, all users are controlled and audited. Since viruses cause loss and damage to data, all traffic coming from the service provider are automatically scanned. Carbonite uses effective encryption that keeps safe personal files from theft. All clients’ data are encrypted once again and protected from damage by virus attack. Carbonite also has its data centers that are guided by security officers. To ensure further data storage security, power generators are put in place so that no power blackouts are experienced at any given moment. Dimension Data secure their data centers by ensuring that they conform to the Tier 3 standards that are the highest rating available. It allows cloud hosting security through the provision of an environment that configures and lock-down the storage of data. The clients have a controlled network configuration services. Dimension also stays in compliance with to the SAS -70 audit controls which is based documented controls. LogMeIn uses 256-bit encryption for all communication of its services to ensure security. Regardless of the type of connection that is considered by a company, the above encryption must be used for all clients. Any company considering securing its data in cloud computing companies should ensure that the firm highly takes into consideration all the security measures that ensure the safety of 4 RUNNING HEAD: CLOUD COMPUTING PROVIDERS. data. This is because the main reason for adopting cloud computing is to secure the data a company feels so important to it. So that the company ensures the security of their data, the physical location of the cloud computing providers should be within the locality of the company. For instance, it should be within the state or country in which the firm is located or carries out its operations. The second feature to consider is the cost of the company to provide cloud computing. It would not be profitable for the data to be stored at high cost while there equivalent or even better option in the market. The company would, therefore, look for a cheaper company as long as it provides quality services. 5 RUNNING HEAD: CLOUD COMPUTING PROVIDERS. References • Kaufman, L. M. (14 February, 2009). Data security in the world of cloud computing. Security & Privacy, IEEE, .Retrieved from http://www.dx.doi.com • Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., & Ghalsasi, A. (11 June, 2011). Cloud computing—The business perspective. Decision Support Systems, .Retrieved from http://www.dx.doi.com • Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of network and computer applications. Retrieved from http://www.dx.doi.com
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer


Anonymous
Great study resource, helped me a lot.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags