Discussion paper

User Generated

ivxxl5559

Computer Science

university of cummberlands

Description

In 500 – 600 words, and using the Jamsa (2013) textbook as your ONLY source:

List three (3) advantages and three (3) disadvantages cloud based providers have with respect to security. Then, in YOUR OWN words, and from an IT security manager's perspective, explain how each advantage can help your business succeed and how each disadvantage can hurt business operation.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: IMPLICATIONS OF CLOUD SYSTEMS BASED ON SECURITY

Implications of Cloud Systems Based on Security.
Name
Institution

1

2

IMPLICATIONS OF CLOUD-BASED SYSTEMS BASED ON SECURITY.
Cloud-based systems are services, applications, and applications available to users
upon request through the internet from cloud computing servers. Companies employ the use
of these servers since they are work efficient. However, employing the use of these servers
has its advantages and disadvantages.
Advantages


Auto-replication of files and data



Enhanced security of the systems.



Data encryption.
Disadvantages



Extra costs involved



Presence of malicious insiders.



Loss of control.

Cloud-based providers aim at improving the system's performance in general. Cloud
computing systems allow automatic replication of any data saved in the system. The autoreplication prevents data loss in case a file is damaged or compromised in any way. When
data is keyed in and kept in the company's computers or any data storage device with access
to the server, the data is automatically backed up, which also provides safe storage. Data
replication enables the company to have all its essential documents, which help in decision
making processes and preparation of business financial statements.
Cloud-based systems are more secure compared to other system servers. The data of
the firm is stored in a database or cloud-based disk storage, which is secured with
authentication procedures. To access the server and company’s data, one requires to go
through a verification/ authentication procedure such as name, password, ID, or fingerprint

3

IMPLICATIONS OF CLOUD-BASED SYSTEMS BASE...


Anonymous
Just the thing I needed, saved me a lot of time.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags