CU E-Commerce and Cloud Security Discussion

User Generated

xcnina

Computer Science

Campbellsville University

Description

Task1:no word limit...satisfy questions

Read the Case Study and answer the "Discussion Points" in a clear but concise way. Be sure to reference all sources cited and use APA formatting throughout.(attached case study)

Task2:words:350

Your company is experiencing decline in business because of competition. Your manager thinks they may be able to turn the company around if they can get help from an IT professional on E-Commerce and Mobile Technologies. Assume your company is a traditional retail entity similar to Sears, Macy’s or K-Mart, suggest ways your company can use E-Commerce and Mobile Technologies to increase its visibility and sales. In your discussion, explain what is E-Commerce and Mobile Technology.

Unformatted Attachment Preview

Question One: Businesses Who Have Suffered Because Of Cloud Security Weaknesses or Failure Based on an internet exploration, one of the companies that have experienced failures emanating from cloud based failures and weaknesses are Google Docs. Google Docs is a cloud based data management (storage and transfers) platform. It is used by both companies and individuals to manage both internal and external data. As a platform that serve a big portfolio of clients, day the platform experienced an extended period of blackout barring users from accessing and using the platform. Companies and individuals that depend on the platform were heavily inconvenienced for up to one hour of inaccessibility to the platform. It means some companies and individual lost some considerable amount of revenue owing to the blackout. Some of the lessons that companies seeking to rely on cloud based data management have to learn how to back out their data in alternative storage systems. They cannot solely rely on such cloud services as it is clear that they can face blackouts. Apart from the financial losses such, incidence may also taint the reputation of the companies that depend on the cloud based platforms to provide services to their customers. One on the other hand, cloud based platform providers have to be mindful of the inconveniences that they may cause to users that solely depend on such platforms. Question Two: Security Mechanisms Associated With Virtualization Based on an internet exploration security mechanisms associated with visualization are attached to the use of tools and platforms that explore and implement mental imagery. For cloud service providers the security mechanisms associated with visualization are charged with the responsibility of customer data management. For instance, today, nearly all data based solutions have a cloud system. ATMs, Debits Cards and Debit cards control customer information in various ways. The visualization offers the room to understand how cloud platforms register information. The security mechanisms associated with visualization include encryption of records, login data and credit cards. While security mechanisms associated with virtualization have continuously been putting in place the measures to safeguard subscriber information, several questions have been raised on what more can be done to strike a balance between offering service and respecting subscriber privacy. Question Three: Security Issues Associated With the Selected Cloud Service Category Internet research on cloud services categories can be equated the type of infrastructure and platform used as the host to the platform. In this case, the research was to explore the application of PaaS. Some of the major security risks associated with the PaaS include physical system insecurities, lengthy logging times and synchronization. One of the solutions to the identified problem is to encode all the data activity between the admin and the third party. It also entails encryption and verification. Some of the explanations that have been offered to safeguard subscriber’s data the disengagement of interface. Generally speaking, such questions only arise when businesses contemplating moving core transaction processing, such as ERP systems, and other mission critical applications to the cloud.
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

cloud security 2
by Plagarism On

Submission date: 24-Jun-2020 09:11PM (UTC+0530)
Submission ID: 1349091123
File name: cloud_security.docx (24.37K)
Word count: 1098
Character count: 6412

cloud security 2
ORIGINALITY REPORT

6

%

SIMILARITY INDEX

0%

0%

6%

INTERNET SOURCES

PUBLICATIONS

STUDENT PAPERS

PRIMARY SOURCES

1
2
3

4%

Submitted to West Liberty University
Student Paper

1%

Submitted to Angelo State University
Student Paper

Submitted to University of Maryland, University
College
Student Paper

Exclude quotes

Off

Exclude bibliography

On

Exclude matches

Off

1%

cloud security 2
GRADEMARK REPORT
FINAL GRADE

GENERAL COMMENTS

/0

Instructor

PAGE 1
PAGE 2
PAGE 3
PAGE 4
PAGE 5
PAGE 6
PAGE 7


Paper outline
The paper contains two sections, that is, task 1 and task 2.
Task 1
Title
Case study
The case study contains three questions which have been fully discussed in the following sections.
Section 1
The section contains examples of businesses and companies which have failed as result of cloud security
failure.
Section 2
This section outlines the mechanization involved in the development of a virtualization system.
Section 3
The section dictates the security issues associated by Paas as a cloud security system.

Task 2
Title
E-commerce and mobile technologies
Introduction
The section outlines the meaning of E-commerce implementation and mobile technology concepts
theory definitions.
The body
This section contains the methods of implementing E-commerce and mobile technologies in an
organization. The section also outlines the benefits associated with E-commerce implementation in a
company.
Conclusion
This section contains the summary of the entire document.


Running head: E-COMMERCE AND CLOUD SECURITY

E-commerce and cloud security
Student’s Name
Institutional Affiliations
Course
Date

1

E-COMMERCE AND CLOUD SECURITY
...


Anonymous
Goes above and beyond expectations!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags