Research writing with 1500 words about cloud computing, consistent, original

User Generated

nyrk3191

Computer Science

Description

In examining cloud technology, or any technology for that matter, security of the data is an important consideration. In this assignment, explore methods of managing cloud architecture and ensuring data security. Investigate attacks on the cloud and ways data can be compromised, including the following:

- Apply tools to troubleshoot network problems

- Use implementation, management, and maintenance skills in network configuration

- Discuss emerging topics in network operation and administration - Research security in cloud computing and explain the security concerns regarding cloud computing.

- List and describe at least 2 ways a data attack on the cloud can occur.

- What networking tools can you use to ameliorate data attacks on cloud data?

- What tools would you use to troubleshoot problems when configuration is an issue?

- Choose and investigate one tool used to administer data in the cloud, take a screenshot of the tool, and embed the picture in your document. Provide a detailed analysis of the tool and how it is used.

- Give a recommendation on whether companies should use or not use the cloud, based on the security, the management, or any barrier found in using cloud technology.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Please, Let me know in case of anything

Running Head: CLOUD COMPUTING

1

Cloud Computing

Name
Institutional Affiliation

CLOUD COMPUTING

2

Cloud Computing
During the examination of any technology mechanism to be implemented in any
organization, several considerations have to be put in place. One of the essential consideration is
the security of organization’s data and information. Cloud computing involves the application of
networked remote servers hosted over the internet to process, store, and manage organization’s
data other than using local servers situated within the organization. The adoption of the
technological technique is dependent on the data security and architectural management of the
cloud and data. Effective security measures ought to be put in place to ensure organization’s data
is protected from malicious access and misuse. The paper seeks to illustrate the attacks that can
occur on the cloud, ways of ensuring data security as well as management of cloud architecture
to suit an organization’s needs.
Security concerns
Though cloud computing is ushering a new technique of managing, storing and
processing data, there are a lot of concerns regarding its security. Many companies are hesitant to
embrace it due to the concerns. The concerns include:
Data breaching
Breaching of data is one of the possesses a great threat to the security of data due to the
vast amount of data being stored on cloud servers thus becoming appealing targets to hackers.
The severity of damage caused by data breaching is dependent on the sensitivity of the exposed
data (Rashid, 2016). Breaches of data such as financial information, intellectual properties, trade
contracts and treaties, health information, and personal information might have a devastating
effect on the affected parties (Chao, 2013). Though cloud providers deploy security measures to
the data they handle, each organization is responsible for securing their data in the cloud.

CLOUD COMPUTING

3

Broken authentication and Compromised credentials
Broken authentication and compromise of credentials occur due to ineffective password
and credential management techniques within the organization. Unauthorized access of data
occurs due to lack of authentication, poor certificate or key management, and weak passwords.
Besides, attackers possess the ability to use ...

Related Tags