Friday, May 31, 2019
Cloud Computing and the Computer Scare Essay -- Information Technology
Once you login to your computer you are bound to use an diligence that is related to the cloud computing infrastructure. For example, when any service needs an internet connection it immediately uses what is known as a cloud network, which is a free term for the use of a device or application that is not physically present. The computer user is then accessing a network in the cloud, which stores ain information and allows for multiple tasks to be completed in an efficient manner rather than just using a single personal computer. Computer Scientists do find an importance for expanding the cloud network since it not only helps them create projects using multiple computers linked on the cloud but it also helps utter applications to any computer user. Unfortunately, there are some deficiencies that computer science majors should be aware of the biggest default the risk of cloud security issues constantly. These issues imply vulnerability to data loss and hackers overtaking the syst em computer scientists should be aware of the structures defaults and be able to use cloud operate efficiently. asperse computing is a highly useful and quickly growing aspect of technology, and although the security issues are a risk, it is a useful service that should be used with the proper prior knowledge. Before delving into the exact security issues, it is important to understand the basic structure of the cloud system. To begin, the cloud computing structure has trio major branches 1) Infrastructure as a Service, 2) Platform as a Service, and 3) Software as a Service (Dorey 6). The most common service to global computer users is the Software as a Service branch because it provides the structure of the system and is notably appr... ...e. Web. 16 Apr. 2012.Fox, Armando. Cloud Computing-Whats in It for Me as a Scientist? ScienceMagazine.org. AAAS.org, 28 Jan. 2011. Web. 23 May 2012. .Jamil, Danish, and Hassan Zaki. Cloud Computing Security. International Journal of Compute r Science and Engineering 3.4 (2011) 3478-482. Academic Search Complete. Web. 16 Apr. 2012.Jamil, Danish, and Hassan Zaki. Security Issues in Cloud Computing and Countermeasures. International Journal of Computer Science and Engineering 3.4 (2011) 2672-676. Academic Search Complete. Web. 16 Apr. 2012.Segal, Naresh K., Sohum Sohoni, Ying Xiong, David Fritz, Wira Mulia, and John M. Acken. A Cross Section of the Issues and Research Activities connect to Both Information Security and Cloud Computing. Academic Search Complete. Web. 16 Apr. 2012.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.