Limited-time discount for students! | Solutions starting at $6 each

ITNE2002: Network and Information Security

Added on - 07 Oct 2021

  • ITNE2002

    Course

  • 9

    Pages

  • 1844

    Words

  • 31

    Views

  • 0

    Downloads

Trusted by +2 million users,
1000+ happy students everyday
Showing pages 1 to 3 of 9 pages
Running head: CLOUD SECURITY AND PRIVACY
Cloud Security and Privacy
Name of the Student
Name of the University
Author’s Note:
1
CLOUD SECURITY AND PRIVACY
Table of Contents
Introduction................................................................................................................................2
Discussion..................................................................................................................................2
Cloud Computing Security.....................................................................................................2
Cloud Storage Security..........................................................................................................3
Advantages of Cloud Security and Privacy...........................................................................3
Challenges of Cloud Security and Privacy.............................................................................4
Conclusion..................................................................................................................................5
References..................................................................................................................................7
2
CLOUD SECURITY AND PRIVACY
Introduction
Cloud computing can be stated as the shared pools of the configurable resources of
computer system as well as high level services, which could be rapidly provisioned with
extremely less effort of management over the Internet connection (Rong, Nguyen and Jaatun
2013). This technology of cloud computing majorly relies on the resource sharing for the core
purpose of achieving coherence or economies of scales. The third party clouds eventually
enable the organizations for focusing on the major businesses and not on expending the
resources on the computer maintenance and infrastructure. This cloud computing also enables
the organizations for avoiding or minimizing the upfront costs of IT infrastructure (Almorsy,
Grundy and Müller 2016). The applications could be easily run with the help of this
technology and hence security and privacy are important. The following report outlines a
brief description of cloud privacy and security with relevant details.
Discussion
Cloud Computing Security
The cloud computing security is the specified set of severalcontrol based policies and
technologies that are eventually designed for adhering to the rules of regulatory compliance
and hence protecting the information, applications of data or infrastructure that is associated
with the utilization of cloud computing (Aljawarneh 2013). Since, the nature of the cloud is
of shared resources, the identity management, access controls and privacy controls are the
concerns faced by its users. Moreover, the organizations that are utilizing cloud computing as
well as the associated providers of cloud for the data operations, privacy and security are kept
on top priorities. These are often termed as extremely vulnerable in respect to other
technologies (Chou 2013). The major processes of cloud computing security is responsible
for addressing each and every security control, which is often incorporated by the cloud
desklib-logo
You’re reading a preview
Preview Documents

To View Complete Document

Click the button to download
Subscribe to our plans

Download This Document