logo

[pdf] Cloud computing - assignment

14 Pages2602 Words55 Views
   

Added on  2021-04-17

[pdf] Cloud computing - assignment

   Added on 2021-04-17

ShareRelated Documents
Running head: CLOUD COMPUTINGCloud ComputingName of the StudentName of the UniversityAuthor’s Note
[pdf] Cloud computing - assignment_1
CLOUD COMPUTING1Table of Contents1. Rationale................................................................................................................................21.1 Problem domain...............................................................................................................21.2 Purpose and justification..................................................................................................22. Research Questions................................................................................................................23. Conceptual or theoretical framework.....................................................................................33.1 Usefulness of cloud computing in enhancing accessibility of data and information.......33.2 Usefulness of cloud computing in increasing security of data and information..............33.3 Steps for adopting cloud computing................................................................................44. Methodology..........................................................................................................................54.1 Research and Systems Development method(s)..............................................................54.2 Data collection or systems design methods.....................................................................54.3 Ethical Issues....................................................................................................................54.4 Compliance Requirements (Workplace, Industry or Government regulations)...............64.5 Analysis of data................................................................................................................65. Project Plan............................................................................................................................65.1 Deliverables......................................................................................................................65.2 Work breakdown structure (WBS)...................................................................................75.3 Risk Analysis...................................................................................................................85.4 Duration............................................................................................................................95.5 Gantt chart......................................................................................................................12References................................................................................................................................13
[pdf] Cloud computing - assignment_2
CLOUD COMPUTING21. Rationale1.1 Problem domainIt is identified that organizations faces number of issues as well as challenges instoring confidential data as well as information properly on the site due to lack of propersecurity. It is found that if any issue problem occurs within the system then the organizationfaces number of challenges in accessing data. In order to resolve this issue, it is quiteimportant for the organizations to adopt loud computing technology within the organization.1.2 Purpose and justificationThe problems that the organization faces due to lack of security as well asaccessibility can be easily resolved with the adoption of cloud computing technology. It isfound that cloud host mainly involves in monitoring security, which is very much efficient incomparison to in-house system. Utilization of cloud computing helps in providing greatersecurity and the data as well as information, which are mainly stored within the cloud, can beaccessed in spite of location and time. In addition to this, utilization of cloud computing helpsin saving cost, increasing flexibility, mobility as well as collaboration within theorganization.2. Research QuestionsThe research questions include:What are the steps that needs to be conducted in order to adopt cloud computing ?How cloud computing enhances accessibility of data and information?How security of data and information can be enhanced due to the utilization cloudcomputing?
[pdf] Cloud computing - assignment_3
CLOUD COMPUTING33. Conceptual or theoretical framework3.1 Usefulness of cloud computing in enhancing accessibility of data and information According to Tao et al. (2014), the data as well as information of the organization ismainly stored in the cloud, which can also be accessible if the machine on which theinformation is present is not working. Proper accessibility of information as well as datairrespective of time and location is very much necessary when two or more member of theteam is working together. Cloud computing assist in providing a collaborative simple processwith the help of which, information can be accessible as well as shared securely on a cloud-based platform state it (Hashem et al., 2015). The ability to access information or to getconnected to the office from anywhere irrespective of place reflects that person with somedisability can also access the interface to connect with relevant infrastructure of work byutilizing proper cloud computing technology.3.2 Usefulness of cloud computing in increasing security of data and information It is identified that numerous level of control within a network infrastructure isprovided with the adoption of cloud in order to afford protection from continuity. It is statedby Chen (2015) that the main job of the cloud host is to properly monitor security, which isfound to be quite efficient in comparison to in-house system. As most of the businessgenerally does not want to consider the chances of internal data theft, however it is analyzedthat high percentage of data theft mainly occurs internally (Gai et al., 2015). Thus, in order tosecure the confidential as well as sensitive data as it is very much necessary to keep thesensitive data or information of the organization off-site. The main amped up security isconsidered as data encryption for data that is being transmitted over the network and storedwithin the databases.
[pdf] Cloud computing - assignment_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Green Cloud Computing - Doc
|18
|2946
|217

Development of Cloud based ERP system
|14
|2665
|171

Project Proposal and Plan, Cloud Security - ITC 568
|12
|2096
|1387

Automatic Wireless Health Monitoring Report System
|15
|1935
|457

Cloud Computing-based Security Solution
|12
|2602
|63

Developing Cryptocurrency Exchange App: A Project Management Approach
|13
|1973
|59