logo

Network Security in Cloud Computing

10 Pages2783 Words338 Views
   

Added on  2020-06-03

About This Document

Communications Network Security INTRODUCTION 1 TASK 11 Overview of cloud computing 1 Security information and security problems 4 Solutions for current security problems 6 TASK 26 Covered in PPT 6 CONCLUSION 6 REFERENCES 8 INTRODUCTION Network securities are some kind of policies and practices which are adopted by some organizations in order to prevent the misuse of data (Subashini and Kavitha, 2011). TASK 1 1 Overview of cloud computing Cloud computing is an effective or more growing idea which is now a days adopted by

Network Security in Cloud Computing

   Added on 2020-06-03

ShareRelated Documents
CommunicationsNetwork Security
Network Security in Cloud Computing_1
Table of ContentsINTRODUCTION...........................................................................................................................1TASK 1............................................................................................................................................1Overview of cloud computing.....................................................................................................1Security information and security problems................................................................................4Solutions for current security problems.......................................................................................6TASK 2............................................................................................................................................6Covered in PPT............................................................................................................................6CONCLUSION................................................................................................................................6REFERENCES................................................................................................................................8
Network Security in Cloud Computing_2
INTRODUCTION Network securities are some kind of policies and practices which are adopted by someorganizations in order to prevent the misuse of data (Subashini and Kavitha, 2011). Along withthis, activities should be monitored by them so that unauthorised access can be reduced andsecurity can be maintained. These all things are controlled by the administrator department sothat they will be able to attain their goals. The present report is based on cloud computing whichis used by companies and individual so that they can save their data at safe place. In this context,it explains the concept of cloud computing and its networking issues or problems which arefaced by companies. TASK 1Overview of cloud computingCloud computing is an effective or more growing idea which is now a days adopted bycompanies so that they will be able to ensure the security. By adopting this kind of technique,they will be able to store their data or information on internet rather than computer. Whenever,they have to access that data then they can use any computer by connecting it with the internet. Itis very easy for the organizations to quickly access the data which is stored on cloud. This play asignificant role in order to achieve success in the market as no one can use the confidential dataas it is protected with some encryption techniques or passcode (Calheiros and et. al., 2011). Inthis type of approach, all data processing services are reliable or efficient in nature which can behelpful for the organizations in achieving the goals. The cloud computing can reduce the infrastructure cost to some extent so this will bebeneficial for firm as they can achieve specific goals. Through this, an enterprise can be focusedon their core business rather than resources which are required to maintain computers. There arethree types of cloud computing models which can be used by business organizations and thesecan be grouped into some categories. These models are explained below: Software as a service: It can also be known as SaaS. In this, current software application isdelivered to the end users or clients on their demand. For different users, it is not necessary to dosome investment and take any licence. But the service provider will be able to get advantage likecost get lowered down. Some software’s are provided by Google and Microsoft. 1
Network Security in Cloud Computing_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Communications Network Security
|12
|753
|96

(PDF) Top Threats to Cloud Computing Security
|13
|2463
|122

Impact of Cloud Computing on Businesses Essay
|7
|1978
|467

Security Threats in Cloud Computing and Preventive Methods
|4
|2565
|96

Assignment on Security In Mobile Cloud Computing
|41
|11151
|17

Cloud-Based Solutions for Organizations
|5
|1040
|382