logo

Cloud Computing and Security Issues

   

Added on  2023-03-21

7 Pages1432 Words40 Views
Running head: COMPUTER INFORMATION SYSTEM
COMPUTER INFORMATION SYSTEM
Name of student
Name of university
Author’s note:

1
COMPUTER INFORMATION SYSTEM
Table of Contents
Introduction....................................................................................................................2
Discussion......................................................................................................................2
Conclusion......................................................................................................................4
References......................................................................................................................5

2
COMPUTER INFORMATION SYSTEM
Introduction
This report aims to discuss the various aspects of the cloud computing in the
organisations and the security issues connected to the cloud computing. The comparison of
the security issues in the various software system environments has been done in this report
along with the use of the various development environments and their security issues has
been discussed. The discussion of the various cloud computing providers and the security
issues has been briefly discusses then the comparison among the various technologies and the
techniques has been done that includes the encryption, access control and the other
techniques. Lastly this report concludes with the appropriate conclusion for the report.
Discussion
When the cloud computing is considered, it is commonly observed that the computing
is data centric. There are several security issues in the software system environments where
the data could be lost or the integrity of the data could be breached. In the standalone
computing there is the major threat of the malwares that are released in the system and could
damage the network as well as the data of the organisation (Almorsy, Grundy & Müller,
2016). The malwares are designed for causing the significant damage to the standalone
computing or any networked computing. In the standalone computing as soon as the malware
are released in the system, the data could be lost from the system (Krasnyanskaya & Tylets,
2015). In the client server model of computing, there is the major threat of the unauthorised
access in the network of the organisation (Aljawarneh, Alawneh & Jaradat, 2017). without
the implementation of the proper authorisation protocols, the malicious users could gain
access in the systems and steal all the data of the organisations (Rittinghouse & Ransome,
2016). In the distributed computing model, there is the major issue of the confidentiality,
which denotes that during the transmission of the data there might be some security issues

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Components for Building IT Infrastructure
|1
|646
|51

Report On Cloud Computing Security | Data Protection
|9
|2109
|168

Security Threats in Cloud Computing
|4
|668
|210

IT Security: Potential Threats, Organizational Impact, and Security Framework
|6
|1110
|302

Network Security and Types of Security Threats and Attacks in Information Technology
|8
|2577
|274

IT Security Risks and Securities of Ransomware
|14
|2848
|75