Security and Privacy Issues in Business Cloud Computing

Verified

Added on  2021/02/19

|7
|2116
|384
AI Summary
In this report it explains about impact of cloud computing on business environment and also shows the difference between security and confidentiality and why they are important to in achieving privacy and security of company's cloud. MAIN BODY 1 Discuss cloud computing, cloud storage and cloud types in business environment. The Cloud service platform will be providing faster access to cost effective and flexible IT services with allowing people to share photos through mobile data and supporting operations of business.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
INTEGRATED PROFESSIONAL
SKILLS IN THE DIGITAL AGE

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Table of Contents
INTRODUCTION...........................................................................................................................1
MAIN BODY...................................................................................................................................1
Discuss cloud computing, cloud storage and cloud types in business environment....................1
Difference between security and privacy and importance in company's cloud computing.........3
CONCLUSION................................................................................................................................4
REFERENCES................................................................................................................................5
Document Page
INTRODUCTION
In today's digital age, not only technical teams and IT specialists need to worry about
cyber security. The reality is that security and privacy are problems that need to be understood
by everyone, especially those who work in the field of communication. In this report it explains
about impact of cloud computing on business environment and also shows the difference
between security and confidentiality and why they are important to in achieving privacy and
security of company's cloud.
MAIN BODY
Discuss cloud computing, cloud storage and cloud types in business environment.
Amazon Web Services have started to provide IT services into the market in terms of
web services which are now referred to as cloud computing. The cloud, servers and other IT
infrastructure do not have to be planned well in advance. Instead, this service can instantly
change hundreds or thousands of servers in minutes for faster results (Bridgstock, 2016). They
only pay for what they use, without pre-costs and without long-term commitment, which makes
AWS profitable. Today, AWS provides a very reliable, measurable and cost-effective cloud-
based infrastructure platform that manages many companies in 190 countries around the world.
Cloud Computing is known as internet-based computing services that networks different
group of remote servers which allows to main data storage and provides online access to the
computer services. With the help of cloud computing, Amazon and Microsoft can use shared
resources for computers and storage instead of building, managing, and improving the
infrastructure itself. It is a model that allows the following features such as users can use and
share resources on request, resources can be automatically upgraded or reduced depending on
utilization, resources are available on a secure network, cloud service providers can authorize
payment models when customers are billed based on the type of resource and usage. Cloud
computing is the provision of computing power, databases, storage, applications, and other IT
resources through the internet at an additional cost. The Cloud service platform will be providing
faster access to cost effective and flexible IT services with allowing people to share photos
through mobile data and supporting operations of business. With cloud computing, Amazon and
Microsoft don't need to spend a lot of hardware investment and spend a lot of time managing this
hardware hard drive. Instead, they can provide the exact type and amount of computing resources
that they need to include in their latest ideas or manage IT department. They can access as many
5
Document Page
resources as they need right away, paying only for what they use. With cloud computing,
Amazon can access servers, databases, and various application services through the internet
(Collins and Halverson, 2018). Cloud service providers, such as Amazon Web Services, have
and support network-related hardware needed for this application service and provide what you
need through a web application.
Private, hybrid and public are the 3 different types of cloud which companies could use.
All the 3rd party providers will give user service with help of internet which will be there in
public clouds. The data of customer and security will be located into service provider’s
infrastructure. While on other hand private will be somewhat similar to public but in this all
service and managed by company with 3rd parties. The private cloud will be having control of
infrastructure which will be minimising the risk of security crisis. In addition to this hybrid s
regarded to as combination of both public and private cloud which is taking decision for
providing various type of parameters. These parameters would include like that of industry
certification, application awareness, regulations and required standards.
The data when it is stored with help of internet into cloud storage which is called to as
cloud computing with managing data storage. With managing the storage infrastructure, capacity
cost, delivering on time and eliminating with need to buy and then manage (Gretter and Yadav,
2016). Data store cloud is purchased from third party vendors who own, manage and provide
storage capacity over the internet with paid models. This cloud storage provider manages
capacity, security, and lifetime to make data available for your applications worldwide. With the
help of API user can access to application cloud storage protocols. Most of the vendors are
intended to give additional services that can be used for analysing, managing, collecting and
protecting data that is at larger scale.
There are three types of cloud storage such as object storage, file storage and block
storage. Each has its own advantages and uses such as object storage is cloud-based applications
often use extensive site storage features and metadata. Bin Decisions such as Amazon Simple
Storage Service are ideal for building sophisticated applications from scratch, requiring
scalability and flexibility, and can be used to import existing data storage for analysis, archiving,
or archiving (Khalil and Osman, 2017). File storage has some applications which must have
access to shared files and require a file system. This type of storage is often supported by a
Network Storage Server (NAS). Decision for file storage, such as the Amazon Elastic File
5

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
System which is ideal for situations such as large content inventory, development environment,
media store, or special directory. Block storage used in other company applications, such as
databases systems, often require special low latency storage for each host. Block-based storage
clouds, such as the Amazon Elastic Block Store (EBS) are shipped with each virtual server and
provide very low latency for high workloads.
Difference between security and privacy and importance in company's cloud computing.
Security is a comprehensive principle in IT as more and more new technologies are
connected to networks such as global IP and wireless telecommunications networks, more
attention is paid to data control and security. Security architecture can include many components,
endpoint security practices that control the display of data on smartphones and tablets, and
practices protecting network and infrastructure data from hacking or cyber-attacks. There are 3
principle of security which will be defined to as maintaining integrity of data collected,
promoting the availability of information and protecting privacy as well. The privacy will be
determining right of individual and organisational information. This will be there for some
greater extent for achieving privacy of security depending upon confidentiality with access to
data (Difference between Security and Privacy, 2019). Security programs may require network
access credentials without limiting access to personal information although both are related
terms, they are often used together. Security is a state of personal freedom from potential threats,
while privacy refers to a state of freedom from unwanted attention. The security program refers
to a set of protocols and regulations designed to protect all confidential information and
resources collected and owned by the organization. It focuses on data and information rather than
people's personal information. The privacy program, on the other hand, focuses on protecting
only personal information such as credentials, passwords, and more.
The company's cloud can be private and secured, the good security practice in protecting
the cloud is protection against internal and external threats such as security monitoring services
ensures the infrastructure security effectiveness with the help of devices which is used to analyse
the logs in real time (Huda, 2019). The team which is monitoring the various security devices
have responsibility to provide the data to security analysts so that they can eliminate or respond
to threats against the enterprise. The other security practices is vulnerability detection and
management which makes verification and management of security levels of information
systems automated. It performs various automated tests which ensures the identification of
5
Document Page
system weaknesses that may be exposed on the internet as there will unauthorized access to the
services. This security service helps to secure the information in security system and improve the
level of system security.
To ensure privacy within the company's cloud, there are various policy which can be
suitable for the management of customer and personal information of organization. In privacy
protection of cloud computing it requires less technical issue and more policy and legal issues.
Policies are framed to ensure the legal framework so that they can protect the privacy of
individual and organization. The policies can be explained as accountability which can handle
the personal information and notice to individuals about the collection of information and how it
is used, retained and disclosed to third parties (Keengwe, 2015). Legal challenges like
multinational framework, as the company stores more data on the cloud, therefore, the
importance of privacy and security increases which can help to optimize the efficiency of cloud
services, better performance and reliability of customer's expectations. The other policy which
can enhance the privacy of company's cloud is quality assurance which follows steps to ensure
that the information or data which is collected and recorded is accurate and related to the
purposes.
CONCLUSION
From the above report it had been summarized that impact of cloud computing is
important in IT services as it helps in managing and analysing the personal information and
provide services to their clients. This report highlighted the differences between the privacy and
security and how it can secure and private the company's cloud so they can freely use their
information.
5
Document Page
REFERENCES
Books and Journals
Bridgstock, R., 2016. Educating for digital futures: what the learning strategies of digital media
professionals can teach higher education. Innovations in education and teaching
international. 53(3). pp.306-315.
Collins, A. and Halverson, R., 2018. Rethinking education in the age of technology: The digital
revolution and schooling in America. Teachers College Press.
Goldie, J. G. S., 2016. Connectivism: A knowledge learning theory for the digital age?. Medical
teacher. 38(10). pp.1064-1069.
Gretter, S. and Yadav, A., 2016. Computational thinking and media & information literacy: An
integrated approach to teaching twenty-first century skills. TechTrends. 60(5). pp.510-516.
Huda, M. and Teh, K. S. M., 2018. Empowering professional and ethical competence on
reflective teaching practice in digital era. In Mentorship Strategies in Teacher
Education (pp. 136-152). IGI Global.
Huda, M., 2019. Empowering application strategy in the technology adoption: insights from
professional and ethical engagement. Journal of Science and Technology Policy
Management. 10(1). pp.172-192.
Hussey, P. A. and Kennedy, M. A., 2016. Instantiating informatics in nursing practice for
integrated patient centred holistic models of care: a discussion paper. Journal of advanced
nursing. 72(5). pp.1030-1041.
Keengwe, J. ed., 2015. Handbook of research on active learning and the flipped classroom
model in the digital age. IGI Global.
Khalil, N. and Osman, K., 2017. STEM-21CS module: Fostering 21st century skills through
integrated STEM. K-12 STEM Education. 3(3). pp.225-233.
Pan, G. and Seow, P. S., 2016. Preparing accounting graduates for digital revolution: A critical
review of information technology competencies and skills development. Journal of
Education for Business. 91(3). pp.166-175.
Online
Difference Between Security and Privacy. 2019. [Online]. Available through :
<http://www.differencebetween.net/technology/internet/difference-between-security-and-
privacy/>.
5
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]