Integrated Professional Skills
VerifiedAdded on 2020/12/10
|7
|1935
|487
Essay
AI Summary
This essay examines the role of cloud computing in enhancing professional skills in the digital age. It highlights the benefits of cloud technology for businesses, including increased efficiency, scalability, and customer support. The essay also explores the difference between data privacy and security and emphasizes the importance of safeguarding both user identity and data integrity in the cloud environment. It concludes by discussing strategies for securing cloud infrastructure and ensuring data privacy.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
INTEGRATED
PROFESSIONAL SKILLS IN
THE DIGITAL AGE
PROFESSIONAL SKILLS IN
THE DIGITAL AGE
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
TABLE OF CONTENTS
INTRODUCTION...........................................................................................................................1
MAIN BODY...................................................................................................................................1
CONCLUSION................................................................................................................................3
REFERENCES................................................................................................................................4
INTRODUCTION...........................................................................................................................1
MAIN BODY...................................................................................................................................1
CONCLUSION................................................................................................................................3
REFERENCES................................................................................................................................4
INTRODUCTION
Cloud computing may be defined as a practice of using a network of remote servers
which are hosted on the internet in order to process, manager and store data rather than using
personal computer or local server (Gai and et.al., 2016). Cloud computing is the latest
technology in Information Technology which delivers cloud base services that allows a business
to operate their tasks, increase their efficiency and manage their data related to business. Present
report discusses but cloud computing, cloud storage etc with suitability to current business also
what is difference between privacy and security.
MAIN BODY
Cloud technology is present in every aspect of business world, it has transformed the
ways of working and has changes the business functions significantly. Cloud computing allows
the current business to scale efficiently, as businesses can expand their infrastructure as well as
capabilities. For this purpose companies does not need to forecast server requirements, or bur
extra storage space, but needs to adjust their subscription with cloud server. The cloud server
will allocate more space according to organisation's requirement which helps in improving
operational efficiency of current businesses (Rittinghouse and Ransome, 2016). Cloud
computing also improves customer support which is important for current businesses, as
employees can access information at any time which can help in serving well to customers. It
also help bringing flexibility and reduce the cost of infrastructure of current businesses. Cloud
storage in current business world provides IT solutions for business and has brought many
benefits to business owners of the world. Cloud storage proves to cost saving for the
organisations as it is affordable tool for enhancing the security of data stored by the organisation.
Companies instead of having hardware in their office, can store their huge amount of data in
cloud storage. As information and data is very important for all types of businesses, so high level
of security is needed for it. This level of security is provided by cloud storage, there is not a
single point of failure or loss of data as it is backed up by multiples servers. So, it minimises the
risk of hardware malfunction for current businesses as data of the organisation is safely stored in
redundant location (5 current cloud computing trends in business, 2017). As business in current
needs mobility and this mobility can only be provided by cloud storage and data can be easily
retrieved at any time through phone, desktop, tablets, etc. There are 4 types of clouds such
private cloud, community cloud, hybrid and public cloud.
1
Cloud computing may be defined as a practice of using a network of remote servers
which are hosted on the internet in order to process, manager and store data rather than using
personal computer or local server (Gai and et.al., 2016). Cloud computing is the latest
technology in Information Technology which delivers cloud base services that allows a business
to operate their tasks, increase their efficiency and manage their data related to business. Present
report discusses but cloud computing, cloud storage etc with suitability to current business also
what is difference between privacy and security.
MAIN BODY
Cloud technology is present in every aspect of business world, it has transformed the
ways of working and has changes the business functions significantly. Cloud computing allows
the current business to scale efficiently, as businesses can expand their infrastructure as well as
capabilities. For this purpose companies does not need to forecast server requirements, or bur
extra storage space, but needs to adjust their subscription with cloud server. The cloud server
will allocate more space according to organisation's requirement which helps in improving
operational efficiency of current businesses (Rittinghouse and Ransome, 2016). Cloud
computing also improves customer support which is important for current businesses, as
employees can access information at any time which can help in serving well to customers. It
also help bringing flexibility and reduce the cost of infrastructure of current businesses. Cloud
storage in current business world provides IT solutions for business and has brought many
benefits to business owners of the world. Cloud storage proves to cost saving for the
organisations as it is affordable tool for enhancing the security of data stored by the organisation.
Companies instead of having hardware in their office, can store their huge amount of data in
cloud storage. As information and data is very important for all types of businesses, so high level
of security is needed for it. This level of security is provided by cloud storage, there is not a
single point of failure or loss of data as it is backed up by multiples servers. So, it minimises the
risk of hardware malfunction for current businesses as data of the organisation is safely stored in
redundant location (5 current cloud computing trends in business, 2017). As business in current
needs mobility and this mobility can only be provided by cloud storage and data can be easily
retrieved at any time through phone, desktop, tablets, etc. There are 4 types of clouds such
private cloud, community cloud, hybrid and public cloud.
1
Private cloud: This type of cloud infrastructure can be used by a single organisation but
comprising of multiple customers. For example a business unit which may be owned or managed
or operated by an organisation or third party or in combination which may exist on or off
premises.
Community cloud: This cloud infrastructure is used by a specific community of consumers
from such organisations which have got shared concerns for example mission, policy, security
requirements, considerations etc.
Public cloud: This cloud infrastructure can be used by the general public and it may be
managed, owned and operated by government organisations, academic, business etc which may
exist in the premises of cloud service provider.
Hybrid cloud: It is the combination of two or more distinct cloud infrastructure such as private
public or community which requires unique entities but are bound together by a proprietary or
standardised technology which in return enables application and data portability.
Privacy and security is being used interchangeably which has resulted a huge confusion
between the two terms but privacy is not security and vice versa. There is huge difference
between privacy and security, security is related to safeguarding the data whereas privacy is all
about safeguarding the identity of the user (Kang and et.al ., 2015). In security there is protection
against to unauthorised access to data, but privacy has privacy deals with the issues related to
individuals right to own the data which is generated and restrict its outward flow of data
gathered. Data security mainly focuses on the tools and technology which is required to deter the
cybercriminals preventing them from getting their hands on business information. On the other
hand data privacy mainly focuses on the democratic right to privacy in the comfort of their own
business and can freely express their opinions behind the doors. Data security is referred as
confidentiality, integrity and availability of data whereas data privacy is simple an appropriate
use of data. Data security plan includes collection of required information and keeping it safe and
even destroying the information which is of no use. Data privacy, data is not disclosed or sold
which was entrusted by other parties without getting approval. It can also be said the privacy is
the right of the consumer and security is the policy of the company. By providing privacy to
customer means that it is the right of the customer to choose to which kind of information a
customer wants to share and with whom and when (El Makkaoui and et.al., 2016). On contrary
to it by providing security it means the level of protection which an organisation provides in
2
comprising of multiple customers. For example a business unit which may be owned or managed
or operated by an organisation or third party or in combination which may exist on or off
premises.
Community cloud: This cloud infrastructure is used by a specific community of consumers
from such organisations which have got shared concerns for example mission, policy, security
requirements, considerations etc.
Public cloud: This cloud infrastructure can be used by the general public and it may be
managed, owned and operated by government organisations, academic, business etc which may
exist in the premises of cloud service provider.
Hybrid cloud: It is the combination of two or more distinct cloud infrastructure such as private
public or community which requires unique entities but are bound together by a proprietary or
standardised technology which in return enables application and data portability.
Privacy and security is being used interchangeably which has resulted a huge confusion
between the two terms but privacy is not security and vice versa. There is huge difference
between privacy and security, security is related to safeguarding the data whereas privacy is all
about safeguarding the identity of the user (Kang and et.al ., 2015). In security there is protection
against to unauthorised access to data, but privacy has privacy deals with the issues related to
individuals right to own the data which is generated and restrict its outward flow of data
gathered. Data security mainly focuses on the tools and technology which is required to deter the
cybercriminals preventing them from getting their hands on business information. On the other
hand data privacy mainly focuses on the democratic right to privacy in the comfort of their own
business and can freely express their opinions behind the doors. Data security is referred as
confidentiality, integrity and availability of data whereas data privacy is simple an appropriate
use of data. Data security plan includes collection of required information and keeping it safe and
even destroying the information which is of no use. Data privacy, data is not disclosed or sold
which was entrusted by other parties without getting approval. It can also be said the privacy is
the right of the consumer and security is the policy of the company. By providing privacy to
customer means that it is the right of the customer to choose to which kind of information a
customer wants to share and with whom and when (El Makkaoui and et.al., 2016). On contrary
to it by providing security it means the level of protection which an organisation provides in
2
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
order to control the access to a certain information. It must be noted from the above difference
that it is only the proper security controls of the organisation which can ensure the privacy of the
data. Though there is a difference between the two but there is a strong interrelationship between
two terms.
Discrimination between the privacy and security and how cloud to be secured and private.
Privacy and security plays the crucial role and these both are interlined to the each other.
Henceforth, these both are differed also as this defined how to use of the modern devices and use
of affected data affect the digital security and privacy (Thierer, 2015). In the advancement of this
digital era, technical team and IT professionals are very concerned about the safety, security and
privacy issues that needs to be understand.
Security can be termed as the protection of the information in manner as unauthorised
access to the data and information (Data Security and Privacy in Cloud Computing, 2014).
Therefore, security controls is in the place is limit that access to the information. This is mainly
relates with the safeguarding of information.
Privacy defined as to have the user specific detail so that data can be secured. Henceforth,
this is mainly concerned about the safeguarding of the user identity (Davies and et. al., 2015).
Hence, it can be stated that security and privacy both are crucial component to the each other.
With the use of advanced techniques, increment in the technology, protecting the hacks
and identity of the theft. Business enterprises are working towards to get large data in cloud and
to maintain integrity of the data it helps to have paramount importance.
How cloud to be secured as-
Data security has been the vast topic and this mainly associated with the major issue in
the information techniques. Therefore, data security and privacy protection are two major
concern of cloud technology. Thus, following factor are needed to be considered as-
To provide the lock backup
To have in the use of encryption
To have application of the reliable passwords.
To have the use of additional security measures.
Henceforth, it can be stated that data stored in the cloud is encrypted from the use of any
kind of sensitive information. Therefore, it can be termed out as cloud computing security is
refer as broad policies, technologies, application and control of the associated infrastructure of
3
that it is only the proper security controls of the organisation which can ensure the privacy of the
data. Though there is a difference between the two but there is a strong interrelationship between
two terms.
Discrimination between the privacy and security and how cloud to be secured and private.
Privacy and security plays the crucial role and these both are interlined to the each other.
Henceforth, these both are differed also as this defined how to use of the modern devices and use
of affected data affect the digital security and privacy (Thierer, 2015). In the advancement of this
digital era, technical team and IT professionals are very concerned about the safety, security and
privacy issues that needs to be understand.
Security can be termed as the protection of the information in manner as unauthorised
access to the data and information (Data Security and Privacy in Cloud Computing, 2014).
Therefore, security controls is in the place is limit that access to the information. This is mainly
relates with the safeguarding of information.
Privacy defined as to have the user specific detail so that data can be secured. Henceforth,
this is mainly concerned about the safeguarding of the user identity (Davies and et. al., 2015).
Hence, it can be stated that security and privacy both are crucial component to the each other.
With the use of advanced techniques, increment in the technology, protecting the hacks
and identity of the theft. Business enterprises are working towards to get large data in cloud and
to maintain integrity of the data it helps to have paramount importance.
How cloud to be secured as-
Data security has been the vast topic and this mainly associated with the major issue in
the information techniques. Therefore, data security and privacy protection are two major
concern of cloud technology. Thus, following factor are needed to be considered as-
To provide the lock backup
To have in the use of encryption
To have application of the reliable passwords.
To have the use of additional security measures.
Henceforth, it can be stated that data stored in the cloud is encrypted from the use of any
kind of sensitive information. Therefore, it can be termed out as cloud computing security is
refer as broad policies, technologies, application and control of the associated infrastructure of
3
the cloud computing. Thus, security issues associated with the cloud computing falls with the
differed issues that faced by the customers. In addition to this, it can be stated that cloud and
virtualisation provides the agility and efficiencies to instantly roll out the new services.
Therefore, it is very crucial to understand the security governance requirements for the specific
system and data secure.
CONCLUSION
It can be concluded from the report that cloud computing has become one of the basic
element of current business and has helped in increasing the efficiencies of current business
environment. Cloud computing help in increasing or enhancing the level of security of business
function and has provided privacy to customers. Present report also concludes that organisations
can store and retrieve their huge amount of data form cloud storage at any time and it has
increased the mobility of current business as well. There is a hugeThierer, A.D., 2015. The
internet of things and wearable technology: Addressing privacy and security concerns without
derailing innovation. Adam Thierer, The Internet of Things and Wearable Technology:
Addressing Privacy and Security Concerns without Derailing Innovation, 21.
Davies, N and et. al., 2015. Security and privacy implications of pervasive memory
augmentation. IEEE Pervasive Computing.14(1).pp.44-53. difference between privacy and
security and it is important for the company to achieve it's own cloud in order to be private and
secure.
4
differed issues that faced by the customers. In addition to this, it can be stated that cloud and
virtualisation provides the agility and efficiencies to instantly roll out the new services.
Therefore, it is very crucial to understand the security governance requirements for the specific
system and data secure.
CONCLUSION
It can be concluded from the report that cloud computing has become one of the basic
element of current business and has helped in increasing the efficiencies of current business
environment. Cloud computing help in increasing or enhancing the level of security of business
function and has provided privacy to customers. Present report also concludes that organisations
can store and retrieve their huge amount of data form cloud storage at any time and it has
increased the mobility of current business as well. There is a hugeThierer, A.D., 2015. The
internet of things and wearable technology: Addressing privacy and security concerns without
derailing innovation. Adam Thierer, The Internet of Things and Wearable Technology:
Addressing Privacy and Security Concerns without Derailing Innovation, 21.
Davies, N and et. al., 2015. Security and privacy implications of pervasive memory
augmentation. IEEE Pervasive Computing.14(1).pp.44-53. difference between privacy and
security and it is important for the company to achieve it's own cloud in order to be private and
secure.
4
REFERENCES
Books and Journals
Rittinghouse, J. W. and Ransome, J. F., 2016. Cloud computing: implementation, management,
and security. CRC press.
Gai, K and et.al., 2016. Dynamic energy-aware cloudlet-based mobile cloud computing model
for green computing. Journal of Network and Computer Applications. 59. pp.46-54.
Kang, R and et.al ., 2015. “My Data Just Goes Everywhere:” User Mental Models of the Internet
and Implications for Privacy and Security. In Eleventh Symposium On Usable Privacy
and Security ({SOUPS} 2015)(pp. 39-52).
El Makkaoui, K and et.al., 2016. May. Cloud security and privacy model for providing secure
cloud services. In 2016 2nd international conference on cloud computing technologies
and applications (CloudTech). (pp. 81-86). IEEE.
Thierer, A.D., 2015. The internet of things and wearable technology: Addressing privacy and
security concerns without derailing innovation. Adam Thierer, The Internet of Things and
Wearable Technology: Addressing Privacy and Security Concerns without Derailing
Innovation, 21.
Davies, N and et. al., 2015. Security and privacy implications of pervasive memory
augmentation. IEEE Pervasive Computing.14(1).pp.44-53.
Online
5 current cloud computing trends in business. 2017. [Online]. Available through :
<https://www.unleashedsoftware.com/blog/five-cloud-computing-trends-business>.
Data Security and Privacy in Cloud Computing. 2014. [Online]. Available through :
<https://journals.sagepub.com/doi/full/10.1155/2014/190903>.
5
Books and Journals
Rittinghouse, J. W. and Ransome, J. F., 2016. Cloud computing: implementation, management,
and security. CRC press.
Gai, K and et.al., 2016. Dynamic energy-aware cloudlet-based mobile cloud computing model
for green computing. Journal of Network and Computer Applications. 59. pp.46-54.
Kang, R and et.al ., 2015. “My Data Just Goes Everywhere:” User Mental Models of the Internet
and Implications for Privacy and Security. In Eleventh Symposium On Usable Privacy
and Security ({SOUPS} 2015)(pp. 39-52).
El Makkaoui, K and et.al., 2016. May. Cloud security and privacy model for providing secure
cloud services. In 2016 2nd international conference on cloud computing technologies
and applications (CloudTech). (pp. 81-86). IEEE.
Thierer, A.D., 2015. The internet of things and wearable technology: Addressing privacy and
security concerns without derailing innovation. Adam Thierer, The Internet of Things and
Wearable Technology: Addressing Privacy and Security Concerns without Derailing
Innovation, 21.
Davies, N and et. al., 2015. Security and privacy implications of pervasive memory
augmentation. IEEE Pervasive Computing.14(1).pp.44-53.
Online
5 current cloud computing trends in business. 2017. [Online]. Available through :
<https://www.unleashedsoftware.com/blog/five-cloud-computing-trends-business>.
Data Security and Privacy in Cloud Computing. 2014. [Online]. Available through :
<https://journals.sagepub.com/doi/full/10.1155/2014/190903>.
5
1 out of 7
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.