Implementing Green Computing Policies: Research and Case Studies

Verified

Added on  2023/04/25

|7
|1329
|196
Essay
AI Summary
This essay explores the implementation of green computing policies by organizations and individuals, emphasizing energy conservation and environmental responsibility within IT. It covers understanding the concept, appointing a workgroup, measuring carbon footprints, and centralizing operations. The essay also discusses the application of efficient applications, cooling systems, and measuring the life cycle of IT accessories. Furthermore, it delves into cybersecurity and IT security risk management, highlighting the importance of protecting organizational assets and addressing vulnerabilities with professional risk management processes. The research question focuses on future IT risks and tools to improve security, especially against cybersecurity challenges like ransomware. Desklib offers a platform to explore more such solved assignments and past papers for students.
Document Page
Running head: GREEN COMPUTING
Green Computing
Name of the Student
Name of the University
Author Note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
2
GREEN COMPUTING
Question 1: In what ways could both an organization as well as individuals seek to
implement a green computing policy? Include research that you have conducted on
this topic and provide examples from your own experiences that might reflect your
culture or the region of the world in which you live.
The implementation of the green computing policy by an individual or an
organization is discussed below in the following ways:
o Understanding the concept: The importance of maintaining an echo friendly
environment in IT organizations is very much important so that more energy can
be saved, setting the stage of collaboration between various departments of a
business organization where the strategy will be implemented. The involved
personalities can be aware of the change.
o Appointing work group: A set of people should be managing the entire
procedure from the back end so that each concerned personalities are performing
their role professionally (Qiu, Shen and Chen 2018). Protection of the
environment should be the main priority of the implementation process.
o Measurement of carbon footprints: The carbon footprint of the IT services
should be measured in the first place, establish a carbon footprint reference point.
The power usage of the of the IT center should be checked. Existing power
efficiency of all the systems should be monitored and evaluated.
o Centralized operations: Business organizations having a centralized IT system is
a perfect way of saving energy (Radu 2017). Virtualization of the server and
carbon footprints can be significantly reduced with the help of centralized
operations.
Document Page
3
GREEN COMPUTING
o Application of efficient applications: The application of efficient applications
can be hugely beneficial for maintaining an energy-saving environment.
Inefficiencies of the computer system should be considered in the first place.
Maximum capacity of the servers should be maintained (Han et al. 2018). The
capacity of the servers should not be reduced under any circumstances, as it will
lead to an increase in speed of the computer applications and also maintain carbon
emissions and use of energy.
o Application of cooling system: Supplemental cooling systems can be very much
useful in maintaining a green computing environment considering the servers.
The use of data centre design technology can be very much useful for the
conservation of energy.
o Measuring the life cycle of the IT accessories and devices: Environmental
benefits should be highly considered while disposing the IT devices and the IT
accessories. Power efficiency should be maintained.
o Green IT policy: Environmental friendly business strategies should be adopted
while using the computer systems.
o Involvement: Every stakeholder associated with the business organization should
be collectively applying the above-discussed ways to implement the green
computing policy.
The topic helps us understanding the importance of green computing policy as it
helps in reducing the energy during the life cycle of the IT products. The issue of
recyclability should be encouraged along with eco-friendly use of computers.
Conservation of resources is also identified from the paper.
Document Page
4
GREEN COMPUTING
However, based on experience it can be said the implementation of the green
computing policy depends upon the type of organization where the policy is being
applied and also the work culture of the business organizations.
Question 2: if you were to conduct a small research project, what topic would you
choose? Provide an introduction to your topic of interest, if possible, a research
question, what aspect of the topic could be researched and how would you go about
learning more about the topic prior to designing your research approach.
The topic of discussion will be the Cybersecurity and IT security risk
management.
Introduction:
Cyber Security is one of the most important issue associated with computer systems
in business organizations as well as in personal computers (Cherdantseva et al. 2016).
There are security risks whenever a computer system is connected in a network. The deal
with the IT risks, the risk management is very much important (Knowles et al. 2015).
The risks have the capability to have a negative impact on the organisational assets such
as data and contact details of organisational stakeholders (Araújo et al. 2017).
Confidentiality, integrity and availability are essential for maintaining the organizational
assets. The vulnerabilities of the IT devices can be also managed with the help of the IT
security risk management.
Research Question:
o What is future risk associated with the IT devices considering the security
issues?
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
5
GREEN COMPUTING
o What are the tools which can be used to improve the security of the computer
systems considering major cybersecurity challenges such as ransomware?
Learning about the topic
The extensive development in the field of information technology has led to the
growth of new ideas and concept which are used by both researchers and cyber criminals
so the professional code of ethics should be strictly incorporated into every IT
environment so that the IT security risks and the cybersecurity risks can be minimized.
The different categories of managing the risks should be identified in the first
place; this act should be done by the risk mitigation team. The ability of the IT risk
mitigation teams is something which the business organization should be concentrating.
The team should be balanced with expertise and understanding current IT cyber security
issues such as ransomware. Evaluation of those risks is the other important business
aspect related to the IT security risks. Professional risk management process should be
incorporated in a professional format. Responding to the security threats are important as
risk contingency plan should be developed primarily by the risk mitigating team. The IT
security can be a significant direct negative impact on the growth and productivity of
business organizations as it may casuse business disruptions and financial losses.
Document Page
6
GREEN COMPUTING
Reference
Araújo, A., Melo, L., Andrade, L.H., Fonseca, J., Lima, J.N., Moreira, J., Maeda, R. and
Silva, T., 2017, December. The Strategy of Brazilian Government to Improve the
Information Security Risk Management and the Cyber Security in Brazilian Public
Sector. In The Third International Conference on Information Security and Digital
Forensics (ISDF2017) (p. 27).
Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H. and Stoddart,
K., 2016. A review of cyber security risk assessment methods for SCADA systems.
Computers & security, 56, pp.1-27.
Han, G., Que, W., Jia, G. and Zhang, W., 2018. Resource-utilization-aware energy
efficient server consolidation algorithm for green computing in IIOT. Journal of Network
and Computer Applications, 103, pp.205-214.
Knowles, W., Prince, D., Hutchison, D., Disso, J.F.P. and Jones, K., 2015. A survey of
cyber security management in industrial control systems. International journal of critical
infrastructure protection, 9, pp.52-80.
Qiu, C., Shen, H. and Chen, L., 2018. Towards green cloud computing: Demand
allocation and pricing policies for cloud service brokerage. IEEE Transactions on Big
Data.
Radu, L.D., 2017. Green cloud computing: a literature survey. Symmetry, 9(12), p.295.
Document Page
7
GREEN COMPUTING
chevron_up_icon
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]