Monday, August 19, 2019

Cloud Computing and the Computer Scare Essay -- Information Technology

Once you login to your computer you are bound to use an application that is related to the cloud computing infrastructure. For example, when any service needs an internet connection it immediately uses what is known as a â€Å"cloud† network, which is a broad term for the use of a device or application that is not physically present. The computer user is then accessing a network in the cloud, which stores personal information and allows for multiple tasks to be completed in an efficient manner rather than just using a single personal computer. Computer Scientists do find an importance for expanding the cloud network since it not only helps them create projects using multiple computers linked on the cloud but it also helps deliver applications to any computer user. Unfortunately, there are some deficiencies that computer science majors should be aware of; the biggest default the risk of cloud security issues constantly. These issues include vulnerability to data loss and hacke rs overtaking the system; computer scientists should be aware of the structure’s defaults and be able to use cloud services efficiently. Cloud computing is a highly useful and quickly growing aspect of technology, and although the security issues are a risk, it is a useful service that should be used with the proper prior knowledge. Before delving into the exact security issues, it is important to understand the basic structure of the cloud system. To begin, the cloud computing structure has three major branches: 1) Infrastructure as a Service, 2) Platform as a Service, and 3) Software as a Service (Dorey 6). The most common service to general computer users is the Software as a Service branch because it provides the structure of the system and is notably appr... ...e. Web. 16 Apr. 2012. Fox, Armando. "Cloud Computing-What's in It for Me as a Scientist?" ScienceMagazine.org. AAAS.org, 28 Jan. 2011. Web. 23 May 2012. . Jamil, Danish, and Hassan Zaki. "Cloud Computing Security." International Journal of Computer Science and Engineering 3.4 (2011): 3478-482. Academic Search Complete. Web. 16 Apr. 2012. Jamil, Danish, and Hassan Zaki. "Security Issues in Cloud Computing and Countermeasures." International Journal of Computer Science and Engineering 3.4 (2011): 2672-676. Academic Search Complete. Web. 16 Apr. 2012. Segal, Naresh K., Sohum Sohoni, Ying Xiong, David Fritz, Wira Mulia, and John M. Acken. "A Cross Section of the Issues and Research Activities Related to Both Information Security and Cloud Computing." Academic Search Complete. Web. 16 Apr. 2012.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.