18 Oct 2022

56

Cloud Computing for Business: Everything You Need to Know

Format: APA

Academic level: High School

Paper type: Research Paper

Words: 549

Pages: 2

Downloads: 0

Cloud computing has become very popular among startup and big businesses. Most enterprises use cloud computing to offer them additional services and storage capacity for their projects and data. Since cloud computing companies are not required to have their computing infrastructure, cloud services are cost-effective since they will pay for what they use. Using cloud services also means that enterprises can move very fast on projects and test new applications without additional procurement and upfront cost. Also, applications running on the cloud are very fast since the cloud providers ensure that performance is consistently optimized on all servers. Although cloud services have brought about new ways of storing and sharing data, many companies are still tentative about moving to the cloud due to a vast security concern posed by this service. 

Data deletion and loss is a major concern to companies migrating to cloud services. Data stored in cloud services can be deleted or lost through a malware attack, a natural disaster, or service provider data wipe. Data loss can be very devastating to a business that lacks a recovery plan of the same. Other times, companies deleting their data from the cloud suffers from incomplete data deletion that could expose the undeleted data to attackers. Such data deletion issues exist because consumers reduced visibility of where they store their data physically, which minimizes their capability to verify a secure deletion of their data. Such incidences are very common in cloud services. In 2011, Amazon suffered a data loss by permanently destroying their consumers’ data. Google also lost data when its power grid was struck by lightning. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Unauthorized access and insider threat is also a concern to cloud users. Employees can use their authorized access to obtain customers' accounts, financial information, and other sensitive data. Also, employees’ negligence can lead to unauthorized access due to their ability to remotely log in to their accounts, making the system vulnerable to third party access (Sabahi, 2011). Other times an employees’ accounts can be hijacked by attackers who use their login info to reach out to sensitive data in the cloud. Moreover, hackers can manipulate and fabricate data from credentials stolen by scripting errors and reused passwords. 

Insecure interfaces and APIs that can be compromised is another threat to clouding computing. Application programming interfaces enable consumers to customize their cloud experience. Such is because of a company's ability to customize cloud computing features to suit its business needs (Kuyoro, Ibikunle, & Awodele, 2011). Additionally, they give companies data recognitions and encryption, together with access services. Since some APIs can be accessed through the internet, they are exposed to potential attack exploitation. Attackers always look for API vulnerabilities, which they use to compromise companies' cloud assets and data. 

However, with all these risks that come with cloud computing, companies have come up with this data protection and regulatory compliance programs that comprise skilled IT professionals with sufficient authority and a very clear responsibility for cloud hosting. This IT personnel's primary responsibilities are to ensure data stored in the cloud is encrypted when not in use, coming up with a two-factor authentication login model to limit unauthorized access and eliminate any chance of shared accounts among co-workers (Zissis & Lekkas, 2012). Moreover, the company IT departments are supposed to develop a well-defined shared responsibility model with the cloud service provider. 

Although cloud computing has reduced the cost of storing and transmitting data, it does not lessen the existing network security risk; rather, cloud services increase them. However, with well laid down data security procedures, a company can mitigate some of these risks for smooth company operations. 

References 

Kuyoro, S., Ibikunle, F., & Awodele, O. (2011). Cloud Computing Security Issues and Challenges. International Journal of Computer Networks, 3 (5), 247-255. Retrieved from https://eprints.lmu.edu.ng/id/eprint/1390 

Sabahi, F. (2011). Cloud computing security threats and responses. 

Zissis, D., & Lekkas, D. (2012, March). Addressing cloud computing security issues. Future Generation Computer Systems, 28 (3), 583-592. https://doi.org/10.1016/j.future.2010.12.006 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 15). Cloud Computing for Business: Everything You Need to Know .
https://studybounty.com/cloud-computing-for-business-everything-you-need-to-know-research-paper

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

17 Sep 2023
Technology

Implementation Roadmap

AT&T is a telecommunication company that has a platform for selling phones and provision of internet and other services. Implementation of big data analytics in the company requires the completion of a particular...

Words: 545

Pages: 2

Views: 70

17 Sep 2023
Technology

Big Data in Fraud Detection: How It is Used and What to Expect

Chameleon Carriers The replication of trucking companies and trucks under different business names has grown rampant, as the Federal Motor Carrier Safety Administration (FMCSA) program reports. A large...

Words: 508

Pages: 2

Views: 437

17 Sep 2023
Technology

The 5G Networks: How They Work, and What They Mean for the Future

The world of technology is rapidly developing with the reliance of the internet at its core. 4G has been the primary platform of the internet but based on the slow speed, and the high dependence of technology has led...

Words: 284

Pages: 1

Views: 112

17 Sep 2023
Technology

How to Write a Successful Business Case

A successful business case is based on a need. One of the most disturbing problems in the health sector is cybercrime. We intend to develop a strategy that will leverage IT-based techniques and measures to reduce...

Words: 263

Pages: 1

Views: 63

17 Sep 2023
Technology

The 5nm Transistor: The Future of Computing

The November 16th, 1904 invention of the vacuum tube was the humble beginning of the modern-day transistor. The first working transistors were developed at Bell Labs by William Shockley, John Bardeen, and Walter...

Words: 2221

Pages: 4

Views: 55

17 Sep 2023
Technology

Wireless Communication Technologies

Wireless communication taken analogically simply refers to the channel of telephony communication that does not apply the use of wires (Bose, 2010) . Such a channel makes use of electromagnetic waves available in the...

Words: 1046

Pages: 4

Views: 159

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration