Sunday, June 9, 2019

Cloud based computing security Essay Example | Topics and Well Written Essays - 2000 words

Cloud based reason security - Essay Exampleability) , discusses the security challenges that currently face the enterprise when storing selective information in its own local severs or deploying it the cloud and introduces available solution for these issues .Security is simply protecting data against improper disclosures, modification or ravaging whether these are intentionally or accidentally caused. That is to say, a complete solution to data security issues should meet three basic requirements confidentiality, integrity and availability. Confidentiality requires that data should be protected from unauthorized individuals or systems . Integrity refers to an assurance in the accuracy of the data. This means preventing of unauthorized or improper data modification or deletions essential be engaged. Availability refers to keeping timely access to data and resources by authorized person. It also refers to the protection from malicious data denials making the system no longer availa ble or the recovery from hardware and software errors. The importance assigned to these requirements significantly depends on the considered environment. For example, in military environments, most attention utilize to the confidently, while integrity is the most relevant aspect of commercial environment. In public institutions, such as hospitals and airline companies and credit institutions in which data bailiwick is essential in addition to the privacy constraints, a combination of integrity and confidentiality are needed.Developments in networking technology and an increase in the need of computing resources construct encouraged many enterprises to outsource their storage and computing needs. This new model of computing is commonly referred to as cloud computing. Cloud computing is computing which leverages computer resource through the internet. It is defined by the national institute of standards and technology (NIST) as A model for enabling convenient, on-demand network acc ess to divided up pool of configurable computing resource

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.