Wednesday, October 9, 2019

Case Study - Emerging Technologies Example | Topics and Well Written Essays - 750 words

- Emerging Technologies - Case Study Example Traditionally, cloud computing allows applications and data that are supported and or support operating systems are usually installed and stored in a computing environment where they can be referenced with high degree of ease. Therefore, according to Choo, cloud computing allows individuals and businesses to share data and computer applications without necessarily requiring physical machines thereby increasing the efficiency and ease of accessing such data and applications (Choo, 2010). Nonetheless, the use of data and compute applications within a given cloud usually requires restrictions since if there are no such restrictions, data and applications stored in such clouds may be abused or missed used. Hence, cloud computing can only be used effectively and efficiently in a corporate world or with the paper with same interest of data and computer applications. According to Choo and as it is a fact, the application of cloud computing has increased among private and public institutions ; thus, posing great risk to the security of applications and data stored in the cloud. Some of the risks associated with the cloud computing includes attacks that usually targets shared cloud environments. It should be noted that a virtual machine that runs its own applications and has operations systems just like physical machine (Choo, 2010). Choo notes that virtual machine may have a series of operating systems with which storing operation and or data from specific clients. Despite the requirement that each virtual machine should never know the component of the other, some computer data criminals have developed ways to determine components of virtual machines that they are never assigned to or they have never stored their information. These natures of event have put the data and operation systems within cloud computer to be vulnerable to alteration and linkage among other cyber insecurities. Additionally, it has been noted that cloud computing id also vulnerable to installation of backdoor botnet hosting. This state of events usually allows installation of malicious codes on the virtual machine without the knowledge of the owner (Choo, 2010). Notably, such actions lead to illegal access of other persons’ information or data thereby increasing cyber crime. Therefore, according to Choo, which is a fact, the cybercriminals are usually potential abusers of cloud computing services. Their access to the systems usually links the real owners’ private among other personal information to the public and to the wrong persons. Moreover, to some extent, the criminals’ distributed denial –of- services sometimes deny the legitimate owners from accessing their data. In terms of national security, it has been noted that virtualized infrastructures can be used as avenues of launching new attacks particularly through the use of password guess. In other words, guessing is quite dangerous for security systems at that are automated based on authentic ation. It is vital to note that virtual computing is quite fatal to businesses and persons who store their data or information to could software especially in cases of natural disaster (Choo, 2010). Wiping of the entire cloud due to a natural disaster will translate to lose of data, information, or applications that were stored in such clouds, and according to Choo, such a scenario will lead to discontinuity of business that entrusted their data in such affected clouds (Choo, 2010). Despite the anticipated advantages of

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.