Saturday, April 20, 2019

Cloud based computing security Essay Example | Topics and Well Written Essays - 2000 words

Cloud based computing pledge - Essay Exampleability) , discusses the security challenges that currently face the enterprise when storing data in its own local severs or deploying it the haze over and introduces lendable solution for these issues .Security is simply protecting data against improper disclosures, modification or destruction whether these ar intentionally or accidentally caused. That is to say, a complete solution to data security issues should meet one-third basic requirements confidentiality, integrity and availability. Confidentiality requires that data should be protected from unauthorized individuals or systems . Integrity refers to an assurance in the accuracy of the data. This means preventing of unauthorized or improper data modification or deletions must be engaged. Availability refers to keeping timely access to data and resources by authorized person. It also refers to the protection from venomed data denials making the system no longer available or the recovery from hardware and parcel errors. The importance assigned to these requirements significantly depends on the considered environment. For example, in military environments, most attention devoted to the confidently, spell integrity is the most relevant aspect of commercial environment. In public institutions, such as hospitals and skyway companies and credit institutions in which data correction is essential in addition to the privacy constraints, a combination of integrity and confidentiality are needed.Developments in networking technology and an increase in the need of computing resources have promote many enterprises to outsource their storage and computing needs. This new model of computing is commonly referred to as cloud computing. Cloud computing is computing which leverages computer resource through the internet. It is defined by the matter institute of standards and technology (NIST) as A model for enabling convenient, on-demand network access to shared pool o f configurable computing resource

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.