Beruflich Dokumente
Kultur Dokumente
Introduction
The critical factor in each organization is creating an efficient
asset and data management system in a secure manner. To manage
data as a corporate asset, managers and companies must
understand the values of information, the techniques in utilizing
with the cloud computing service, and resources being shared
through cloud computing. Given the current state of cloud
computing, most organizations continuously seek ways or
techniques to leverage, and protect their resources to yield greater
returns.
Cloud computing forms the basis for data management and
sharing over a public or private networks among several
computing devices (such as mobile devices, tablets,
-----------------------------------------------------------1
The process of operating or function an activity without human interaction.
2
A plan unforeseen or embarking on making it occur within a future event or purpose.
1
Third-party services providers to provide services from specific
companies affiliated within other organization handling similar services.
Current cloud computing service and models may include:
Rapid
development
implementation).
approaches
(Speed
in
---------------------------------------------------------3
The results of restriction or obligation.
4a particular
The manner of taking away or solving a disaster or threat in
event.
Threats
multiple
2
passwords and confidential
Malicious items
being
send, with the outcome of
denying the submission of
the send item.
Solution: Monitoring the
web logs, ensuring that the
providers implement the
appropriate audit trails for
request
or
submitted
resources.
Data sabotage
Causes of natural
disasters
----------------------------------------------------------5
The practice of rejection or denial.
6
Placing apart from the rest or an item being in isolation.
7
The implementation of malicious programs for the purpose of damaging and using data without authorization.
8
Processes or procedures adopted by a person or organization in meeting its objectives.
3
computing model, the company must ensure that:
Conclusion
The primary focus in cloud computing has been gained from
resource sharing to ensuring the security measures are in place in
each cloud computing environment. When evaluating the
outcome of cloud computing, it is clear that the benefits in cloud
services outweigh its shortfalls.
References