123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Education >> View Article

What Are Some Of The Major Strategies And Risks Behind Implementing Cloud Computing Programs

By Author: Sherry Roberts
Total Articles: 576
Comment this article

The paper contains the discussion about the major strategies applied in storing data and information in the cloud computing. The article gives an outline of the security strategies applied in ensuring that data and information are secure in the cloud. The document gives an overview of the IT risks and attacks that the cloud computing technology face. Finally, the paper gives the best practices adopted to ensure that the data and information stored in cloud maintain data confidentiality, integrity, and the accessibility.

The issue of bug data, as well as the new technology involving the data warehousing and data mining, has influenced the business enterprises to venture into the new strategies of securing and storing data and information. The increase of the business operations and transactions has led to the advancement in the computing and technology. The need for the better and improved data recovery and the business continuity has led to the businesses opting to use the off-site data and repository information space. The cloud computing technology refers to a virtual technology that applies the VMware programming technology to facilitate effectively and the efficient data and information backing up. The cloud computing backup storage supports the client-server model architecture to provide the services to subscribed clients at a remote location through the network connections.
The Strategies Applied In Implementing Secure Cloud Computing
The cloud computing technology applies the International Organization Standards (ISO) to provide standardized and secure services to the subscribed clients (Kanamori, & Yen, 2015). The IT policies and the ethical issues practiced by the cloud computing service providers guarantee data and information security. The cloud computing service providers implement the rights and freedom to the data and information confidentiality and privacy. The data confidentiality and privacy ensure that the subscribed client’s rights and freedom to privacy and confidentiality do not get bleached. The cloud computing service providers offer the assurance that personal data cannot get shared to the third party without the client consent. The cloud computing service providers ensure that they apply the necessary measure to prevent the data and information from any breach that interfere with data and information confidentiality, integrity and the accessibility. The data within the cloud has high security from the attacks that lead to losing of data, deletion of data or corrupting of the file. The main approaches to data and information security are ensuring that the data and information stored has total protection from the catastrophic attacks and the artificial attacks. The information stored in the cloud has security against the natural disasters like a whirlwind, the floods; the hail storms the thunder and lightning. The data and information also have security against the natural disasters which includes the human errors and mistakes, the outbreak of fire, theft and the burglary crimes.
The IT Risks that Affect Cloud Computing
The data and the threats that affect the cloud computing include the infection by the malware programs like the viruses, worms, and the Trojan horses. The malware programs affect the data and information stored in the cloud repository center by altering the way data and information appears. The malware destroys the original format of files corrupting the files such that they cannot get read. The malware also deletes the data and information making the data unavailable or inaccessible. The worst effect of the malware programs is causing the Denial of Services (DOS) to the client’s remote side. The DOS attack makes the clients fail to access the remote server that contains the files they want to access (Chaka, 2015) The solution to the malware attacks and risks is the installation of the active and up to date antivirus software on the server machines and the client workstations.
The cloud computing service providers face challenges of the attacks resulting from the hackers. The hackers break into the system through different methodologies including the writing of the codes as well as the implementing of dictionary attacks. The hackers unauthorized users who gain access to the computer system without permission from the relevant authorities. The hackers modify data, delete data and add some information to data thus breaching the confidentiality principle of data and information. The hackers attempt to access the system through the use of the social engineering techniques. The legitimate users of the system acquire enticement tricks that lead to sharing of crucial information like the passwords, personal identification number (PIN) and the security codes (Wei-Tek, et al… 2014) The hackers use the information to gain access to the system with less effort. The hacking problem can get solved by installing the hardware and software firewall system in the proxy server and the web server. The organization employees should also acquire training based on the techniques applied by the hackers. The employees should aware of the adverse problem leading that may result after sharing the crucial private and confidential information.
The cloud computing service providers get a lot of pressure insecurity as a result of the intruder attacks. The intruders are unauthorized individuals who gain access to the cloud computing repository areas and cause havoc to the system. The intruders lead to altering of data and information for clients through using different techniques. The intruder hijacks the traffic packets in transit on the network through the application of the brute force attacks. The intruders may totally alter the information on transit through the network via changing the original format, characteristics and the style of the message. The intruders apply the phishing techniques to gain access to the database and the networks. The intruder attacks may be compacted trough the installation of the Intruder Detection System (IDS) and the Intruder Prevention System (IPS) within the network (Xu, et al… 2015). The system should also implement the virtual Local Area Network (VLAN) technology to mitigate the problems of the intruder attacks. The clients should always encrypt their data and information before sending across the network.

The cloud computing technology faces different challenges that lead to the loss of data and information characteristics like the data and information confidentiality, integrity and the accessibility. The cloud computing service providers should ensure that the repository data center has total security against any possible attacks. The cloud computing service providers should apply the use of the modernized techniques to secure data and information from loss, modification and corruption. The cloud computing service providers should make use of the Demilitarized Zones (DMZ), the Virtual Private Networks (VPN) as well as the hardware and software network and server monitors. The cloud computing service providers should educate and train the employees on the ethical issues and the practices required to ensure the computers are secure from any possible attack.

Chaka, C. (2015). Virtualization and Cloud Computing. Ohio: Premier Press
Kanamori, Y., & Yen, M. Y.-M. (2015). Cloud Computing Security and Risk Management. New
York: UpWord Publisher
Wei-Tek, T., Wenjun, W., & Huhns, M. N. ( 2014). Cloud-Based Software
Crowdsourcing. Ieee Internet Computing, 18, 3, 78-83
Xu, O., Zhao, I., Xiao, M., Liu, X., & Dai, V. (2015). YuruBackup: A Space-Efficient
and Highly Scalable Incremental Backup System in the Cloud. International Journal of
Parallel Programming, 43, 3, 316-338.

Sherry Roberts is the author of this paper. A senior editor at Melda Research in best custom research papers if you need a similar paper you can place your order for a custom research paper from essay writer services.

More About the Author

Author is associated with MeldaResearch.Com which is a global Custom Essay Writing and Term Paper Writing Company. If you would like help in Research Papers and Term Paper Help you can visit Custom Writing Service

Total Views: 79Word Count: 1219See All articles From Author

Add Comment

Education Articles

1. Best Home Tuition Academy In Dwark
Author: preity

2. Guidelines To Choose A Nursing Course
Author: Priya Arora

3. Digital Marketing Course By Seo Engineers Academy
Author: Raghuveer Chawla

4. What Is A Thesis? Who Needs To Write It?
Author: words Doctorate

5. Why Mba Is The Only Degree You Really Need
Author: ksm

6. Best Medical Educational Consultants In Gujarat
Author: admin

7. German Language Classes In Banga
Author: smk futures

8. It Security Careers - Simplidistance
Author: SimpliDistance

9. Is It Worth Getting A Tutor?
Author: Patrick Yau

10. Product Design Career - Avantika University
Author: Avantika University

11. Las Vegas Sportsbooks Gear Up For Traditional Football Contests For Locals
Author: Geoffrey Barna

12. Importance Of Reading Newspaper For Students
Author: The Asian School

13. How To Positively Tackle The “why’s & What’s” Of Your Curious Child
Author: KR Mangalam World School

14. Nurturing Multiple Intelligence Among Young Learners
Author: KR Mangalam World School

15. Key Benefits Of Exchange Programs For The Students
Author: KR Mangalam World School

Login To Account
Login Email:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: