Thursday, August 27, 2020

Cloud Computing Security Essay Example | Topics and Well Written Essays - 1000 words

Distributed computing Security - Essay Example This paper will think about a portion of the diary articles that address distributed computing security. Bisong and Rahman (2011) note that numerous business associations are starting to receive the distributed computing innovation as a procedure for chopping down expense to build the company’s benefit. They contend that cloud numerous organizations, which have received this idea, have received a ton of rewards by chopping down cost, sparing time and amplifying their adaptability. In spite of the advantages, Bisong, and Rahman (2011) alerts that there is various security issues related with distributed computing innovation that an association needs to manage successfully to look after privacy, respectability, and dependability. Subsequently, Bisong and Rahman (2011) addresses all the security concerns related with distributed computing innovation in an association, for example, the danger, defenselessness and dangers in their diary article named, â€Å"An Overview of the Secu rity Concerns in Enterprise Cloud Computing† Qaisar and Khawaja (2012) through a diary article named, â€Å"Cloud Computing: Network/Security Threats and Countermeasure†s concur with the view communicated by Bisong and Rahman (2011) that numerous organizations today are anticipating embracing the distributed computing idea since it is affordable as far as cost in this manner bringing about improved gainfulness. In this article, Qaisar and Khawaja (2012) investigate the security concerns related with distributed computing idea. In any case, not at all like in the past article by Bisong and Rahman (2011) the article by Qaisar and Khawaja (2012) goes further to talk about the different sorts of distributed computing that are accessible for use. The third article â€Å"Is Cloud Computing Secure?† by Brittanny Lyons (2011) likewise recognizes that distributed computing has been of incredible advantages to numerous organizations, which have figured out how to receive t he idea. Lyons (2011) gives a case of Amazon and Google that utilizes the distributed computing innovation to deal with their systems. In any case, the article like the past two articles analyzes how safe the innovation is for overseeing business systems in an association. Lyons (2011) contends that distributed computing is secure similarly as the standard registering innovation. By the by, the article additionally concurs with different articles that there are security gives that must be thought about before receiving the idea in an association. This incorporates programmers, infections, worms, and digital fear based oppressors. Different dangers noted incorporate absence of security since the suppliers can get to the information being transferred through the framework. As to style utilized, the initial two insightful diaries are written in formal scholastic styles. This is obvious as the articles have the theoretical, presentation segment, end and the list of sources/reference seg ments. The substance is likewise completely and definite, as the analysts seem to have dove deep when directing the examination. For example, it tends to be seen that the two insightful diaries dove deep to talk about the distributed computing security related issues by giving models just as how to counter the dangers as noted in the article by Qaisar and Khawaja (2012). The two insightful diaries likewise have various outlines and diagrams, which have been utilized for showing data. For example, the article by Bisong

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.