123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Education >> View Article

What Are Some Of The Major Strategies And Risks Behind Implementing Cloud Computing Programs

By Author: Sherry Roberts
Total Articles: 543

Abstract
The paper contains the discussion about the major strategies applied in storing data and information in the cloud computing. The article gives an outline of the security strategies applied in ensuring that data and information are secure in the cloud. The document gives an overview of the IT risks and attacks that the cloud computing technology face. Finally, the paper gives the best practices adopted to ensure that the data and information stored in cloud maintain data confidentiality, integrity, and the accessibility.

Introduction
The issue of bug data, as well as the new technology involving the data warehousing and data mining, has influenced the business enterprises to venture into the new strategies of securing and storing data and information. The increase of the business operations and transactions has led to the advancement in the computing and technology. The need for the better and improved data recovery and the business continuity has led to the businesses opting to use the off-site data and repository information space. The cloud computing technology refers to a virtual technology that applies the VMware programming technology to facilitate effectively and the efficient data and information backing up. The cloud computing backup storage supports the client-server model architecture to provide the services to subscribed clients at a remote location through the network connections.
The Strategies Applied In Implementing Secure Cloud Computing
The cloud computing technology applies the International Organization Standards (ISO) to provide standardized and secure services to the subscribed clients (Kanamori, & Yen, 2015). The IT policies and the ethical issues practiced by the cloud computing service providers guarantee data and information security. The cloud computing service providers implement the rights and freedom to the data and information confidentiality and privacy. The data confidentiality and privacy ensure that the subscribed client’s rights and freedom to privacy and confidentiality do not get bleached. The cloud computing service providers offer the assurance that personal data cannot get shared to the third party without the client consent. The cloud computing service providers ensure that they apply the necessary measure to prevent the data and information from any breach that interfere with data and information confidentiality, integrity and the accessibility. The data within the cloud has high security from the attacks that lead to losing of data, deletion of data or corrupting of the file. The main approaches to data and information security are ensuring that the data and information stored has total protection from the catastrophic attacks and the artificial attacks. The information stored in the cloud has security against the natural disasters like a whirlwind, the floods; the hail storms the thunder and lightning. The data and information also have security against the natural disasters which includes the human errors and mistakes, the outbreak of fire, theft and the burglary crimes.
The IT Risks that Affect Cloud Computing
The data and the threats that affect the cloud computing include the infection by the malware programs like the viruses, worms, and the Trojan horses. The malware programs affect the data and information stored in the cloud repository center by altering the way data and information appears. The malware destroys the original format of files corrupting the files such that they cannot get read. The malware also deletes the data and information making the data unavailable or inaccessible. The worst effect of the malware programs is causing the Denial of Services (DOS) to the client’s remote side. The DOS attack makes the clients fail to access the remote server that contains the files they want to access (Chaka, 2015) The solution to the malware attacks and risks is the installation of the active and up to date antivirus software on the server machines and the client workstations.
The cloud computing service providers face challenges of the attacks resulting from the hackers. The hackers break into the system through different methodologies including the writing of the codes as well as the implementing of dictionary attacks. The hackers unauthorized users who gain access to the computer system without permission from the relevant authorities. The hackers modify data, delete data and add some information to data thus breaching the confidentiality principle of data and information. The hackers attempt to access the system through the use of the social engineering techniques. The legitimate users of the system acquire enticement tricks that lead to sharing of crucial information like the passwords, personal identification number (PIN) and the security codes (Wei-Tek, et al… 2014) The hackers use the information to gain access to the system with less effort. The hacking problem can get solved by installing the hardware and software firewall system in the proxy server and the web server. The organization employees should also acquire training based on the techniques applied by the hackers. The employees should aware of the adverse problem leading that may result after sharing the crucial private and confidential information.
The cloud computing service providers get a lot of pressure insecurity as a result of the intruder attacks. The intruders are unauthorized individuals who gain access to the cloud computing repository areas and cause havoc to the system. The intruders lead to altering of data and information for clients through using different techniques. The intruder hijacks the traffic packets in transit on the network through the application of the brute force attacks. The intruders may totally alter the information on transit through the network via changing the original format, characteristics and the style of the message. The intruders apply the phishing techniques to gain access to the database and the networks. The intruder attacks may be compacted trough the installation of the Intruder Detection System (IDS) and the Intruder Prevention System (IPS) within the network (Xu, et al… 2015). The system should also implement the virtual Local Area Network (VLAN) technology to mitigate the problems of the intruder attacks. The clients should always encrypt their data and information before sending across the network.

Conclusion
The cloud computing technology faces different challenges that lead to the loss of data and information characteristics like the data and information confidentiality, integrity and the accessibility. The cloud computing service providers should ensure that the repository data center has total security against any possible attacks. The cloud computing service providers should apply the use of the modernized techniques to secure data and information from loss, modification and corruption. The cloud computing service providers should make use of the Demilitarized Zones (DMZ), the Virtual Private Networks (VPN) as well as the hardware and software network and server monitors. The cloud computing service providers should educate and train the employees on the ethical issues and the practices required to ensure the computers are secure from any possible attack.

References
Chaka, C. (2015). Virtualization and Cloud Computing. Ohio: Premier Press
Kanamori, Y., & Yen, M. Y.-M. (2015). Cloud Computing Security and Risk Management. New
York: UpWord Publisher
Wei-Tek, T., Wenjun, W., & Huhns, M. N. ( 2014). Cloud-Based Software
Crowdsourcing. Ieee Internet Computing, 18, 3, 78-83
Xu, O., Zhao, I., Xiao, M., Liu, X., & Dai, V. (2015). YuruBackup: A Space-Efficient
and Highly Scalable Incremental Backup System in the Cloud. International Journal of
Parallel Programming, 43, 3, 316-338.

Sherry Roberts is the author of this paper. A senior editor at Melda Research in best custom research papers if you need a similar paper you can place your order for a custom research paper from essay writer services.

More About the Author

Author is associated with MeldaResearch.Com which is a global Custom Essay Writing and Term Paper Writing Company. If you would like help in Research Papers and Term Paper Help you can visit Custom Writing Service

Total Views: 44Word Count: 1219See All articles From Author

Education Articles

1. Digital Learning: Easing The Course Rigor
Author: aditi

2. Different Sources To Help You Through Leadership Assignment Writing
Author: Adam Jackson has been working as an academic write

3. The Oracle Fusion Scm Online Training |oracle Cloud Scm Online Training
Author: shivani

4. The Oracle Fusion Financials Online Training | Oracle Cloud Financials Online Training
Author: shivani

5. The Oracle Fusion Hcm Online Training | Oracle Cloud Hcm Online Training
Author: shivani

6. Student Database Management System
Author: Nishant kumar

7. Top 7 Best Highest Paying Job In 2019 | High Demand Jobs
Author: individual

8. 15 Helpful Angularjs Tools For Developers
Author: tibacademy

9. Python Programming Language
Author: Corporate School

10. Are Data Science Certification Courses Worth Doing?
Author: Durga Prasad

11. Sales Training In India | Dapa
Author: Mercuri India

12. Role Of The Fashion Institutes In Delhi In Creating The Future Of The Students Of Fashion Designing
Author: Anwar Ali

13. How To Do It Yourself Selenium Jenkins
Author: Gyanguide

14. 5 Frequently Asked Interview Questions Engineers Should Prepare For
Author: SIT Pune

15. Rajasthan Bstc Admit Card 2019
Author: yadav ashok

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: