1,851
15
Term Paper, 2 pages (500 words)

Cis 417 week 7 discussion 1 & 2 term paper examples

Mobile devices play a key role in mail investigations. This is true because most people synchronize all their data to the mobile devices and it is the most often used platform in accessing mails. A key risk in the application of handheld devices is the susceptibility to theft, breakdown or just normal loss. Since users will always walk around with their mobile devices, they are more prone to loss as opposed to desktop computers that are always in the offices. Loss of these devices means loss of crucial data. Wireless networks also lack some aspects of stability under given circumstances. For instance, when there are cases of power breakdowns, wireless networks are rendered unstable, and some configurations may need to be done to restore their stability (Kumar, Manjunath & Kuri, 2008).
Apple’s iCloud has been key cloud service provider in the recent past. Its main function is to provide for transportation and storage of data and information for its users. Its main advantage is its ability to provide high standard security for the information it stores against unauthorized access. It is also a cheap means of storing data and also safe. For instance, data stored in Dropbox is always safe and cheap to keep. However, Apple holds all the decryption keys to this data and can access, modify, manipulate and even distribute it to legal authorities when called upon. This is in a bid to make email investigations possible.
Forced client merging is a major challenge facing users of the cloud and storage of web mail. Cloud computing technology lacks the isolation mechanisms that could allow users in a cloud, though sharing virtual resources, to operate independently. This has much to deal with memory allocations and individual reputation. It is notable that storage spaces in a cloud are merged, making it relatively difficult for a specific person to store data on a private platform within the cloud. This could attract enormous attacks that could affect a number of users. These attacks, however, have been considered hard to be effected as compared to the individual company operating systems that have been in place in the past.
ICloud is an aspect of cloud computing made available by Apple to users interested. It facilitates storage and access of various services in the cloud, among them calendars, emails, contacts and other services. This application is designed to allow log in with other email accounts that are not necessarily @iCloud. com. It also provides for a portal for all web mail hence making investigations possible. Since it is a cloud service prone to many threats, users of iCloud should embrace encryption so much as a measure to ensuring the security of their information.

References

Apple holds the master decryption key when it comes to iCloud security, privacy | Ars Technica. (n. d.). Ars Technica. Retrieved May 23, 2013, from http://arstechnica. com/apple/2012/04/apple-holds-the-master-key-when-it-comes-to-icloud-security-privacy/
Durkee, D. (2010), ‘ Why Cloud Computing Will Never Be Free’, Communication of the
ACM, Vol. 53, No. 5, pp. 62-69.
Kumar, A., Manjunath, D., & Kuri, J. (2008). Wireless networking. Amsterdam: Morgan Kaufmann/Elsevier.

Thank's for Your Vote!
Cis 417 week 7 discussion 1 & 2 term paper examples. Page 1
Cis 417 week 7 discussion 1 & 2 term paper examples. Page 2
Cis 417 week 7 discussion 1 & 2 term paper examples. Page 3

This work, titled "Cis 417 week 7 discussion 1 & 2 term paper examples" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Term Paper

References

AssignBuster. (2021) 'Cis 417 week 7 discussion 1 & 2 term paper examples'. 14 November.

Reference

AssignBuster. (2021, November 14). Cis 417 week 7 discussion 1 & 2 term paper examples. Retrieved from https://assignbuster.com/cis-417-week-7-discussion-1-2-term-paper-examples/

References

AssignBuster. 2021. "Cis 417 week 7 discussion 1 & 2 term paper examples." November 14, 2021. https://assignbuster.com/cis-417-week-7-discussion-1-2-term-paper-examples/.

1. AssignBuster. "Cis 417 week 7 discussion 1 & 2 term paper examples." November 14, 2021. https://assignbuster.com/cis-417-week-7-discussion-1-2-term-paper-examples/.


Bibliography


AssignBuster. "Cis 417 week 7 discussion 1 & 2 term paper examples." November 14, 2021. https://assignbuster.com/cis-417-week-7-discussion-1-2-term-paper-examples/.

Work Cited

"Cis 417 week 7 discussion 1 & 2 term paper examples." AssignBuster, 14 Nov. 2021, assignbuster.com/cis-417-week-7-discussion-1-2-term-paper-examples/.

Get in Touch

Please, let us know if you have any ideas on improving Cis 417 week 7 discussion 1 & 2 term paper examples, or our service. We will be happy to hear what you think: [email protected]