1,147
13
Research Paper, 5 pages (1200 words)

Good example of research paper on technology selection

The technology that I have selected for this paper will be that of cloud computing. The utilization of cloud computing in associations helps in the entrance of data, for example, client information, remedy, and earlier analysis. As indicated by Augusto, Huch, and Kameas (2012), cloud computing has basically enhanced the registering environment of a few associations and subsequently expanded proficiency. This is on account of the whole buzz around there of cloud about-faces to centralization. The way data and information are put away in association has additionally changed. The cloud computing realized cloud storage. Cloud storage is the place the data of an organization is put away in the web. There has been the act of this innovation away gadgets whereby they have all the information aside from the discriminating information is put away in the cloud.
Cloud computing is one of the quickest developing advances that has seen wide appropriation due to the viability in expense. Cloud computing has turn into a broadly acknowledged innovation that is utilized to have an edge over the opposition for most associations. Likewise, there are different advantages that are connected with cloud computing, which incorporate diminished setup expenses, decreased operational expenses, enhanced administration conveyance, and streamlined operations. For a business entity to accomplish these advantages, they need to see how to effectively actualize cloud computing.
There are difficulties that accompany executing cloud computing. It is vital to comprehend the discriminating achievement figures that will guarantee that there is fruitful usage of cloud innovation. Cloud computing is a testing innovation to embrace for some associations the world over. Cloud computing will bring the viewpoint where information will be put away on another area. The information will be gotten basically. It implies that the association won’t purchase equipment for capacity base.
It is hard to actualize cloud computing in numerous associations. There are fundamental security worries that must be mulled over when executing cloud computing. There are numerous fizzled endeavors to actualize cloud computing on the planet. A large portion of the associations which have put resources into cloud computing and have fizzled have lost some piece of their information in the cloud (IBM, 2011). Hence, the execution of cloud computing is thought to be complex and needs some aide on the best way to harvest the advantages. Notwithstanding this, there has been a ton of concern on the high number of disappointments of cloud computing which have been specified in different scrutinizes.
The first pillar of information security is protection. Information is an asset that needs to be protected. Because information is managed by third parties, it forms one item that needs to be protected.
Another pillar of information security is detection. It is important to have detection of the breaches that might happen to the data and information that is with the third parties or the data center that is used to store the data.
The other pillar is reaction. In this pillar, the actions that should be undertaken after a breach has taken place will be put into place. In case of cloud computing, there is a need to have strategies and parallel data centers that will be put into use if there are breaches happening in the cloud computing model.
The fourth information security pillar is documentation. There is a need to have documentation of the breaches and the trends of information use within an organisaiton. The documentation will need the agreements between the third-parties and the organisaiton on how they will make use of the data and information that have been assigned to them.
The fifth information security pillar is prevention. There is a nee to have measures to prevent tragedies that might happen in case there are issues that might take place. It is important to have ways in which to prevent attacks from taking place (Government of the Republic of Kenya, 2007). In this aspect, there is a need to prevent attacks targeted at cloud computing data centers.

Pillars of information assurance

Authenticity
Validness includes confirmation of the gatherings included in the data exchange with a specific end goal to determine that they are who the case to be. The legitimacy of data need additionally to be checked and upheld to guarantee important and right data is managed.

Non-repudiation

Non revocation infers the capacity and expectation of one to satisfy their commitments as set out in their contact. It incorporates the capacity of one gathering to recognize having gotten an exchange from the other party and the other party recognizing to having sent the exchange. Routines have been created in electronic organizations to build up non disavowal (Gillam, 2010). These routines incorporate computerized marks and encryption frameworks.

Confidentiality

Privacy suggests keeping data inside of the limits of approved faculty or framework just and not presenting them to others. Innovations used to uphold this part of secrecy incorporate framework encryption of information amid transmission. A sample is Mastercard number exchanges. Classifiedness can likewise be upheld by constraining spots where the data are accessible and that the spots where they are put away ought to additionally be secured (Halpert, 2011). There are numerous structures through which security ruptures can happen. One illustration is allowing somebody to look behind you to your screen when there are vital data showed. Robbery can likewise bring about break of classifiedness. A PC machine which could contain touchy data can be stolen and on the off chance that it falls into the wrong hands the same data can be utilized to damage or uncover business insider facts. It is vital for each business association to actualize secrecy matters so as to ensure their hobbies and in addition their clients intrigues.

Integrity

Notwithstanding information privacy data security ought to consider the part of data respectability. Uprightness in more extensive sense involves straightforwardness in information exchanges. In the event that information is adjusted in travel without the approval frame the applicable substances or if the same is done covertly, then information loses its respectability. Information respectability can be lost through infection debasement, unlawful alteration and wrong calculations or even because of treachery. Fitting component ought to be put set up to guarantee that a wide range of data that any business endeavor is managing is secured. The standards of consistency as saw in excellent ACID model of exchange preparing ought to apply.

Availability

Data must be accessible at whatever time when required if any business is to bode well. The data framework must have it functionalities working appropriately. The channels of correspondence, security controls set up and the medium of capacity ought to be working ideally. Equipment disappointment, power blackouts among different interruptions ought to be made arrangements for. An emergency arrangement ought to dependably be set up in the event of any crisis. The issue of disavowal of administration can likewise be enhanced by guaranteeing accessibility of administration.

References

Gillam, L. (2010). Cloud Computing: Principles, Systems and Applications. New York: Springer.
Government of the Republic of Kenya. (2007). The Vision 2030. The vision 2030 popular version . The Government of Kenya.
Halpert, B. (2011). Auditing cloud computing: A security and privacy guide. New York: John Wiley & Sons.
IBM. (2011). Corporate Marketing. Cloud computing: Building a new technology in Health care , 3 – 20.

Thank's for Your Vote!
Good example of research paper on technology selection. Page 1
Good example of research paper on technology selection. Page 2
Good example of research paper on technology selection. Page 3
Good example of research paper on technology selection. Page 4
Good example of research paper on technology selection. Page 5
Good example of research paper on technology selection. Page 6

This work, titled "Good example of research paper on technology selection" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Research Paper

References

AssignBuster. (2022) 'Good example of research paper on technology selection'. 23 February.

Reference

AssignBuster. (2022, February 23). Good example of research paper on technology selection. Retrieved from https://assignbuster.com/good-example-of-research-paper-on-technology-selection/

References

AssignBuster. 2022. "Good example of research paper on technology selection." February 23, 2022. https://assignbuster.com/good-example-of-research-paper-on-technology-selection/.

1. AssignBuster. "Good example of research paper on technology selection." February 23, 2022. https://assignbuster.com/good-example-of-research-paper-on-technology-selection/.


Bibliography


AssignBuster. "Good example of research paper on technology selection." February 23, 2022. https://assignbuster.com/good-example-of-research-paper-on-technology-selection/.

Work Cited

"Good example of research paper on technology selection." AssignBuster, 23 Feb. 2022, assignbuster.com/good-example-of-research-paper-on-technology-selection/.

Get in Touch

Please, let us know if you have any ideas on improving Good example of research paper on technology selection, or our service. We will be happy to hear what you think: [email protected]