Featured Post

Cloud Computing Security Essay Example | Topics and Well Written Essays - 1000 words

Distributed computing Security - Essay Example This paper will think about a portion of the diary articles that address distributed compu...

Thursday, August 27, 2020

Cloud Computing Security Essay Example | Topics and Well Written Essays - 1000 words

Distributed computing Security - Essay Example This paper will think about a portion of the diary articles that address distributed computing security. Bisong and Rahman (2011) note that numerous business associations are starting to embrace the distributed computing innovation as a technique for chopping down expense in order to expand the company’s benefit. They contend that cloud numerous organizations, which have embraced this idea, have received a ton of rewards by chopping down cost, sparing time and expanding their adaptability. In spite of the advantages, Bisong, and Rahman (2011) alerts that there is various security issues related with distributed computing innovation that an association needs to manage viably to look after secrecy, respectability, and dependability. Thus, Bisong and Rahman (2011) addresses all the security concerns related with distributed computing innovation in an association, for example, the danger, powerlessness and dangers in their diary article named, â€Å"An Overview of the Security Co ncerns in Enterprise Cloud Computing† Qaisar and Khawaja (2012) through a diary article named, â€Å"Cloud Computing: Network/Security Threats and Countermeasure†s concur with the view communicated by Bisong and Rahman (2011) that numerous organizations today are anticipating receiving the distributed computing idea since it is prudent as far as cost in this manner bringing about improved gainfulness. In this article, Qaisar and Khawaja (2012) investigate the security concerns related with distributed computing idea. In any case, not at all like in the past article by Bisong and Rahman (2011) the article by Qaisar and Khawaja (2012) goes further to talk about the different sorts of distributed computing that are accessible for use. The third article â€Å"Is Cloud Computing Secure?† by Brittanny Lyons (2011) additionally recognizes that distributed computing has been of incredible advantages to numerous organizations, which have figured out how to embrace the ide a. Lyons (2011) gives a case of Amazon and Google that utilizes the distributed computing innovation to deal with their systems. Be that as it may, the article like the past two articles looks at how safe the innovation is for overseeing business systems in an association. Lyons (2011) contends that distributed computing is secure similarly as the standard figuring innovation. By and by, the article additionally concurs with different articles that there are security gives that must be thought about before receiving the idea in an association. This incorporates programmers, infections, worms, and digital fear mongers. Different dangers noted incorporate absence of security since the suppliers can get to the information being transferred through the framework. With respect to style utilized, the initial two insightful diaries are written in formal scholarly styles. This is obvious as the articles have the theoretical, presentation area, end and the book reference/reference segments. The substance is additionally completely and nitty gritty, as the analysts seem to have dove deep when directing the examination. For example, it very well may be seen that the two academic diaries dove deep to talk about the distributed computing security related issues by giving models just as how to counter the dangers as noted in the article by Qaisar and Khawaja (2012). The two insightful diaries additionally have various outlines and diagrams, which have been utilized for showing data. For example, the article by Bisong

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.