The cloud computing provides an integrated platform for the development of the operations of the business organizations (Hashizume et al., 2013). The cloud computing had been implied for forming the improvement of storage options for large amount of data. However, the cloud computing application had been facing issues security flaws. The following report would be helpful for reviewing the security issues of cloud computing and developing the strategies for dealing with these security issues. The development strategies would be managed for forming the smart development of operations and functions. The report would provide some recommendations that would deploy the strong security measures for the cloud security issues.
The cloud computing works as an internet based platform for storing, accessing, and modifying the data access by any user. The cloud computing is a virtual platform for developing the effective and smart development strategies for the operations of the organization (Samarati et al., 2016). The various security issues in the cloud computing are system vulnerabilities, phishing attacks, denial of service attack, data loss/theft, and shared resources. These security issues would result in forming the hindrance in the development of the project operations. The explanation of these security issues for the cloud computing activities are given below,
System Vulnerabilities: The system vulnerabilities are developed due to the networking configuration of the cloud devices. The system configuration of cloud system is developed for forming the wireless access to data and information. However, as pointed by Fernandes et al. (2014), the wireless access had resulted in forming the issue of system complexities. The vulnerabilities of cloud networking had resulted in forming the issues of system integrated operations and development. The development of system vulnerabilities had been deployed for forming the accurate modification of the operational activities of the cloud system.
Phishing attacks: The phishing attack is very common for causing the issue of the development strategies for the cloud network. Hashizume et al. (2013), have stated that phishing has become a common problem for the cloud computing structure due to the open platform of operations for cloud computing. The confidential operations of the cloud computing could be infected by the use of malicious attack on the network. The phishing attack is done for getting into the main server of the cloud network and extracting confidential information like passwords, account information, and log in details of different users.
Denial of service attack: Samarati et al. (2016) have defined denial of service as the network lagging process that would harm the operations of the networking in the cloud computing network. The proxy server sent by the hacker would keep on running a loop query in the network that would make the system busy. The network would not run any other query made by the users resulting in denial of service. The server of cloud computing would be occupied and it would be result in forming the hindrance for running the appropriate functions of the cloud computing operations.
Data loss/theft: Almorsy, Grundy and Muller (2016), have pointed that the data loss and theft is a common issue of the cloud computing technology. The users of the cloud system would be unable to develop active control of the cloud computing system. The data loss had been resulting in the uncommon option of the system security measure. The data loss in the organization had been largely influencing the flow of operations for the organizations. Data loss is being resulted by the uncanny development of the hacking and security infiltration methods for the cloud computing users. The basic development of the uncanny system integration would deploy the security flaw in the system.
Shared resources: The shared resources of the cloud computing had resulted in forming the acute flaw of data integration. According to Kshetri (2013), the shared resources of the cloud network had been largely resulting in causing serious mayhem for forming the appropriate system integration resources. The shared resources had been deployed for causing the accurate errors and flaws of the system integrated flaws for the organization. The shared resources had caused the formation of the data misuse risk. The risk factor for the data storage had resulted in forming inappropriate data use by external users of the cloud network.
The security strategies for the cloud computing had been implied for development of the measures of keeping outside infiltration checked and regulated. The development of strategies would imply the benefit of implementing the security of cloud computing for the business organization. According to Kshetri (2013), the various security issues like system vulnerabilities, phishing attacks, denial of service attack, data loss/theft, and shared resources have resulted in developing threat for the users of the cloud computing network. The various strategies that would be implied for the development of the security functions in the cloud computing are secure design approach, alternative deployment location, monitoring solution, and deploy security as service solution (Almorsy, Grundy & Muller, 2016). The explanation of these strategies have been provided in the table below,
Secure Design Approach: The cloud computing design should be made by forming the development of the effective and smart deployment of the secured design of the cloud application (Modi et al., 2013). The design made can be kept secured by deploying the design using development methodology approach. The security of cloud system can be increased by adding elements of intrusion prevention in the cloud design. The cloud computing is managed by forming the appropriate development of the cloud network for the operations of the cloud network. The development of the cloud security strategies would manage the inclusion of the components of the cloud networking.
Alternative Deployment Location: The alternative deployment would be formed for keeping track of the data modification in the cloud network. As opined by Rao and Selvamani (2015), the deployment of the cloud security functions would help in minimizing the possibilities of security infiltration. The deployment functions had followed the growth of the system based development for the cloud network. The development of systematic development of the cloud computing activities would result in developing the acute development of security functions. The development of the cloud security strategies would manage the inclusion of the components of the cloud networking.
Monitoring solution: The monitoring solution would be deployed for keeping an eye on the ongoing functions of the cloud computing network. According to Modi et al. (2013), there are certain functions that would be deployed for developing the operations of the cloud network solution for the network development. The IDS/IPS is a very important factor that would be deployed for the formation of the effective and smart functions for the cloud system.
Deploy Security as Service Solution: The cloud computing network had been deployed for developing the security function in the cloud network of the organization (Rao & Selvamani, 2015). The security functions like encryption, authorization, and intrusion detection would be helpful for forming the effective and smart deployment of the cloud network solution. The security implementation would prevent the unauthorized functioning of the networking in the cloud network.
Conclusion
It can be concluded from the report that the deployment of the security strategies like secure design approach, alternative deployment location, monitoring solution, and deploy security as service solution would help in overcoming the cloud computing issues like system vulnerabilities, phishing attacks, denial of service attack, data loss/theft, and shared resources. The development strategies would be managed for forming the smart development of operations and functions. The recommendations would help in deploying a strong security measures for the cloud security issues.
Constructive feedbacks on Colleague’s assignment
For 1st Assignment: The report made had focused on the development of the cloud computing issues and solutions. The use of brief introduction had helped in understanding about the report and it would form appropriate introduction to the development operations. The use of appropriate referencing had helped in forming the realization would implement the system. The compact information would be helpful for forming the system integration and development. The issues of cloud computing is developed for implementing the appropriate development of operations for the organization. However, the provided recommendations should have been evaluated in terms of cost and benefit for making the report more appropriate.
For 2nd Assignment: The second assignment made by colleague is on the social media issues and solutions. The report had developed the thorough understanding of the issues caused by social media technologies. The number of social media issues listed by the colleague has covered the technical, operational and financial issues. The report had formed the detailed analysis of the aspects of social media functionalities. The solutions for the social media issues have been explained in the report. The overall scenario of operations within social media would result in causing issues of security and functionality.
The report is being developed for forming development strategies for the operations of the organization. The report had been developed for realizing the operations of the project operations and inclusion of the effective and smart functional development. The report had covered the issues and solution for the implementation of the operations. The recommendations for the project operations would employ the improved operational functions for the solutions of issues of cloud computing.
References
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107.
Fernandes, D. A., Soares, L. F., Gomes, J. V., Freire, M. M., & Inácio, P. R. (2014). Security issues in cloud environments: a survey. International Journal of Information Security, 13(2), 113-170.
Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernandez, E. B. (2013). An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 4(1), 5.
Kshetri, N. (2013). Privacy and security issues in cloud computing: The role of institutions and institutional evolution. Telecommunications Policy, 37(4), 372-386.
Modi, C., Patel, D., Borisaniya, B., Patel, A., & Rajarajan, M. (2013). A survey on security issues and solutions at different layers of Cloud computing. The Journal of Supercomputing, 63(2), 561-592.
Rao, R. V., & Selvamani, K. (2015). Data security challenges and its solutions in cloud computing. Procedia Computer Science, 48, 204-209.
Samarati, P., di Vimercati, S. D. C., Murugesan, S., & Bojanova, I. (2016). Cloud security: Issues and concerns (pp. 1-14). Wiley.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download