Monday, February 10, 2020
Cloud Computing Essay Example | Topics and Well Written Essays - 750 words
Cloud Computing - Essay Example Tayade (2014) explains that due to the emerging complexity of mobile devices, security trends are becoming more prevalent in various firms. Yang et al. (2011) explains that cloud computing in organizations has been essential in the fact that it assists easier access and processing of information. The cloud computing systems have also assisted in effective storage of sensitive information in order to provide minimum security operations. The organizations have been made possible to use enforceable password to unlock screens and implement automatic lock on the device using cloud computing. Cloud computing systems also result in fixed device encryption, which has been installed to maintain the confidentiality of sensitive data whenever there is any theft or loss of the device. Anti-virus, firewall, or anti-malware software is installed in cloud computing systems (Tayade, 2014). Performing system scans has been beneficial since it assists check for any malicious threats or viruses. Ren et al. (2011) argue that cloud computing users do not install applications directly from the internet without having any assurance that the product to be installed is safe or has no malicious code. As such, restrictions on cloud computing users are advantageous because the operators can download applications from any websites and perform third-party software installation (Tayade, 2014). Cloud computing has become an attractive target for many cybercriminals, and the susceptibility of open source application is well documented. This occurs mainly in organizations that use mobile and cloud computing appliances to download apps without applying security practices like installing antivirus software to their devices (Tayade, 2014). Ren et al. (2011) indicate that when suspicious threat occurs, the organizations can limit and restrict mobile access by customers by applying some hardening steps to mitigate security trends. Various organizations face refined cyber security problems
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.