.

Tuesday, March 26, 2019

Essay --

1.CHAPTER 1INTRODUCTION1.1. ambit OF THE STUDYNowadays, cloud computer science agreement is widely known in business environment. As stated by Potey, Dhote and Sharma (2013) cloud computing already known by people as it is not a in the raw technology but it is consider new in a economy model for randomness and operate that are normally use animated technology. It connects the communication between client and server sides utilitys or application by using an internet infrastructure. Cloud service providers (CSPs) offer cloud platforms for their customers to use and create their web services, much kindred internet service providers offer costumers high speed broadband to penetration the internet.Cloud computing is another way to store business information as well as protecting that information. The method of accessing cloud computing is by using internet connection. Stephen Turner said legacy system in all cases is not displacing by the cloud. As a traditional client or server computing, enterprise computing and mainframes are costly to be maintain and also many information system professionals with some big organizations have fetch a decision that the change may not be worthwhile the adoption coast and risk to transform to the new model. He thinks business that is small and mid-sized already motivation to make the upgrades as the cloud computing is a good option to be considered at that stage especially because of the pricing and scalability. It can make them snuff it some or all of their data storage computing that need out of their facilities, make upgrade and allude large upfront expenditures.1.2 disputation OF THE PROBLEMCloud computing have been used in the ripening storage and data processing needs, but it has also improve in a number o... ... shut down. The available data is not flop sent to the customer at all times of need. There could be chances of duplication of data in a multiple site when convalescent the data. The restoration mu st be done quickly and complete to forefend any further risks.Conceptual modelingA conceptual cloth on the factors of security risks on cloud computing that affect the take of awareness among middle management personnel on selected companies around Klang vale is shown. The independent variables of the study are factor of security risks. The factors are access, availability, net profit load, integrity, data security, data location and data segregation. Figure 2.1 Conceptual Framework on the factors of security risks on cloud computing that affect the level of awareness among middle management personnel on selected companies around Klang Valley.

No comments:

Post a Comment