Saturday, June 1, 2019

Essay --

1.CHAPTER 1INTRODUCTION1.1.BACKGROUND OF THE STUDYNowadays, cloud reckon system is widely known in business environment. As stated by Potey, Dhote and Sharma (2013) cloud computation already known by people as it is not a new technology but it is consider new in a delivery model for information and services that are norm everyy use existing technology. It connects the communication between client and server sides services or application by using an internet infrastructure. Cloud service providers (CSPs) offer cloud platforms for their customers to use and create their web services, much want internet service providers offer costumers high speed broadband to access the internet.Cloud computing is another way to store business information as well as protecting that information. The method of accessing cloud computing is by using internet connection. Stephen Turner said legacy system in all cases is not displacing by the cloud. As a traditional client or server computing, enterprise c omputing and mainframes are expensive to be maintain and too some information system professionals with some big organizations have make a decision that the change may not be worthwhile the borrowing coast and risk to convert to the new model. He thinks business that is small and mid-sized already need to make the upgrades as the cloud computing is a just option to be considered at that stage especially because of the pricing and scalability. It can make them move some or all of their data storage computing that need out of their facilities, make upgrade and allude large upfront expenditures.1.2STATEMENT OF THE PROBLEMCloud computing have been used in the developing storage and data processing needs, but it has also improve in a number o... ... shut down. The available data is not correctly move to the customer at all times of need. There could be chances of duplication of data in a multiple site when recovering the data. The restoration mustiness be done quickly and complet e to avoid any further risks.Conceptual FrameworkA conceptual framework on the computes of security risks on cloud computing that affect the level of awareness among middle management personnel on selected companies around Klang Valley is shown. The independent variables of the study are factor of security risks. The factors are access, availability, network load, integrity, data security, data location and data segregation. Figure 2.1 Conceptual Framework on the factors of security risks on cloud computing that affect the level of awareness among middle management personnel on selected companies around Klang Valley.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.