Sunday, October 13, 2019

Essay --

1. CHAPTER 1 INTRODUCTION 1.1. BACKGROUND OF THE STUDY Nowadays, cloud computing system is widely known in business environment. As stated by Potey, Dhote and Sharma (2013) cloud computing already known by people as it is not a new technology but it is consider new in a delivery model for information and services that are normally use existing technology. It connects the communication between client and server side’s services or application by using an internet infrastructure. Cloud service providers (CSP’s) offer cloud platforms for their customers to use and create their web services, much like internet service providers offer costumers high speed broadband to access the internet. Cloud computing is another way to store business information as well as protecting that information. The method of accessing cloud computing is by using internet connection. Stephen Turner said legacy system in all cases is not displacing by the cloud. As a traditional client or server computing, enterprise computing and mainframes are expensive to be maintain and also some information system professionals with some big organizations have make a decision that the change may not be worthwhile the adoption coast and risk to convert to the new model. He thinks business that is small and mid-sized already need to make the upgrades as the cloud computing is a good option to be considered at that stage especially because of the pricing and scalability. It can make them move some or all of their data storage computing that need out of their facilities, make upgrade and allude large upfront expenditures. 1.2 STATEMENT OF THE PROBLEM Cloud computing have been used in the growing storage and data processing needs, but it has also improve in a number o... ... shut down. The available data is not correctly sent to the customer at all times of need. There could be chances of duplication of data in a multiple site when recovering the data. The restoration must be done quickly and complete to avoid any further risks. Conceptual Framework A conceptual framework on the factors of security risks on cloud computing that affect the level of awareness among middle management personnel on selected companies around Klang Valley is shown. The independent variables of the study are factor of security risks. The factors are access, availability, network load, integrity, data security, data location and data segregation. Figure 2.1 Conceptual Framework on the factors of security risks on cloud computing that affect the level of awareness among middle management personnel on selected companies around Klang Valley.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.