Backups Security Issue Essay Example

Paper Type:  Essay
Pages:  3
Wordcount:  650 Words
Date:  2022-11-20

Introduction

Technology advancements have positively influenced the management of big data. Previously, organizations relied on built-up data centers to handle big data. However, the introduction of automated software in cloud computing have increased efficiency in big data management. Business models of social gaming companies such as Zynga have significantly benefited from the paradigm shift in technology. However, several backup challenges accompany the era of big data including storage, privacy, and integrity (Kaur & Monga, 2016). Zynga uses cloud computing strategies as a refined data backup measure that have streamlined its business operations. Zynga has over 280 million users; as a result, its ability to scale up the number of its service users is crucial in gaining a competitive advantage in the gaming industry (Laudon & Laudon, 2013). Consequently, Zynga uses cloud computing services from Amazon as a strategy of increasing the users of a newly launched game.

Trust banner

Is your time best spent reading someone else’s essay? Get a 100% original essay FROM A CERTIFIED WRITER!

Once Zynga reaches its optimum level of users it switches its backup to Z Cloud, a private data center where it runs its load computing in-house. As a result, Zynga faces the risk of server downtime which has a direct negative impact on the firm's operations. In particular, server downtime affects the security of backed-up data as it increases the likelihood of corrupt data. This risk is accelerated by the fact that Zynga obtains its service from only one cloud provider known as Amazon Web Services. However, moving to a private cloud has its risks due to the usage of too much IT infrastructure and minimal diversification of IT investments increase the risk of facing losses (Laudon & Laudon, 2013). Zynga's main concerns include reliability and security concerns of outsourced cloud computing services.

Measures to Secure Backed-Up Data

Mishandling of data in the backup procedure has the potential of increasing security woes. However, a secure backup can be obtained through the establishment of security policies that include backup- procedures in its scope. Every form of security control measures including access controls, monitoring initiatives, and physical security should be addressed in security policies. These policies should be mentioned in a disaster recovery plan as a measure of ensuring business continuity. Additionally, companies should secure Web-based interfaces that provide backup and ensure access rights are only provided to legit users within the business establishment. Passwords can also provide security against direct threats but encryption is the ultimate backup security measure. Encryption is an effective privacy and security tool that will enhance reliability since it involves strong passphrases. Additionally, the integration of deduplication and cloud storage is a potential solution of the backup concerns such as security issues since data is stored in manageable block size (Anilkumar & Krishnaiah, 2013).

By a different token, the off-site storage mechanisms are an efficient way of providing data security. Off-site measures include the storage of backed-up data in a data center located in an environment external from the main business premise. Factors such as the distance from the main business location have to be taken into consideration when practicing off-site storage. The security of the backed-up data should be guaranteed during the process of transit and in the ne storage data center (Gregory, 2010). Moreover, controlled access should be ensured in the off-site data center to enhance security. Lastly, sign a contract with off-site storage security vendors as a fallback strategy to ensure consistency in the provision of backed-up data security. The provision of secured back-up media will positively impact the capabilities organizations such as Zynga in the delivery of its products and services.

References

Anilkumar, C., & Krishnaiah, R. (2013). A Novel Approach for Unique Data Backup in Cloud Storage. International Journal of Information Technology Infrastructure, 2(4), 25-28.

Gregory, H. (2010). CISSP guide to security essentials. Australia: Course Technology/Cengage Learning.

Kaur, P., & Monga, A. (2016). Managing Big Data: A Step towards Huge Data Security. International Journal of Wireless and Microwave Technologies, 6(2), 10-20.

Laudon, K., & Laudon, J. (2013). Essentials of Management Information Systems. New Jersey: Pearson Education.

Cite this page

Backups Security Issue Essay Example. (2022, Nov 20). Retrieved from https://proessays.net/essays/backups-security-issue-essay-example

logo_disclaimer
Free essays can be submitted by anyone,

so we do not vouch for their quality

Want a quality guarantee?
Order from one of our vetted writers instead

If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:

didn't find image

Liked this essay sample but need an original one?

Hire a professional with VAST experience and 25% off!

24/7 online support

NO plagiarism