#1 RE: Discuss Activity 5.5: End of Unit Activity: Cloud Computing
I agree that business continuity management (BCM) is vital for the survival of any business. It is a preparedness measure that ensures a business does not fail due to factors such as natural disasters. BCM is meant to give organizations the ability to respond to unpredicted and uncontrolled external disasters. Businesses should regularly update BCM to ensure smooth running.
#2 RE: Discuss Activity 5.4: Case studies
I believe that cloud computing will be used even more in the years to come. There are different disadvantages associated with technology, but the advantages supersede the disadvantages by far. Salesforce, Microsoft Dynamics, and other companies offering cloud services for businesses have reported enormous growth in the past years. The disadvantages associated with technology can be mitigated, leaving businesses more advantaged in handling data, customers, adverts, and sales.
#3 RE: Discuss Activity 6.4: End of Unit Activity: From Firewalls to Encryption
RSA encryption uses prime number factorization because large factorizing numbers can take a long time. One can have a public key, which is a product of prime numbers used in the message encryption, but to decrypt the message, you must have a secret key, which is the two numbers used in the factorization. Everyone can have the public key, but it can take one a lifetime to decrypt the message if they do not have the secret key. It is a safe method for encrypting messages.
#4 RE: Discuss Activity 7.4: End of Unit Activities
Information is very important and expensive; thus, every firm is liable for protecting client information. It is illegal for any firm to share personal information. Policies like the IS policy help restrict firms and individuals from sharing personal information. Information leakage has caused negative effects on the victims, and therefore I believe that there should be extra measures taken to protect user's information. In recent cases, Facebook was involved in election illegality through user information leakage. The issue deserves serious attention due to the impact of its effects.
#5 RE: Discuss Activity 8.1: Practical Exercise
Email is the most used form of communication in the world. Almost all internet users have at least one email address. Emails are therefore one of the daily primary targets for a hacker. Email services providers, on the other hand, have developed various encryptions to protect emails. Users have also developed several methods of encrypting their messages, and I think it is a brilliant extra security.
#6 RE: Discuss Activity 8.3: Wireless Network Security
Interoperability helps support information systems, devices or applications connect through WEP encryption. Interoperability is a risky scheme that should not be used due to the many vulnerabilities it has. However, it is very useful in industries like healthcare, where it is not possible to replace all the old devices and system. Interoperability helps integrate the old systems and the new ones, making it possible for researchers and doctors access all information required to accomplish the industry's goals.
#7 RE: Discuss Activity 8.4: End of Unit Activity
Despite each of the seven layers of the OSI model having security elements, many vulnerabilities need to be addressed at each of the levels. The most levels that exploiters concentrate on to exploit these vulnerabilities are from the fourth layer (Physical layer) to the seventh layer (Application layer). It is therefore important for IT experts to identify the vulnerabilities level by level, to help avoid risks caused by attacks.
#8 RE: Discuss Activity 9.1: Your Use of Cloud Services Activity
I have used both google cloud services and AWS. I agree that AWS offers good cloud services. It is easily accessible as one only need to create a Microsoft Outlook account, which is simply creating an outlook email address. The advantages of AWS I appreciate most is the fact that you can access it at any time from any device that can access the internet. It is also convenient and safe as I have never had a problem accessing my data.
#9 RE: Discuss Activity 9.3: Trust In the Cloud
I think trust in cloud computing is not based on the customers competing, rather on the quality of services provided by the provider. For example, Salesforce, the leading company in enterprise cloud computing, hosts their cloud sales for several businesses offering the same services or products. I, therefore, disagree with the post that trust is based on companies accessing the cloud service, rather it depends on the company offering the service. Factors like security and computational time determine trust.
#10 RE: Discuss Activity 9.4: Intrusion Detection and Prevention Systems ITPS Activity
Given that Intrusion Detection Systems (IDS) are meant to detect the flow of data across the network, I believe that they should also have the capability of preventing detected threats or attacks. Intrusion Prevention Systems (IPS) are meant to detect and stop attacks, threats or abnormalities in the network. I believe there is no need for using IDS for only detecting because some attacks are very fast that only detecting them will not help.
Cite this page
Paper Example on Computer Science and Cloud Computing. (2022, Dec 18). Retrieved from https://proessays.net/essays/paper-example-on-computer-science-and-cloud-computing
If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:
- Challenges of Security Department Speech Paper Example
- Ethics and Society of Engineering - Essay Sample
- Small Businesses: Protecting Against Cyberattacks & Minimizing Risks - Essay Sample
- Effective INT Data Collection: Improving Skills to Categorize PIRs - Essay Sample
- Essay Example on WeChat: The Social Media Phenomenon with 1 Billion Users!
- Paper Sample on Effective Management Policies: Cert Revocation Lists, Cert Auth & Digital Certs
- Secure Time Synchronization in Windows Server 2016: UTC & Timestamps