.

Saturday, February 16, 2019

Essay --

1.CHAPTER 1INTRODUCTION1.1.BACKGROUND OF THE STUDYNowadays, mist over calculation system is widely known in business environment. As stated by Potey, Dhote and Sharma (2013) foul computing already known by people as it is not a new technology besides it is consider new in a delivery model for discipline and goods that are norm each(prenominal)y use existing technology. It connects the communication in the midst of client and server sides services or coat by utilise an internet infrastructure. sully service providers (CSPs) offer cloud platforms for their customers to use and create their web services, much like internet service providers offer costumers high speed broadband to access the internet.Cloud computing is another way to store business information as come up as protecting that information. The method of accessing cloud computing is by using internet connection. Stephen Turner said legacy system in all cases is not displacing by the cloud. As a traditional client or server computing, enterprise computing and mainframes are expensive to be note and also some information system professionals with some big organizations abide shake off a decision that the change may not be worthwhile the adoption coast and risk to convert to the new model. He thinks business that is small and mid-sized already need to make the upgrades as the cloud computing is a good option to be considered at that coif especially because of the pricing and scalability. It can make them move some or all of their info storage computing that need out of their facilities, make upgrade and allude large upfront expenditures.1.2STATEMENT OF THE PROBLEMCloud computing have been used in the growing storage and information processing needs, but it has also improve in a arrive o... ... shut down. The available data is not correctly sent to the customer at all times of need. There could be chances of duplication of data in a multiple site when recovering the data. The restorat ion moldiness be done quickly and complete to avoid any advertise risks.Conceptual FrameworkA conceptual framework on the factors of protective covering department risks on cloud computing that affect the level of awareness among nub(a) management personnel on selected companies around Klang Valley is shown. The independent variables of the watch are factor of security risks. The factors are access, availability, network load, integrity, data security, data location and data segregation. Figure 2.1 Conceptual Framework on the factors of security risks on cloud computing that affect the level of awareness among middle management personnel on selected companies around Klang Valley.

No comments:

Post a Comment