Cloud Computing

Running Head: CLOUD COMPUTING 1
Cloud Computing
Name:
Institution:
Date:
CLOUD COMPUTING 2
Introduction
Cloud computing, which is a subdomain of computer security includes a set of policies,
controls as well as technologies. Through the pre-stated aspects, cloud computing mainly targets
protecting a computer data as well as application (Bassi & Chaudhary, 2015). Such is achieved
through the presence of processes in cloud computing security which address the security control
that particularly the cloud provider ought to include in order to maintain the customer's privacy,
data security as well as compliance with the laid regulations.
Arguably, cloud computing differs from the traditional network architectures in two
significant ways. First, there is a significant difference between the two in relation to execution,
which is more often referred to as virtualization. Virtualization takes the lane to allow massive
scalability as well as offering clients virtually unlimited resources (Salam, 2012). In line with
virtualization, it is worth noting that, in the traditional networking, the servers are fixed in
hardware. Such hence accounts for one to spend more money to upgrade and at the same time
encounter more limits in the case that one needs to scale more users compared to those that the
hardware can hold (Salam, 2012). However, the above are all different in cloud computing since
it offers an opportunity of multiple servers without similar limitation as depicted in the
traditional networking architecture. For instance, in cloud computing, through virtualization, one
is able to provide only the resources that a specific user needs hence offering cloud computing a
greater scalability (Salam, 2012). Besides the second major difference between the two lies on
the aspect of cost-effective. While in traditional network architecture, in the case one need to
scale more users, such will, in turn, result to incurring more cost, in agreement with Salam
(2012), with cloud computing being capable of scaling multiple users, such hence account for it
CLOUD COMPUTING 3
being cost effective when compared to traditional networks. Supportively, Salam (2012) brings
to lights that, unlike cloud computing, in traditional networking, once I required to pay
everything from hardware, installation, maintenance to the monthly fee, which accounts for its
being more expensive than cloud computing hence less cost-effective.
To my perception, and based on my evaluation on cloud computing, I hold the view and
premise that, in future, cloud computing will be more effective unlike at the moment when it is
on its initial and early stage. Such is since there is the likelihood of more advanced and
inventions in line with cloud computing. The advancement and inventions will seek to make
cloud computing more efficient in attaining its set target of offering security to computer data,
application and users besides ensuring that it complies with the set laid regulation. Therefore, it
is arguable that with the presence of advancements and inventions targeting cloud computing,
there is a high possibility that in future, cloud computing will be more effective towards
delegating its set targets.
Arguably, in future, cloud computing is likely to encounter a higher adoption rate by
companies. The pre-stated is based on two major reasons. First, with cloud computing being
cheap and cost-effective when compared to traditional networking, more companies are likely to
adopt it since they will reduce the expenses. For instance, companies will adopt cloud computing
since they will not incur everything from hardware, installation, maintenance and monthly or
annual fee like in the case of traditional networking (Salam, 2012). Besides, companies will
adopt cloud computing at a higher rate, since it will offer them the opportunity for multiple users
and at the same time can be able to offer single user their specific preference needs, unlike in
traditional networking.
CLOUD COMPUTING 4
In conclusion, although cloud computing has numerous benefits when compared to
traditional networking, it is prone to various risks that can limit its effectiveness. Such risks can
be curb through the presence of various technologies and solutions. For instance, cloud
computing ought to embrace a monitoring and evaluation software. A significant example is
embracing the presence of user access platforms as well as hardware that are both hosted and
maintained by the provider (Parms, 2016). Such will help in monitoring the activities of the
users, based on the fact that cloud computing. Besides, other solutions include such as
organizations using cloud computing renting aspect such as firewalls, virtual data centers,
virtual machines as well as VPN. In agreement with Parms (2016), monitoring and evaluation is
the only best method that can be applied in order to reduce potential risks to cloud computing.
CLOUD COMPUTING 5
References
Bassi, S., & Chaudhary, A. (2015). Cloud Computing Data SecurityBackground and Benefits.
International Journal of Computer Science & Communication, 6(1).
Parms, J.(2016).How to mitigate your cloud computing risks. ITProPortal Inc.
Salam, A.(2012).Traditional Networks Vs. The Cloud.Big Data, Cloud Computing, Saas,
Security. CloudTweaks Inc.

Place new order. It's free, fast and safe

-+
550 words

Our customers say

Customer Avatar
Jeff Curtis
USA, Student

"I'm fully satisfied with the essay I've just received. When I read it, I felt like it was exactly what I wanted to say, but couldn’t find the necessary words. Thank you!"

Customer Avatar
Ian McGregor
UK, Student

"I don’t know what I would do without your assistance! With your help, I met my deadline just in time and the work was very professional. I will be back in several days with another assignment!"

Customer Avatar
Shannon Williams
Canada, Student

"It was the perfect experience! I enjoyed working with my writer, he delivered my work on time and followed all the guidelines about the referencing and contents."

  • 5-paragraph Essay
  • Admission Essay
  • Annotated Bibliography
  • Argumentative Essay
  • Article Review
  • Assignment
  • Biography
  • Book/Movie Review
  • Business Plan
  • Case Study
  • Cause and Effect Essay
  • Classification Essay
  • Comparison Essay
  • Coursework
  • Creative Writing
  • Critical Thinking/Review
  • Deductive Essay
  • Definition Essay
  • Essay (Any Type)
  • Exploratory Essay
  • Expository Essay
  • Informal Essay
  • Literature Essay
  • Multiple Choice Question
  • Narrative Essay
  • Personal Essay
  • Persuasive Essay
  • Powerpoint Presentation
  • Reflective Writing
  • Research Essay
  • Response Essay
  • Scholarship Essay
  • Term Paper
We use cookies to provide you with the best possible experience. By using this website you are accepting the use of cookies mentioned in our Privacy Policy.