User talk:Taylorjamia

CLOUD COMPUTING by Jamia P.

Introduction Cloud computing is a way to store information or data at the blink of an eye. It has become more popular in recent times with different growing companies like Apple, Samsung, AT&T, Amazon, and many others. Although it is convenient, it poses many security risks to its users. In today’s world, hackers are always trying to find new ways to obtain information. Cloud computing can be another passage that can allow hackers access to unauthorized information. Current Use Cloud computing is mostly used by consumers that would like to store their data. Most individuals with a smart phone or computer has the ability to access to cloud storage. For example, iPhone users have the ability to download their music from iTunes. To back up their music and other data, they can choose to store it in the cloud or iCloud. By doing this, they can log in via any device other than their iPhone and still be able to access the data stored from the cloud. Another use for the cloud is the ability for companies to transfer mass data amongst employees. This process can be best called cloud sharing. Many companies are beginning to use cloud computing because of the lowered operating cost as well as the broad network access. The lower operating cost allows the companies to only be charged for what they need on demand. The broad network access allows the company to access the server in many different ways “such as mobile phones, laptops and PDAs” (Syal & Goswami 2012). Security Aspect Even though the cloud is convenient, it poses many faults in relation to its security. There is essentially blind trust put into a company that your information or data will be protected. Larger, growing companies not only appeal to consumers but also to hackers as well. Hackers are people who perform unauthorized intrusions and gain access to data. There are several different types of clouds. There can be public, private, hybrid, and virtual private clouds. Many large companies, including the military, use the virtual private cloud or VPC. The “VPC provides seamless transition from a proprietary service infrastructure to a cloud-based infrastructure, owing to the virtualized network layer” (Syal & Goswami 2012). This type of cloud has flexible security which allows the company more control. For example, a hospital will have its own network. A doctor working in the hospital may need to access the hospital’s network drive to store patient information. To access the drive from their home laptop, they will have to log into the hospital’s virtual private network (VPN) to access the hospital’s network drive. The physician will need to have a log in ID and password ad given permission from the IT specialist at the hospital to gain access into VPN. Ethical/Social Implications Ethical implications regarding cloud computing are similar to the security risks that it poses. Policy holders have the moral duty to be honest with customers regarding security policies. Confidentiality and leaking of information can also cause ethical and social concern. A few years ago, Apple’s cloud server, or iCloud, was hacked. During the hacking process, several celebrities’ photos were leaked and displayed via the Internet. This incident was a huge wake up call for this generation to see that even larger companies can be hacked and just how easily it can be done. Personal information or any information stored in a cloud setting has the potential to be hacked. One ethical or social implication to be taken away from this instance is that this generation must recognize the risk of storing sensitive information in the cloud.

Future Use Like all technology, the future of cloud computing will continue to grow and expand. Some improvements that can be made deal with the vulnerability, reliability, and lack of standards. Feedback from consumers will also be influential in the growth of cloud computing. One way to improve reliability is by creating applications that will better fit the cloud server compatibility. “To eradicate the vulnerability there is need to prevent, detect, and recover from such attacks will become increasingly important as more people and organizations use cloud computing for critical applications” (Syal & Goswami 2012). To ensure standards are formed and met, there needs to be guidelines or minimal objectives that companies should be upheld to.