Question 20201116

  

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Your Research Project on “Cloud computing” topic the surveillance state consists of two parts:

1 a Powerpoint presentation consisting of at least 12 slides not including title and references.

2. 750 word research  paper with at least 3 sources. There should be no lists. Write in essay format not outline format. Include a meaningful title.

Do not double space.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

You must include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line

There should be no lists – bulleted, numbered or otherwise. 

Write in essay format with coherent paragraphs not in outline format. Distribute your quotes among the paragraphs.

Do your own work. Zero points will be awarded if you copy other’s work and do not cite your source or you use word replacement software. 

Date: November, 17 2020

PLAGIARISM SCAN REPORT

36%
Plagiarised

64%
Unique

910
Words

6767
Characters

Exclude Url : None

Content Checked For Plagiarism

Cloud Computing Abhilash Sangem New England Collage 11-17-2020 ? Cloud computing entails the delivery of computing resources and

other hosted services via the internet. Over recent years more companies are moving to cloud services and preferring to rent the cloud

services by paying for what they use only as opposed to owning their computing infrastructure. In return, the companies benefit by avoiding

upfront costs associated with owning and maintaining their information technology infrastructure. Alternatively, cloud service providers get

to benefit from large economies of scale through the provision of the same services to a wide range of customers. This paper will look at the

cloud service available, benefits, security risks, and available solutions for the same. There are three service models associated with cloud

computing. They include “software as a service, Platform as a Service, and Infrastructure as a Service.” Software as a service model

represents the largest market share regarding cloud computing with a report by Robert et al., (2020) projecting its sales to reach $117

billion by 2021. Software as a Service uses the internet to deliver applications to users directly. The applications are usually managed by a

third-party vendor hence upon seeking such services an organization avoids the need to download and install the software but instead runs

the program directly. Platform as a Service provides a platform that users can use for developing and delivering applications without the

need for working with Integrated Development Environments or installing development programs. Infrastructure as a Service provides

computing resources such as storage facilities, virtual private servers, processing power, and networks over the web. According to Kumar

et al., (2018) “the major benefits associated with cloud computing include cots, availability, flexibility, automation, reduced carbon footprint,

disaster recovery, and security.” Cloud computing provides an alternative way for accessing computing resources hence organizations save

on cost acquiring and maintaining computing infrastructure. Cloud services are usually available full-time hence ensuring continuity in

operations for organizations. In addition, cloud computing offers flexibility in terms of capacity as organizations can upscale or downscale

easily hence promoting efficiency. Automated solutions associated with cloud computing ensures continuous automatic update on software

and security hence workers can focus on other important things. Cloud computing also promotes sustainable efforts through the reduction

of carbon footprints by minimizing wastage of resources as organizations make use of only what they need. Cloud computing is faced with

several challenges regarding security. According to Robert et al., (2020) “some of the biggest security issues associated with cloud involve

misconfigurations, unauthorized access, hijacking accounts, and insecure interfaces.” Cloud misconfigurations are now a major security risk

for organizations adopting or moving to the cloud. They involve security risks that arise when cloud configuration is not done properly hence

exposing assets of the organization to possible security breaches. Currently, cloud misconfiguration represents the biggest threat that is

facing enterprise cloud security. The human factor in such misconfigurations is a concern for many with human error accounting for most

misconfigurations when it comes to cloud solutions. According to the 2018, IBM X-Force Report “data breaches with regard to cloud

misconfigurations increased by 424% due to human error.” Some of the challenges associated with misconfigurations include permission

controls, access restrictions, and AWS security misconfigurations. AWS security group involves misconfigurations with regard to EC2 server

instances which offers security between the port and protocol access level. A misconfiguration related to this group would allow an attacker

to gain access to the servers that are based in the cloud and have unauthorized access to the data. Access restrictions misconfigurations

happen when there are inadequate access restrictions that can prevent unauthorized access to the cloud infrastructure putting most

organizations around the world at risk. Permission controls misconfigurations come about when the organization fails to apply the least

privilege principle hence creating many security risks (Xu, 2017). As of such permissions relating to accounts of individuals are not limited

hence users or individuals can perform unrestricted actions that may not relate to the service they seeking on the platform hence ending up

compromising the security of the organization as a result. In conclusion, combating cloud security issues requires a shared effort between

both the customer and the cloud service provider. With regard to customers, strong access privileges ought to be enforced, strong

password policy and encryption solutions adopted. The service provider on the other end ought to ensure they avoid misconfigurations and

provide patching solutions. In addressing misconfigurations organizations need to adopt automation solutions. With more automated

information technology security tasks an organization is better placed and prepared to see to it that hybrid cloud complexities are reduced

and improved network visibility which will prevent any misconfigurations from happening. Additionally use of embedded security processes

and a mixture of human-controlled and fully autonomous methods in validating policy settings and conducting real-time network testing

should see to it that an organization has consistent security in its cloud platforms (Subramanian & Jeyaraj, 2018). ? References 2018 IBM X-

Force Report: Shellshock Fades, Gozi Rises, and Insider Threats Soar. (2018, April 4). Security Intelligence.

https://securityintelligence.com/2018-ibm-x-force-report-shellshock-fades-gozi-rises-and-insider-threats-soar/ Kumar, P. R., Raj, P. H., &

Jelciana, P. (2018). Exploring Data Security Issues and Solutions in Cloud Computing. Procedia Computer Science, 125, 691–697.

https://doi.org/10.1016/j.procs.2017.12.089 Robert, A., Gupta, A., Shenoy, V., Sitaram, D., & Kalambur, S. (2020). Predicting Hadoop

misconfigurations using machine learning. Software: Practice and Experience, 50(7), 1168–1183. https://doi.org/10.1002/spe.2790

Subramanian, N., & Jeyaraj, A. (2018). Recent security challenges in cloud computing. Computers & Electrical Engineering, 71, 28–42.

https://doi.org/10.1016/j.compeleceng.2018.06.006 Xu, T. (2017). Hardening Cloud and Datacenter Systems against Misconfigurations:

Principles and Tool Support. Escholarship.org. https://escholarship.org/uc/item/46h596p3

3% Plagiarised

https://en.wikipedia.org/wiki/IT_as_a_service

28% Plagiarised

… homework help>CC Final Project. 6/5/2020 Originality Report. https://blackboard.nec.edu/webapps/mdb-sa-

BB5b75a0e7334a9/originalityReport/ultra?

https://www.homeworkmarket.com/files/plagrismreport-pdf-6129271

3% Plagiarised

2018 IBM X-Force Report: Shellshock Fades, Gozi Rises and Insider Threats Soar. The IBM X-Force team examined numerous

cyberthreats that shaped the threat landscape in 2017 and will continue to have an impact in 2018.

2018 IBM X-Force Report: Shellshock Fades, Gozi Rises and Insider Threats Soar

3% Plagiarised

Jan 15, 2018 — Exploring Data Security Issues and Solutions in Cloud Computing. January 2018; Procedia Computer Science 125:691-

697.

https://www.researchgate.net/publication/322350078_Exploring_Data_Security_Issues_and_Solutions_in_Cloud_Computing

Calculate your order
Pages (275 words)
Standard price: $0.00
Client Reviews
4.9
Sitejabber
4.6
Trustpilot
4.8
Our Guarantees
100% Confidentiality
Information about customers is confidential and never disclosed to third parties.
Original Writing
We complete all papers from scratch. You can get a plagiarism report.
Timely Delivery
No missed deadlines – 97% of assignments are completed in time.
Money Back
If you're confident that a writer didn't follow your order details, ask for a refund.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
Power up Your Academic Success with the
Team of Professionals. We’ve Got Your Back.
Power up Your Study Success with Experts We’ve Got Your Back.

Order your essay today and save 30% with the discount code ESSAYHELP