From the week’s chapter reading, we learn from the authors that, the use of mobile devices in our society today has indeed become ubiquitous

Risks of Cloud Computing

Chapter 14 – From the week’s chapter reading, we learn from the authors that, the use of mobile devices in our society today has indeed become ubiquitous. In addition, CTIA asserted that over 326 million mobile devices were in use within The United States as of December 2012 – an estimated growth of more than 100 percent penetration rate with users carrying more than one device with notable continues growth. From this research, it’s evident that mobile computing has vastly accelerated in popularity over the last decade due to several factors noted by the authors in our chapter reading.

Q1: In consideration with this revelation, identify and name these factors, and provide a brief discussion about them?

Answer (More than 10 lines )

Chapter 15 – According to Crocker and Smallwood, cloud computing represents one of the most significant paradigms shifts in information technology (IT) history, due to an extension of sharing an application-hosting provider that has been around for many years, and was common in highly regulated vertical industries like banks and health care institutions. The author’s knowledge from their research continue to assert that, the impetus behind cloud computing lies on the idea that it provides economies of scale by spreading costs across many client organizations and pooling computing resources while matching client computing needs to consumption in a flexible, real-time version.

Q2: Even with this great news about the benefits of the cloud computing applications, the authors have warned the business user community regarding the dangers associated with cloud computing applications. Please identify and name these grave dangers/risks that pose as concerns, and briefly support your discussion.

Answer ( More than 10 lines )

Answer preview…………………

Risks of Cloud Computing

Most of the risks associated with cloud computing are concerned with weak measures in cloud computing security. Loss of intellectual property is among the risks due to security breaches. Cyber attackers can gain accessibility to sensitive data stored in the cloud by organizations. Another risk is violation of compliance requirements and regulatory action (“Risks of cloud computing | Business Queensland”, 2019). Organizations must ensure that they understand the location of their data, those who have accessibility to it and how the data is being……………..

APA 208 words

Share this paper
Open Whatsapp chat
1
Hello;
Can we help you?