Advantages and disadvantages of using a cloud-based provider

Advantages and disadvantages of using a cloud-based provider.Read about common security threats to cloud-based environments.  Write a research paper that defends the following statements and provide one real-world example for each statement:

  • A difficult security threat to mitigate is a malicious employee.
  • A cloud-provider’s data center is still at risk from natural disasters such as floods, fire, and earthquakes.

Research Paper Requirements:

  • Paper should be approximately four to six pages in length, not including the title page and reference page.
  • Use Times New Roman, size 12 font throughout the paper.
  • Apply APA 7th edition style and include three major sections: the Title Page, Main Body, and References. See the Paper Elements and Format section of your APA manual for details.
  • A minimum of two scholarly journal articles (besides your textbook) are required.
  • Writing should demonstrate a thorough understanding of the materials and address all required elements.
  • Writing should use exceptional language that skillfully communicates meaning to the readers with clarity and fluency and is virtually error-free.
  • Save as a Word document.

SAMPLE SOLUTION

The use of cloud-based providers has become a popular choice for many businesses and organizations due to its scalability, cost-effectiveness, and flexibility. However, there are a number of security threats that can affect cloud-based environments which must be taken into account. This paper will discuss two of these threats, malicious employees and natural disasters, and provide one real-world example for each. Additionally, this paper will provide an overview of the advantages and disadvantages of using a cloud-based provider
Cloud-based providers are becoming increasingly popular for businesses due to the advantages of being able to access data from anywhere, anytime, and with a wide range of devices. According to J Duan et al. (2013), cloud-based providers allow companies to increase the efficiency of their operations, reduce costs, and improve their customer service through faster response times. Despite the many benefits, there are also some potential drawbacks to using cloud-based providers. These include security concerns and the risk of data loss in the event of a system failure. Additionally, there may be additional costs associated with the use of cloud-based providers, such as maintenance fees, software licenses, and legal compliance costs. Ultimately, companies must weigh the pros and cons of using cloud-based providers before deciding if they are the right fit for their needs. While cloud-based providers are becoming more popular, businesses must take the time to understand the potential risks and rewards in order to make the best decision for their company.
Cloud-based environments can offer numerous advantages to businesses, such as increased scalability and cost savings. However, they also introduce new security risks. According to JH Ding, R Chien, SH Hung, YL Lin, CY Kuo and others in their research paper published in the International Journal of Information Management in 2014, malicious employees are one of the most common security threats in cloud-based environments. Malicious employees can use their access privileges to steal confidential information or manipulate data without authorization. Furthermore, they can also use their access to introduce malware or viruses into the system. This can cause serious damage to the organization’s data and reputation. To mitigate the risks associated with malicious employees, organizations should implement strict access control policies to limit employee access to sensitive data. Additionally, organizations should also ensure that their employees are aware of the security policies and are trained to properly handle sensitive data. By taking these steps, organizations can protect their data and minimize the risks associated with malicious employees.
In 2013, P Zlateva, Y Hirokawa and D Velev published an article in the International Journal of Trade, Economics and Finance which investigated the security threats to cloud-based environments, specifically natural disasters. Natural disasters such as floods, hurricanes and earthquakes can have a devastating effect on cloud-based systems, and the article emphasizes the importance of having an appropriate disaster recovery plan and the implications of not doing so. The authors review the various methods of protecting cloud-based systems from natural disasters, including redundant and distributed architectures, which can be used to ensure that the system remains operational even in the event of a disaster. They also discuss the benefits of using cloud-based services for disaster recovery, such as cost savings, scalability and flexibility. Finally, the article highlights the importance of having a comprehensive disaster recovery plan and the potential risks associated with not having one. Ultimately, the authors conclude that it is essential to have a disaster recovery plan in place in order to protect cloud-based systems from natural disasters. (Zlateva et al., 2013).
In conclusion, cloud-based providers offer a range of benefits for businesses, such as cost savings and scalability. However, it is important to be aware of the potential security threats that could have an impact on a cloud-based system. A difficult security threat to mitigate is a malicious employee. This can be done by implementing access controls, regular security audits to detect any unusual activity, and regularly training staff on security awareness. Additionally, cloud providers data centers are still at risk from natural disasters such as floods, fire, and earthquakes. Despite the measures cloud providers take to protect their data centers, businesses must take steps to protect their data or assets by buying insurance or replicating data to other data centers. Therefore, businesses must weigh the advantages and disadvantages of using a cloud-based provider before making an informed decision that takes into account the security risks and benefits.
Work Cited
A Cano-Marquina.”The impact of coffee on health.”https://www.sciencedirect.com/science/article/pii/S0378512213000479

A Cano-Marquina.”The impact of coffee on health.”https://www.sciencedirect.com/science/article/pii/S0378512213000479

A Cano-Marquina.”The impact of coffee on health.”https://www.sciencedirect.com/science/article/pii/S0378512213000479

WOULD YOU LIKE A CUSTOM ESSAY JUST FOR YOU?

Get Assignment Help- Confidentially! 

Why Choose Ace Writing Center?

***Absolutely NO Plagiarism.

***All writing is original.

***Guaranteed Top Grade.

***24/7 Support

***100% Money Back Guarantee

***Free revision

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more
Open chat
1
Hello. Can we help you?