Friday, December 6, 2019

Cloud Computing Architecture And Challenges â€Myassignmenthelp.Com

Question: Discuss About The Cloud Computing Architecture And Challenges? Answer: Introducation This article discussed about the implementation of different theories and concepts on the network security. According to the author, in the current business scenario, determination of the issues in the network security is much complicated than ever. This is due to the reason that, information technologies are being used in every aspects of the current of the current scenario. Thus, identification of the origination of the issue in the network gets difficult. Thus, accounting to the author, it is necessary that various effective concepts and theories should be implemented in order to determine the network security effectively. This article discussed about the game theory. According to this article, game theory will help to effectively and accurately determine the overview of the security and privacy in a particular network. In the article, game theoretic approaches are being involved along with various other aspects. The research work is being further divided in to various applications based on the security and privacy problems. Afterwards, six categories are being initiated, which includes security of the physical and MAC layers, security of self organizing networks, anonymity and privacy, intrusion detection system, cryptography and economics of network security. This article concludes that, effective implementation of the game theory will help to determine the network security more effectively. This article states the disadvantages of the cloud computing in determining the network security systems. According to the authors, cloud computing offers huge opportunities for the business organizations. This is due to the reason that, in the case of the cloud computing, more numbers of data can be stored in the system and in a more secured manner. Thus, it helps in effectively determining and classifying the complex data management systems. In addition, the initiation of the cloud computing also helps in reducing the huge cost or investment being involved in maintaining the network security systems. Another key advantage of cloud computing being identified in this article is the flexibility. Cloud computing enables the user in modifying the utility according to the requirement of the organizations. However, there are various challenges of cloud computing are also being stated in this article. According to the author, apart from the advantages being possessed by the cloud computing, there are challenges such as lack of confidentiality and integrity may be faced by the organizations. This is due to the reason that, in the case of the cloud computing, all the information is being uploaded in the online portal, which may cause breach of security. This article has given a holistic approach of network security system. This article discussed about the evolution of the network security from the time of emergence of internet to the present time. According to the author, emergence of the internet is the key enhancing factor for the network security systems. This is due to the reason that, in the present business scenario, the majority of the network systems are being regulated online. Thus, the contemporary approach of the network system is much more effective as well as efficient for the business organizations. this article also discussed the importance about the intranet also along with the initiation of the internet. According to the author, intranet for the internal communication system in the business organizations also helps in effectively manages the network system. The more will be the effectiveness in the usage of the internet and other networking tools, the more will be the effectiveness of the network system. This article concludes that, network security systems faces different types of security breaches along with other challenges. In addition, in the current business scenario, the emergence of the online medium in the network support systems is also enhancing the vulnerability of security breaches for them. Thus, according to this article, the design and the process of implementation of the network systems will help to enhance and prevent the breaches in the network security systems. Abstract The key motive of this case study is to discuss about the effectiveness of the network security systems in relation to the past and present business scenario. In this case study, it is being discussed that, in the current business scenario, majority of the institutions faces diversified security breaches (Hoque et al. 2012). Thus, it is much difficult for them to identify the origination of the issue in the particular network security systems. In this case study, various advantages are also being discussed regarding the effectiveness of the network security systems. One of the key advantages being identified is the cost effectiveness (Jadeja and Modi 2012). It is being concluded that initiation of the cloud computing in the network security systems will help the business organizations in reducing their associated cost (Zissis and Lekkas 2012). Moreover, another advantage that can be tapped by the business organizations in the case of the cloud computing is the flexibility. It will he lp the business organizations in modifying the systems according to their requirements. Thus, evaluation of various aspects in this case study helped to conclude that effective implementation of the network security systems will help the organizations in reducing or preventing the associated risk with the network systems. Security threats such as breach of the privacy and confidentiality should be effectively managed by the organization in order to maintain their privacy. Thus, it is being concluded that, from the emergence of the internet, network security systems has evolved radically and the it is important for the business organizations to effectively adhere with the change. Reference Daya, B., 2013. Network security: History, economics, and future.University of Florida Department of Electrical and Computer Engineering. Hoque, M.S., Mukit, M., Bikas, M. and Naser, A., 2012. An implementation of intrusion detection system using genetic algorithm.arXiv preprint arXiv:1204.1336. Jadeja, Y. and Modi, K., 2012, March. Cloud computing-concepts, architecture and challenges. InComputing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference on(pp. 877-880). IEEE. Manshaei, M.H., Zhu, Q., Alpcan, T., Bac?ar, T. and Hubaux, J.P., 2013. Game theory meets network security and privacy.ACM Computing Surveys (CSUR),45(3), p.25. Ren, K., Wang, C. and Wang, Q., 2012. Security challenges for the public cloud.IEEE Internet Computing, psychology, pp.69-73. Zissis, D. and Lekkas, D., 2012. Addressing cloud computing security issues.Future Generation computer systems,28(3), pp.583-592.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.