Online Assignment Service

Workshop 1

Examples of Academic research

The two topics which I have chosen and considered as academic research are cyber security and big data. These two topics do have a lot of journal articles to support these concepts with a solid literature background. further since these topics are very much relevant to the current technological based world there is a lot of articles created by multiple writers.to prove the fact that the topics I have chosen support been as academic research some of the journal articles have been referred and attached below.

Cyber Security

“To defend against various cyber-attacks, the companies and organizations should have right policies and procedures in place” (Vijayakumar & Shen, 2022)

 

Examples of Nonacademic research

Nonacademic research are basically the topics which does not have a proper background study l for an instance personal preference.

  • My Favorite Computer Device
  • Why do I prefer the laptop over a Desktop

 

 

Justification for been academic and nonacademic research

Academic research are basically topics which has scholarly articles based on previous studies. These topics do have a solid back ground along with a strong literature review to support the study. Speaking of non-academic research these topics are basically which does not have materials to support the study. for an instance in nonacademic research blogs, web documents and web pages can be used to support the study. These topics does not have any journal articles to support with strong literature reviews.

NIT6130 Assessment 1 - Literature Review

Part A

Abstract

Cloud Computing and Security

Aim of the research

The aim of this research is to identify the use of cloud computing regards to the current technological advancements and how it can be used in different organizations to increase the efficacy and also lessens the related costs. Further to it also have identified the pros and cons of cloud computing and how these cons can be addressed to prevent security breaches and other breaches.

Approach or methodology and innovation  

With regards to different research strategies both qualitative and quantitative methods have been used to conduct this research to get a better understanding of cloud computing and the threats an organization can face.

Expected outcomes and significance

the expected outcome of this research is do a detailed analysis about cloud computing and the security threats which is there along with the technology. This research could also help in identifying these cyber threats before hand and save significant costs along with time wastage.

Round 01

Cloud Computing

Cloud computing could be defined as the delivery of variable services throughout the internet. These resources could include tools and applications such as databases, servers, software, networking & data storage. (Investopedia, 2022) regards to understanding what cloud computing is, it is also a concept known for information been accessed remotely in a virtual space where else organizations which provide cloud services enable the users to store applications and files on remote servers and then later on access those stored specific data through the internet. (Investopedia, 2022) Cloud computing also enables to offer faster analytics and the innovation of flexible resources which would lead towards achieving economies of scale lowering the operating costs whilst running the infrastructure efficiently. (Microsoft , 2022)  Further according to salesforce they have also stated that cloud computing is a method of accessing to various date and information online instead of having it build and manage, maintain all these information in our own server of hard drive. (Salesforce , 2022)it has also been stated that cloud computing has become the perfect method to provide enterprise applications and the preferred solution for organizations whilst extending the infrastructure along with the launch of new innovations. (Infoworld, 2022)

Appendix

Infoworld, 2022. Infoworld. [Online]
Available at: https://www.infoworld.com/article/2683784/what-is-cloud-computing.html
[Accessed 13 October 2022].

Investopedia, 2022. Investopedia. [Online]
Available at: https://www.investopedia.com/terms/c/cloud-computing.asp
[Accessed 13 October 2022].

Microsoft , 2022. AZURE. [Online]
Available at: https://azure.microsoft.com/en-us/resources/cloud-computing-dictionary/what-is-cloud-computing/
[Accessed 13 October 2022].

Salesforce , 2022. Salesforce. [Online]
Available at: https://www.salesforce.com/products/platform/best-practices/cloud-computing/
[Accessed 13 October 2022].

Round 2

Advantaged and Disadvantages of Cloud computing 

Advantages

Reduce Infrastructure cost

To maintain in house data storage units would cost a significant amount of money to organizations. Other than the installation cost it also has other cost components such as maintenance and back up since these should be monitored on a regular basis. (morefield, 2022) Further cloud computing also helps to reduce the amount of number of hardware used along with creating less demand for labour maintenance. Regards to the requirement of less capital investment has also increased the demand for cloud computing for organizations. (TURCO, 2022)

Consolidate data & Enhance Collaboration

Speaking of the mechanism of data distribution within cloud storage, it’s been done amongst bi costal data centres. The syncing technology helps in linking and keeping data updated quickly but with the use of the cloud it makes syncing completely unnecessary since every piece of data is saved and can be accessible anytime. (morefield, 2022)  further with regards to cloud computing it also helps to share files and applications along with doing changes accordingly in real time. This could help to get rid of obsolete documents and keep everything up to date. (morefield, 2022)

Maximization of uptime & Increase Automation

With regards to unplanned downtime, this could cause a significant loss in both time and money. According some of the research which was conducted it has been identified each minute of downtime could cost $5,600 on average which is massive amount. This could also lead towards damaging the reputation of the company. According a root cause analysis for downtime, it has been identified two main reasons which is system failure and human error. Both of these matters could be eliminated by shifting to cloud computing. (morefield, 2022)

Cloud computing also allows automation of routine backups so that organizations does not need to worry in saving data in manual means.

Save on space & stay scalable

Having servers inhouse uses a significant amount of square foot space. Storing date in cloud would eliminate the storage requirement. Where else companies would not even want to worry about high voltage lines, installation of dedicated breakers, special HVAC systems & backup generators. (morefield, 2022) with the less space requirement it is easy for organizations to expand business by recruiting more employees and installing more machinery since there is available square feet in the premises. (morefield, 2022) 

With regards to having all pros in cloud computing it also has its cons along with it such as data loss, theft and leakage, account or service hijacking, denial of service attacks, Insecure interferes and technological vulnerabilities. (Nibusinessinfo, 2022)

Security and Privacy

Although it is known that cloud service providers do implement the best standards of security and do have most of the industry certifications in storing data and files. However still these providers could also be open for other security threats as well. For an instance the hacking of “Code Space” proves the fact that it is also harmful for organizations to outsource all the services, but keep the core in house and the rest to outsource in secure servers. (LARKIN, 2022)

Vulnerability to attack

Since the cloud is known to be a virtual space, the internet is required to access the available data which is stored in the servers. Since all these files are open to the internet, they do have the vulnerability to be accessed to open threats such as loss of data and account hacks. (Peterson, 2022)

 

 

Limited control & Flexibility

With regards to any technical issue in the cloud that occurs since we do not have any control over the server it is required to contact customer service to get the issues resolved which could sometime take more than even a day to be resolved. Further sometimes it could even cost extra money to get the matters fixed. (stratospherenetworks, 2022)

 

Appendix

LARKIN, A., 2022. cloudacademy. [Online]
Available at: https://cloudacademy.com/blog/disadvantages-of-cloud-computing/
[Accessed 14 October 2022].

morefield, 2022. morefield. [Online]
Available at: https://www.morefield.com/blog/pros-and-cons-of-cloud-computing/
[Accessed 13 October 2022].

Nibusinessinfo, 2022. nibusinessinfo. [Online]
Available at: https://www.nibusinessinfo.co.uk/content/disadvantages-cloud-computing
[Accessed 13 october 2022].

Peterson, R., 2022. Guru99. [Online]
Available at: https://www.guru99.com/advantages-disadvantages-cloud-computing.html
[Accessed 14 October 2022].

stratospherenetworks, 2022. stratospherenetworks. [Online]
Available at: https://www.stratospherenetworks.com/advantages-and-disadvantages-of-cloud.html
[Accessed 14 October 2022].

TURCO, K., 2022. technologyadvice. [Online]
Available at: https://technologyadvice.com/blog/information-technology/4-ways-cloud-computing-can-save-money/
[Accessed 13 October 2022].

Round 3

Cloud Security

With regards to the disadvantages of cloud computing to prevent security breach of data and other access to loss of data measures were taken place by different organizations as well as government bodies. (Hill, 2022) speaking of cloud security this could be defined as a set of policies and control procedures taken place to control cloud-based systems used by different technologies. (Forcepoint , 2022) regards to cloud security this is also protecting the system by other cyber security threats such as hacking and other vulnerabilities a system could face. (digitalguardian, 2022) these threats could take place in both hardware and also software (techtarget, 2022)

 

Appendix

digitalguardian, 2022. digitalguardian. [Online]
Available at: https://digitalguardian.com/blog/what-cyber-security
[Accessed 15 October 2022].

Forcepoint , 2022. Forcepoint. [Online]
Available at: https://www.forcepoint.com/cyber-edu/cloud-security
[Accessed 15 October 2022].

Hill, M., 2022. CSO. [Online]
Available at: https://www.csoonline.com/article/3674954/23-notable-government-cybersecurity-initiatives-in-2022.html
[Accessed 15 October 2022].

techtarget, 2022. techtarget. [Online]
Available at: https://www.techtarget.com/searchsecurity/definition/cybersecurity
[Accessed 15 October 2022].