13,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 1-2 Wochen
  • Broschiertes Buch

Literature Review from the year 2017 in the subject Computer Science - IT-Security, grade: A, Anglia Ruskin University, language: English, abstract: In this paper, we will have a closer look at cloud computing benefits and its security concerns. In addition, we will discuss ways to protect cloud infrastructures.Cloud computing is a new trend of emerging technologies that can help IT professionals to have on-demand, scalable, and broad access IT Services with the lowest possible cost. It is based on the sharing of computing resources among different tenants or consumers. This concept will help…mehr

Produktbeschreibung
Literature Review from the year 2017 in the subject Computer Science - IT-Security, grade: A, Anglia Ruskin University, language: English, abstract: In this paper, we will have a closer look at cloud computing benefits and its security concerns. In addition, we will discuss ways to protect cloud infrastructures.Cloud computing is a new trend of emerging technologies that can help IT professionals to have on-demand, scalable, and broad access IT Services with the lowest possible cost. It is based on the sharing of computing resources among different tenants or consumers. This concept will help in decreasing the capex cost and convert them into opex costs. Furthermore, it helps cloud consumers to make use of the professional expertise of the Cloud service providers which will help him to build a solid infrastructure. However, it also introduces risks that were not known for traditional IT Professionals and this is because of the fact that physical resources are shared by more thanTennant and cloud consumers.Traditionally, information technology infrastructure is designed based on maximum expected capacity. Afterwards, upgrade based on growth in usage or products end of life that require more start-up and operation cost, especially when it requires a team of experts to design and operate this infrastructure. However, Sviokla (2009) argues that IT services can be offered on-demand over a network including infrastructures, platforms, software (Daylmai, 2015) and services such as DOS filtration and security for emails through a data centres that are scattered all over the world called Cloud (Armbrust et al., 2010).Mell and Grance (2011) state that cloud computing is enabling on-demand broad access over the network to computing resources such as servers, storage, applications and services that have the ability to be provisioned quickly with very low management overhead and provider interactions.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Autorenporträt
Haitham Ismail, MSc Information Systems (Systems Security), CISSP Haitham Ismail is a cybersecurity professional who holds his master degree in Information Systems (Systems Security) from Anglia Ruskin University, the United Kingdom in 2018. Currently, He works to get MBA with a concentration in Cyber Security to help me better understand the managerial role of an information security officer. He has 16 years of experience working as a security professional in different sectors (Banking, Government, and Insurance). He works for BUPA Arabia as an IT - Security Manager, which is a leading Insurance company in Saudi Arabia.