blog




  • Essay / Current and Future Trends in Information System Infrastructure

    One of the major benefits offered is technological mobility, as it allows employees to access the organization's data from wherever they are find, and the flexibility of the service allows the development of the business without resorting to additional infrastructure. (Whitton, 2011).Say no to plagiarism. Get a tailor-made essay on “Why violent video games should not be banned”? Get an original essay The promises of this technology are linked to the design and implementation of more efficient and less efficient application infrastructure solutions. expensive. But the main challenge for these applications remains the platform used, which is an insecure environment: the Internet. Issues such as data availability, environment security, performance unpredictability, and vendor dependency characterize Cloud Computing technology. When talking about data security and privacy, there are many disputes and suspicions. The main obstacles to implementing Cloud computing in business activity are dependence on suppliers or intermediaries (Internet connection) and the lack of security of data stored in the Cloud, as a service provided without the use of physical components. Companies' hesitation is justified when considering that confidential company information is collected, stored and possibly processed by third-party companies, which may be connected to other contracted individuals who may or may not be interested in this data (ENISA, 2009). Data localization can also be an issue given data privacy laws that restrict data access and movement across borders for certain categories of data. This type of restrictions should be taken into consideration since providers are not as clear when referring to data localization or providing certain guarantees that these restrictions are respected. Data protection is today a weak point in Cloud Computing. The technology is still young and therefore data security cannot be guaranteed in the cloud. Data protection refers to controls and control means visibility. The main disadvantage of this technology is that the organization cannot control what it cannot see. Data integrity and confidentiality refers to the reading and modification of data only by authorized personnel. The location of the server is unknown as well as the data transfer network. There is also no guarantee that the supplier will react dynamically to the company's demands and expectations (ISACA, 2009). As the network and server are in charge of the data of thousands of clients, there is a risk, due to poor authentication, for them. data accessible to the service provider's staff or even to someone in another organization. However, the risk of data loss is not specific to this technology, but you may encounter it even when using your own hard drives, since these are "rudimentary" computer components, which can break at at any time resulting in data loss (Fitz-Gerald, 2010). Despite this, it is fair to say that the data of many companies, particularly SMEs, is much more exposed to risk in their own organizational environment than in a Cloud well structured and secure. Another insecure territory is the relationship between the supplier and the company. Loss or theft of information is a sensitive aspect, but the drop in the service provided means.