Topic > Cloud Computing and the Computer Scare - 1410

Once you log into your computer, you are forced to use an application related to the cloud computing infrastructure. For example, when a service needs an Internet connection, it immediately uses the so-called "cloud" network, which is a broad term for using a device or application that is not physically present. The computer user then accesses a network in the cloud, which stores personal information and allows them to complete multiple tasks efficiently rather than simply using a single personal computer. Computer scientists find it important to expand the cloud network as it not only helps them create projects using multiple computers connected to the cloud but also helps in providing applications to any computer user. Unfortunately, there are some shortcomings that computer science majors should be aware of; the biggest default is the risk of security issues in the cloud constantly. These issues include vulnerability to data loss and system control by hackers; computer scientists should be aware of facility defaults and be able to use cloud services efficiently. Cloud computing is a very useful and rapidly growing aspect of technology, and while security issues are a risk, it is a useful service that should be used with the appropriate prior knowledge. Before delving into the exact security issues, it is important to understand the basic structure of the cloud system. To begin with, the cloud computing framework has three main branches: 1) Infrastructure as a Service, 2) Platform as a Service, and 3) Software as a Service (Dorey 6). The most common service for general computer users is the Software as a Service branch because it provides the system structure and is notably middle of the paper......e. Network. April 16, 2012.Fox, Armando. "Cloud Computing: What's in it for me as a scientist?" ScienceMagazine.org. AAAS.org, January 28, 2011. Web. May 23, 2012. .Jamil, Danish and Hassan Zaki. “Cloud Computing Security.” International Journal of Computer Science and Engineering 3.4 (2011): 3478-482. Academic research completed. Network. 16 April 2012. Jamil, Danish, and Hassan Zaki. “Security Issues in Cloud Computing and Countermeasures.” International Journal of Computer Science and Engineering 3.4 (2011): 2672-676. Academic research completed. Network. April 16, 2012. Segal, Naresh K., Sohum Sohoni, Ying Xiong, David Fritz, Wira Mulia, and John M. Acken. "An insight into the issues and research activities related to both information security and cloud computing." Academic research completed. Network. April 16. 2012.