Cloud Computing Is Not Exactly A Safe Haven

1377 words - 6 pages

Technology is growing at a “break-neck” pace. In 1965, Intel Corporation Co-founder Gordon Moore observed that the number of transistors per square inch on integrated circuits have doubled annually since their inception. The speed of software and application innovations mirrors the speed of the hardware advances observed by Gordon Moore. A recent technological trend that has emerged out of this swift moving industry is the concept of cloud computing. Cloud computing is allows files and documents to be uploaded onto an online database that is controlled and monitored by a third-party company, while allowing remote access to the uploader of said files. The avid marketing of such technology done by programmers and other people who have a vested interest in the product can cause disruptive hastiness amongst general end-users. The infatuation and cognitive psychological bias generated towards companies who streamline new technological advances can cause general users of cloud computing to overlook security and safety issues such as privacy, service denial, conflicts of ownership and server failure.
New-wave technology is often met with hordes of people looking to gain access for their personal use. This statement is supported by the long lines of people waiting for the new cell phone, video game or other electronic device stated to launch on a specific release date. The companies who are releasing these hyped up products know that a few key moves made in the marketing of the product will lead to massive crowd following and deep profits.
A technological advance is a major breakthrough that has the ability to move the public into thinking that this piece of technology should be integrated into our everyday lives. The effects of technological advances can be described by Mr. Pratik Rajendra Butte Patil in his paper, “Technological Advancements and its Impact on Humanity”, by stating, “Technological development has provided human history with a kind of directionality.” Technological advances do offer solutions to problems that the human race faces and should be celebrated as such. Understanding the joys of new technological breakthroughs can be easy to comprehend, while we tend to forget that there can be other underlying issues with the new technology in the moment of joyous celebration.
The underlying issues with cloud computing technology have been scrutinized by a handful of people in the technology sector. Cloud computing risks that are prevalent in the industry are data privacy, availability, and service provisioning. (Mosher 34) These security risks leave consumers vulnerable to physical, emotional, and financial distress. Information System Security Association consultant Richard Mosher offers a proposal to strengthen security in cloud computing, “Mitigating the risks, now more than ever before, requires a mature vendor management program in which cloud service providers are tasked contractually with guaranteeing the information security...

Find Another Essay On Cloud Computing is Not Exactly a Safe Haven

What Is Cloud Computing? Essay

1110 words - 5 pages . Your emails are not stored on your computer, and neither is the email program. Instead, the program and your emails are stored via the internet. Brief History: • Cloud computing dates as far back as the 1950s. Initially cloud computing was only available to schools and corporations. To give an idea of how cloud computing was back then, picture a room (often referred to as the server room) where a mainframe could be located. Users of the mainframe

The Internet as a Safe Haven

1390 words - 6 pages comfortable enough to not only express themselves, but to inspire others. For instance a person may find the courage to announce their sexuality to their loved ones and their online community, much like Troye Sivan, a popular Youtube user, did in one of his videos (Sivan). With over 2 million subscribers, it is safe to say that Sivan has a large following, consisting of relatively young people. With such an influence on such a vast amount of people

Cloud Computing: Software as a Service

1327 words - 5 pages INTRODUCTION Software as a service or SaaS is a technology made available for use within the cloud computing service that help businesses network or communicate effectively and at reasonable costs. SaaS is growing in popularity with projected sales levels to double by 2015 from the $10 billion reported in 2010 (Wikipedia, 2014). So, what exactly is SaaS by definition, and how does it distribute on a multi-tenant architecture? There are

Genetic Engineering Is Not Safe

988 words - 4 pages that animals have healthier meat to eat. For example, chickens can be modified to produce more eggs and grow larger faster. Which is not a good thing but it is not necessarily bad. Also by doing this a person’s moral compass doesn’t exactly point due north. Biotechnology is when you produce something by using life sources. This process has an unlimited amount of possibilities. By forcing these changes on organisms and not letting them be, it

What exactly is a ‘surveillance society’?

567 words - 2 pages What exactly is a ‘surveillance society’? The term is often used by the popular media to refer to the older more totalitarian notions of the ‘security state’ or Orwellian references to ‘Big Brother’ (Wood, 2009: 180). However, Wood points out that ‘surveillance societies’ exhibit immense cultural and geographical variety, in both historic and contemporary contexts, and need not exhibit totalitarian features (2009: 181). Wood acknowledges that

The Yucca Mountain Is Not Safe

1629 words - 7 pages The United States Department of Energy plans to turn Yucca Mountain into the nation’s first high-level nuclear waste repository. This will only happen if Congress finds the site safe. The Yucca Mountain is, in fact, not safe. The Yucca Mountain should not be the repository site of the nation due to miscommunication in the future, experiments gone badly and not enough support. It is not a good idea for the government to spend billions of dollars

The Yucca Mountain Is Not Safe

808 words - 4 pages researchers, environmentalists, and politicians for the past two decades about whether it is safe enough to store the nation’s waste. The Department of Energy may want the public to believe the Mountain is safe in order to pacify the public. A few of the reasons why the mountain is not safe are unexpected leakage in containers, experiments gone wrong, public health, and premature ideas. In the research paper, the outline will be as follows: I

A review to cloud computing modeling,simulations and testing techniques

1707 words - 7 pages parameters Scheduling policies to reduce energy Prediction of load based algorithms Mathematical modeling of cloud system 3. Simulation in Cloud Computing A.CloudSim -> Software Layered CloudSim architecture A.1. CloudAnalyst -> Software Architecture of CloudAnalyst A.2.CDOSim -> A.3. TeachCloud -> A.4. NetworkCloudSim -> Software B. GreenCloud -> Software It is different from CloudSim. This is an extension

A Case Study on the cyber-attack in cloud computing

2545 words - 10 pages Introduction Enterprises and individual users are outsourcing their services on the web, instead of maintaining the resources of their own. Outsourcing of technical resources enables the organization to concentrate on business need instead of technical aspect, which is looked after by the expert of the IT area. To facilitate such users, a web based paradigm known as cloud computing has emerged and offering the services on utility model [p3]. The major

Cloud Computing Virtualization – A Threat to Security of the System

2040 words - 9 pages The main aim of this paper is to study the concept of cloud computing through virtualization, how security is compromised in cloud computing and how we can secure the system from security breach in case of virtualization. Keywords: cloud computing, Hypervisor, Virtual machine, Virtualization Security. 1. INTRODUCTION Cloud computing is a model for enabling convenient, on demand network access to a shared pool of configurable computing

Is Bitcoin a Safe Alternative?

1136 words - 5 pages parties, encryption is basically the digital equivalent of a lock and chain that keeps unwanted visitors such as hackers from dipping their hands into your digital cookie jar of BTC. The effectiveness of PGP encryption is described by Kurt Klein, Though there are hundreds of encryption programs, PGP is so good that it's used around the world and no one--not even the federal government--has been able to break it (17). With PGP being the tungsten

Similar Essays

In Macbeth, Sleep Was Meant As A Sanctuary Or A Safe Haven But As The Play Progresses Sleep Becomes Fear And Not Being Able To Think Clearly Which Gives You A Whole Different Perspective In Life

886 words - 4 pages A day without sleep is bad enough with all the headaches and feeling tired. How much more if you haven't slept in weeks or even a whole year. Sleep can be defined as a natural periodic state of rest for the mind and body. In Macbeth, sleep was meant as a sanctuary or a safe haven but as the play progresses sleep becomes fear and not being able to think clearly which gives you a whole different perspective in life. Sleeping is a

Water Is My Safe Haven Essay

1063 words - 4 pages Water is My Safe Haven Everyone, once in their life, searches for a place or thing to get away and to be by themselves for awhile. When they find this place or thing, it provides them with the comfort, stability, and vitality they may need. It can be a library, the outdoors, a car, the front porch, or even a swimming pool, where they feel the safest, the most comfortable, or feel like all their burdens, all of their worries may be washed

What Is Cloud Computing? Essay

1335 words - 6 pages Frank Liu CRN: 110-31969-34791-43412-43413-43512 Professor Martha Tilmann 16 April 2014 Cloud Computing 1. Cloud Computing Defined Cloud computing is defined to be the use of computer programs and applications, to access information, storage, that is not stored locally on a computer’s hard drive, but rather over the Internet. There are five defining characteristics to cloud computing. Cloud computing allows users to have almost no

What Is Cloud Computing? Essay

1534 words - 7 pages The world today is becoming more technologically advanced. Internet use is becoming a more integral part of businesses today. A new way that businesses have started to utilize the internet as a business tool is through cloud computing. “Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management