IT402_Unit1_Assign2_.docx(1) IT402 Cloud Computing IT402 - 01 Purdue University Global Cloud computing can be broken down into two categories. The first is being able to run software over the internet for work or e
...
IT402_Unit1_Assign2_.docx(1) IT402 Cloud Computing IT402 - 01 Purdue University Global Cloud computing can be broken down into two categories. The first is being able to run software over the internet for work or entertainment purposes. The second is using virtualized resources to provide computing power that is available at the user's request. While both categories are correct, they work in tandem to provide resources and power for companies to use instead of having to have onsite servers to provide the same things (Knorr, 2018). Small businesses can use cloud services to provide server access instead of having to purchase the hardware and software. If the small business needs change, cloud storage can be adjusted with just a few adjustments. Since the small business does not own the hardware, they do not have to worry about maintenance or installation of software for customers. Since the data is stored for a small business online, it can be accessed immediately from anywhere. Some of the security and privacy concerns when using cloud services are environmental security, data privacy and security, data availability and business continuity, record retention requirements, and disaster recovery. Environmental security is a concern due to more hackers using bots and targeting cloud services more than in the past. Data privacy and security are important since the company does not have full control of the data and must make sure the provider is aware of any data security and privacy laws that are regul. . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . .. .. . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
[Show More]