0% found this document useful (0 votes)
17 views

Virtualization and Cloud Computing (BIT2225)

cloud computing
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views

Virtualization and Cloud Computing (BIT2225)

cloud computing
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

NOTE: YOU HAVE TO USE 3-4 PAGES AND INDICATE THE REFERENCES.

a)How
can cloud computing technology be used to improve resource utilization and
disaster recovery. b) There are a number of security risks associated with
cloud computing, Discuss 7 of them.

Cloud computing is defined as the use of hosted services, such as data storage, servers,
databases, networking, and software over the internet. Cloud computing has revolutionized the way
businesses manage and utilize their resources, providing scalable and flexible solutions for various
computing needs. This essay explores how cloud computing technology can enhance resource
utilization and disaster recovery capabilities. Additionally, it discusses seven security risks associated
with cloud computing.

 To improve Resource Utilization in Cloud Computing


Scalability and Elasticity
Cloud computing offers scalability and elasticity, allowing businesses to dynamically adjust their
computing resources based on demand. This ensures optimal resource utilization, as organizations
can scale up during peak times and scale down during periods of lower demand. This flexibility helps
eliminate the inefficiencies of maintaining fixed on-premises infrastructure.

Virtualization
Virtualization is a key component of cloud computing that enhances resource utilization. It enables
the creation of virtual instances of servers, storage, and networks, allowing multiple workloads to
run on a single physical machine. This consolidation of resources improves efficiency and reduces
hardware costs.

Multi-Tenancy
Cloud providers leverage multi-tenancy to serve multiple customers on shared infrastructure. This
sharing of resources optimizes utilization rates, as providers can distribute workloads efficiently
across their data centers. Multi-tenancy also contributes to cost-effectiveness for both providers and
users.

 Disaster Recovery in Cloud Computing


Geographic Redundancy
Cloud providers often have data centers located in multiple geographic regions. This geographical
redundancy enhances disaster recovery capabilities by allowing organizations to replicate their data
and applications across diverse locations. In the event of a disaster affecting one region, operations
can seamlessly transition to another, ensuring business continuity.

Automated Backups and Snapshots


Cloud platforms offer automated backup and snapshot features, allowing organizations to create
regular copies of their data and system configurations. These backups can be stored in geographically
dispersed locations, providing a resilient solution for disaster recovery. In case of data loss or system
failure, organizations can restore from these backups quickly.

High Availability
Cloud services often provide high availability through load balancing and redundancy mechanisms.
By distributing workloads across multiple servers and data centers, cloud providers ensure that
services remain accessible even in the face of hardware failures or other disruptions. This approach
enhances the overall resilience of systems against disasters.

 Security Risks in Cloud Computing


While cloud computing offers numerous benefits, it also introduces security challenges that
organizations must address to protect their data and assets. Here are seven prominent security risks
associated with cloud computing:

Data Breaches
Cloud platforms host vast amounts of sensitive data, making them attractive targets for
cybercriminals. A data breach can occur if unauthorized users gain access to confidential information.
To mitigate this risk, organizations must implement robust encryption, access controls, and regular
security audits.

Inadequate Identity and Access Management


Improperly configured identity and access management (IAM) settings can lead to unauthorized
access. Organizations must carefully manage user permissions, enforce the principle of least
privilege, and regularly review and update access controls to prevent unauthorized users from
accessing sensitive resources.
Insufficient Data Encryption
Data transmitted between clients and cloud servers or stored within the cloud must be encrypted to
protect it from interception. Inadequate encryption practices can expose data to eavesdropping and
unauthorized access. Cloud users should implement strong encryption protocols for data in transit
and at rest.

Shared Technology Vulnerabilities


Multi-tenancy, a fundamental aspect of cloud computing, introduces the risk of shared technology
vulnerabilities. If one tenant's application or data becomes compromised, there is a potential for the
attacker to exploit vulnerabilities and gain access to other tenants' resources. Regular security
assessments and patch management are crucial to mitigate this risk.

Lack of Transparency and Control


Cloud service providers may not always provide full transparency into their security practices and
infrastructure. This lack of visibility can make it challenging for organizations to assess and validate
the security measures implemented by the provider. To address this, organizations should carefully
evaluate service level agreements (SLAs) and seek providers that offer transparency and compliance
assurances.

Compliance and Legal Issues


Storing data in the cloud may subject organizations to various compliance and legal challenges,
especially when dealing with sensitive or regulated data. Failure to meet regulatory requirements
can result in legal consequences. Organizations must thoroughly understand the regulatory
landscape and ensure that their cloud provider complies with relevant standards.

Service Outages and Downtime


Reliability is a critical consideration in cloud computing, but service outages and downtime can still
occur. These disruptions may be caused by factors such as network issues, hardware failures, or
cyberattacks. To mitigate the impact of service disruptions, organizations should implement
redundancy, backup strategies, and disaster recovery plans.

In conclusion, Cloud computing technology offers significant advantages in terms of resource


utilization and disaster recovery capabilities. Scalability, virtualization, and multi-tenancy optimize
resource utilization, while geographic redundancy, automated backups, and high availability
contribute to effective disaster recovery. However, organizations must be vigilant in addressing
security risks associated with cloud computing, including data breaches, identity management,
encryption, shared vulnerabilities, transparency, compliance, and service outages. By implementing
robust security measures and staying informed about evolving threats, businesses can harness the
full potential of cloud computing while safeguarding their assets.

References

Mell, P., & Grance, T. (2011). The NIST Definition of Cloud Computing (NIST Special Publication 800-
145). National Institute of Standards and Technology (NIST).

Kavis, M. (2014). Architecting the Cloud: Design Decisions for Cloud Computing Service Models (SaaS,
PaaS, and IaaS). Wiley.

Choudhary, S., Mishra, P., Kumar, S., & Mittal, N. (2015). A survey of cloud computing security
management. Journal of King Saud University - Computer and Information Sciences.

You might also like