What is the definition of the technology?
Cloud computing is the technological delivery of computing and organization resources on demand to the end users. Organizational resources can be stored in data centers, application environment or over the internet. It is also a technological enhancement that an organization uses to run its software or services over a distance through the internet (Telford n.p). Companies offering cloud computing capabilities often charge for the services that they offer to other organizations.
What are the main characteristics of the technology?
There are several characteristics that distinguish this form of technology from others. For a fact, many organizations have discovered the value of integrating technology in their service provision and operations. Internet is a platform that businesses try to communicate with other businesses, suppliers, employees and other stakeholders. First, computing technology is unique in regards to its on-demand self service. Therefore, users can unilaterally access resources and information without requiring human interaction. Resources are delivered on the need basis without delay. Second, the technology is associated with broad network access trough standard protocols that promote multiple accesses by different devices such as mobile phones, laptops and tablet among others. Third, cloud computing is unique in respect to resource pooling. It is outlined that organizations can effectively consolidate and pool resources for use by multiples users without interference (Satell n.p). Fourth, this technology provides the rapid elasticity feature that can effectively scale incoming and outgoing traffic and resources in accordance to the demand. Lastly, it is a measured service technology because its systems can automatically optimize resources appropriately.
How is the technology disruptive in general and for security purposes specifically?
Cloud computing is disruptive. Disruptive technologies represent technology changes in terms of offering platforms, models and frameworks that presents a change in management of resources and service provision. Cloud computing as a technology renders existing technologies irrelevant because they bring on board new methods and techniques of operation. Cloud computing is disruptive to the users of the technology. It implements new security models and protocols that initially were not previously used and thus changing the entire landscape of securing resources. The new models of accessing resources presents new security challenges that definitely disrupt standards procedures that existed previously.
What are some threats/challenges posed by the technology as far as security is concerned?
Cloud computing poses some security threats and challenges. First, it jeopardizes security of data by placing critical data resources in the hands of third parties. Therefore, experts assert that third parties and service providers are at liberty of accessing critical data if not encrypted (Brad n.p). Second, it poses challenges in regards to user authentication and authorization. Data stored on clouds need to be accessed by only those authorized to do so. Without clear channels of authorization and critical analysis of access logs it may jeopardize user access to information.
What are some benefits/opportunities of the technology as far as security is concerned?
Cloud computing is linked to numerous benefits touching on security, convenience, economy and improved productivity. Today, organizations have invested heavily on cloud computing because of the ability to ensure timely and accurate access to resources. Based on security, cloud computing adhere to internationally accepted standards (ISO), and it is believed that there is enhanced security of critical data due to the strict ISO security standards cloud providers must adhere to (Half n.p). Further, it eliminates effects and instances of human errors that may pose security challenges. People are prone to mistakes but computers do not and these facts have been used to enhance security of data in the cloud. Distinctively, a lost computer may be less compromising because resources are stored offsite. Lastly, cloud computing enhances security of data and other resources due to its ability to allow for many techniques of storage by implementation of layered approach.
Works Cited
Brad Harris. Security challenges in the cloud environment. Security Intelligence. Security
Intelligence, 2016. Available at: https://securityintelligence.com/security-challenges-in-the-cloud-environment/. Retrieved May 8, 2018.
Half Robert. What are the security benefits of cloud computing? Robert Half. Robert Half, 2014.
Available at: https://www.roberthalf.com/blog/management-tips/what-are-the-security-benefits-of-cloud-computing. Retrieved May 8, 2018.
Satell Greg. Why the cloud just might be the most disruptive technology ever. Forbes. Forbes,
2014. Available at: https://www.forbes.com/sites/gregsatell/2014/01/05/why-the-cloud-just-might-be-the-most-disruptive-technology-ever/#31c2bead1731. Retrieved May 8, 2018.
Telford Ric. The disruptive nature of cloud computing. Zdnet. Zdnet, 2009. Available at:
https://www.zdnet.com/article/the-disruptive-nature-of-cloud-computing/. Retrieved May 8, 2018.