Advantage and Challenges of Cloud Computing
Background
The evolution of Information Technology is inevitable, not only on the telecommunication and networking industry, but, it is also gaining more popularity in the business industry by way of Enterprise Resource Planning (ERP) system and rapidly making its move towards the accounting and auditing industry through Data Analytics Software, however, as the IT innovation continues and the concern of capacity and storage progress, and the demand for expansion and accessibility, brings in cloud computing and big data analytics. As the business industry grow after the financial crisis, companies examine opportunities for operational cost reduction and lower the risk of technology infrastructure becoming obsolete. Obviously integrating business functions to more highly technical and sophisticated system is cost effective, however the damage caused by security and privacy risk can be very costly as well. Guillot (2013) indicated that nowadays the inexpensive, effective and efficient business functions was owed to the evolving technology, but technology also makes the fraud easy to facilitate and engineer by perpetrators who can commit fraud anywhere and anytime as the internet, mobile devices, computers and the cloud are used to conduct business (p.43). Guillot quoted Steve Mar, director of IT statement “It’s not that fraud has changed, it’s that technology has made it easier” (p.43).
Purpose of Research and Research Question
The
As organizations utilize software and the internet together to make transactions and complete accounting functions, the threat of cybercrime comes into play. “Cyber crime against private business is growing, and consuming a larger share of Federal Bureau of Investigation resources than ever before…” (Kelly, M., & 42 staff, 2011)
In today’s IT world every organization has a responsibility to protect the information and sensitive data they have. Protecting data is not only responsibility of security and IT staff but every individual is involved in protecting the information. The risks to information security are not digital only, but it involves technology, people and process that an organization may have. These threats may represent the problems that are associated to complex and expensive solution, but doing nothing about these risks is not the solution.
As technology grows and information has become a critical asset companies currently are devoted their resource and money to protect their data as important as their finance and human resource assets.
While all of these technologies have enabled exciting changes and opportunities for businesses, they have also created a unique set of challenges for business managers. Chief among all concerns about technology is the issue of information security. It seems to be almost a weekly occurrence to see a news article about yet another breach of security and loss of sensitive data. Many people will remember high profile data breaches from companies such as T.J Maxx, Boston Market, Sports Authority, and OfficeMax. In the case of T.J. Maxx, a data breach resulted in the loss of more than 45 million credit and debit card numbers. In many of these incidents, the root cause is a lack of adequate security practices within the company. The same technologies that enable managers can also be used against them. Because of this, businesses must take appropriate steps to ensure their data remains secure and their communications remain
This research paper tackles the issues that faces Cloud Computing today and gives the experts and industry’s point of view on the matter. The aspects explored are the significant industry questions that have risen about the use of Cloud Computing, business value, organization impact, adaptability, limitations, initial cost of implementation, and the severe business security risks
The use of information technology in business presents major security challenges, poses serious ethical question, and affects society in significant ways. Especially, the computer crime is a growing threat to society and is caused by the criminal or irresponsible actions of individuals who are taking advantage of the widespread use and vulnerability of computers and the Internet and other networks. It presents a major challenge to the integrity, safety, and survival of most business systems.
The information age is the age we live in today, hence we must make sure that the use of the information readily available to many people is not abused. There are many different types of security threats to the average person, business or even government. The risks faced by individuals and entities are rising, thus measures to avoid these privacy and security breaches would be discussed accordingly assisting and allowing firms to remain, fraud free and protected.
Virtually every business today uses at least one form of computer information technology. Business firms use computers to automate and assist in managing everything from operations, sales, finance, and logistics. Internal databases and intranets are used for internal controls and organizations are connected via the internet to conduct sales, marketing and many other communications and transactions. Electronic business, or e-business, is dominating modern markets and the business world. This new world of technological innovation has exponentially increased efficiency and globalized the world’s economies. Unfortunately criminals still exist and continue to exploit businesses, committing acts of theft, vandalism, and terror.
“The cyber security landscape has changed in the past couple of years – and not for the better” (Steen, 2013). Banks are faced with attacks to retrieve customer account information, the military battles with attempts to obtain secrets. These attacks are not just committed by induvial hackers but entire countries. Data privacy rules differ from country to country. For example, Fisher, 2014 states individual search engine access is restricted in different ways depending on the country. China along with other countries restrict access to politically sensitive information, while the United States protects the free flow of information (Gonzalez-Padron, 2014). With companies relying more on technology such as cloud computing and virtual storage their level of vulnerability rises. IT personnel have the difficult task of protecting company data, this is why it is vital to have an ethical compliance program in place protect the organization from internal and external threats.
Information security breaches and attacks are aiming businesses every now and then. Any company that is connected to the internet has some information security risks. Businesses that operation in healthcare, finance and any government sectors, suffers from more of such information security risks as they collect, store and process sensitive personal, financial and confidential data. ABC Accounting Firm is a major national accounting firm that is utilizing the power of information technology. The company is also under information security risks as they hold and process sensitive business and accounting information of their clients and a huge volume of personal data of the employees, partners and clients (Engebretson, 2013).
Cloud computing is able to offer a distinct advantage to companies willing to move into this growing arena. This is not without its drawbacks. Even in the definition of Cloud Computing by the National Institute of Standards and Technology, (NIST) clear advantages exist. The definition includes the following terms: on demand self-service, ubiquitous network access, location independent resource pooling, rapid elasticity and measured service.
Ultimately, these figures translate to profitability thereby fulfilling one of the primary goals of business which is to generate profit (Aljabre, 168). One of the major reasons behind the choice of using cloud computing and incorporating it into the basic framework of business transaction is efficiency. Cloud computing utilizes minimal renewable resources that cold the business a very insignificant amount compared to the returns it will retain in the form of profits and customer satisfaction. Cloud computing enables the business to streamline its IT operations thereby eliminating any wasteful channels that drain resources and increase the cost of operations. The concept of cloud computing render it as a n internet based operation that provides efficient and effective handling for the employees of a business through improved accessibility and limited space consumption (Gorelik 109). Every other merit that cloud computing affords business is down to the effectiveness or efficiency its use brings upon the business entity which will eventually reflect on the profitability of the business.
Question 1. What is the most appropriate Cloud Deployment model (or combination) for BPI (Public, Private, Community, or Hybrid)?
Almost all kind of large and small organizations might face increasing number of attacks into their network or intellectual property. This may lead to data disclosure, data destruction, and damage of organization’s reputation. There are numerous threats in the cyber space which might be capable of stealing, destroying or making use of out sensitive data for financial and non-financial gains. As the amount of computer, mobile and internet users increases, so does the number of exploiters.
Cloud computing is one of the new models of computing that is used to provide for the computing infrastructure. A good computing cloud data management system must satisfy the following goals like availability, scalability, elasticity, performance [1]. The cloud computing looks to satisfy the needs of various levels of clients and workloads. Hence a guaranteed contract between the service provider and the clients has been made known as the Service Level Agreement (SLA). Both the providers and consumers consider successful SLA management.