Tuesday, May 14, 2019

Cyber securiy and cloudl computing Research Proposal

Cyber securiy and cloudl computing - Research suggestion Exampleseveral information technology (IT) based processing including cloud computing, social media networking, international communication, and planetary positioning system (GPS) navigation. Another aspect of the revolution is accessibility of the profits, whereby it has become easier for a person to keep up access to the internet today than two decades back. With the use of media devices such as smart phones, smart watches, and pad of paper computers, the internet is today one of the most portable technological inventions that can fit into every recess and space (Ziltrain, 2008). Indeed it cannot be denied that the revolution that has characterised the internet has several benefits to offer the ordinary user. In the mind of Rehmeyer (2007), not only does the use of the internet today offers advantages but that the absence or non-usage of the internet comes with so much discomfort and disadvantages. Even though this posit ion cannot be debated, the risks and vulnerabilities that the complexity of the internet poses to individual, organisations and nations cannot be denied.In the opinion of Owens and Lin (2009), the best way to make the most out of the internet in todays complex dynamic wind vane 2.0 environment is to ensure adequate cyber security for users. Without this, the list of how beneficial the internet is in todays environment can go on but the real judge that is expected to be derived may never be achieved to its fullest. The reason for this claim is that as news of cyber breaches continues to gorge the airwaves, people become sceptical about their fate in using the complex and dynamic network 2.0 for various purposes including cloud computing and electronic commerce (e-commerce) (Ziltrain, 2008). In such an atmosphere of mistrust and fear, the Web 2.0 will be seen as useful only for some of the most conventional purposes that come with hold in or no risk such as gaming, information sea rch, and downloading. Meanwhile as it has been hinted already, there ar several

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.