Need Replies

Discussion-1:
One of the biggest risks that organizations face when using cloud computing is the fact that they expose their customers and their proprietary information to hackers and other forms of activities that are conducted by people with malefic intentions. Consider the photos of celebrities that were leaked to the world by the hackers from the iCloud hack. (Olivarez-Giles, 2014) This is a live example of how proprietary technologies can be attacked and at the same time powerful people’s private information can be leaked to the outside world and this is one of the biggest threats that companies face.
It is technically impossible for any cloud services platform to have 100% uptime and provide this benefit to all its customers. (2020) There will be a point in time but there is a desperate need for organizations to log onto the virtual machines that has been set up in the cloud platform, but for some reason or the other either a hardware failure or a software failure this could lead to the virtual machine being unavailable to the customer and therefore this will lead to a loss or some form of handicap to the end customer.
In my opinion, yes it does provide a viable solution. But does that mean that there will not be other areas that are not mentioned in the article that will be exposed by future attackers, the answer would be no. In order to handle all types of risks, risk management steps need to evolve periodically over a period of time so that they are able to adapt to the upcoming different types of threats and they can be tested against these attacks and they can be used against future forms of attacks.

Discussion-2:
Despite the fact that cloud computing offers a variety of advantages such as scalability, cost-efficiency, reliability, increased security, remote access, and integration, it also comes with a number of issues and risks. According to Mackita, Shin, & Choe (2019), there has been an increase in the number of organizations migrating to the cloud in recent years with the goal of maximizing the benefits associated with cloud computing. However, Mackita, Shin, & Choe point out that when it comes to risk management, it’s critical for businesses to understand the many risks that come with these technologies.
There are a number of threats in the cloud, each with its own frequency of occurrence and severity. According to Erl Puttini and Mahmood (2013), despite firms increasing their IT resources for system security, the human factor will always be the greatest threat to system security. Insider threats have remained a key source of concern over the years. People are the same entities tasked to protect the cloud environment, which is one of the key reasons why maintaining the appropriate security levels is a threat. In this case, an organization may concentrate in building system that may prevent an organization from external attacks only for cases such as data breaches to occur within the institutions (James, 2018). Singh & Pandey (2018) categorizes these threats as malicious insiders whereby these group would either be current or former employees. In this case, these employees have the privileges of accessing the cloud resources hence they might attack and cause harm to the cloud environment.

Please provide two response for Discussion 1 &2. A substantive post will do at least two of the following:

Ask an interesting, thoughtful question pertaining to the topic
Answer a question (in detail) posted by another student or the instructor
Provide extensive additional information on the topic
Explain, define, or analyze the topic in detail
Share an applicable personal experience
Provide an outside source that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
Make an argument concerning the topic.

Need 150 words each reply

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more
Open chat
1
You can contact our live agent via WhatsApp! Via + 1 929 473-0077

Feel free to ask questions, clarifications, or discounts available when placing an order.

Order your essay today and save 20% with the discount code GURUH