Saturday, June 22, 2019

Cyber securiy and cloudl computing Research Proposal

Cyber securiy and cloudl computing - Research Proposal Exampleseveral cultivation technology (IT) based processing including cloud computing, social media networking, international communication, and global stance system (GPS) navigation. Another aspect of the revolution is accessibility of the internet, whereby it has become easier for a person to have access to the internet today than two decades back. With the use of media devices much(prenominal) as smart phones, smart watches, and tablet computers, the internet is today one of the most portable technological inventions that can fit into every corner and position (Ziltrain, 2008). Indeed it cannot be denied that the revolution that has characterised the internet has several benefits to offer the ordinary user. In the estimation of Rehmeyer (2007), not only does the use of the internet today offers advantages barely that the absence or non-usage of the internet comes with so much discomfort and disadvantages. Even though this position cannot be debated, the risks and vulnerabilities that the complexity of the internet poses to individual, organisations and nations cannot be denied.In the credit of Owens and Lin (2009), the best way to make the most out of the internet in todays complex dynamic Web 2.0 environment is to ensure equal cyber security for users. Without this, the list of how beneficial the internet is in todays environment can go on but the real value that is pass judgment to be derived may never be achieved to its fullest. The reason for this claim is that as news of cyber breaches continues to flood the airwaves, people become sceptical about their fate in using the complex and dynamic Web 2.0 for various purposes including cloud computing and electronic commerce (e-commerce) (Ziltrain, 2008). In such an atmosphere of mistrust and fear, the Web 2.0 go forth be seen as useful only for some of the most conventional purposes that come with limited or no risk such as gaming, information se arch, and downloading. Meanwhile as it has been hinted already, there are several

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.