Sign In
Not register? Register Now!
You are here: HomeCourseworkTechnology
Pages:
2 pages/≈550 words
Sources:
No Sources
Level:
APA
Subject:
Technology
Type:
Coursework
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 14.58
Topic:

Big Data Security and Cloud Computing (Coursework Sample)

Instructions:

ORDER ID: IC7742
Order status: Writer Assigned Remaining time: 1d
Type of service: Writing from scratch Work Type: Master's
Type of English: US Paper format: APA
Pages: 2 DOUBLE-SPACING
POWERPOINT slides: 0
Additional pages: No
Additional slides: No
Summary of paper: No
Files must be uploaded: No
Type of paper: Coursework
Sources: 0
Subject: Technology
Topic: Discussion
WORDS: 540 words
3-PART Question.
Part 1
Big Data Security in the Cloud
How storing and processing big data in a cloud computing environment increases the security risk for the data. Word count 180
Part 2
Industrial Control Systems
Much of cybersecurity is concerned with protecting information technology infrastructure, but industrial control systems are at similar risk and must be considered if the organization being secured includes manufacturing processes, product handling, or distribution systems. How does a typical IT security infrastructure differ from securing industrial control systems? Are there security considerations that are unique to an industrial control system? Word count 180
Part 3
Application Security
You are familiar with local applications that are installed directly on a computer, such as Microsoft Word or Excel®, but there are also a growing number of web applications that run in a web browser. How do security considerations differ between a locally installed application and a cloud-based application that runs in a browser? Do these different types of applications have different mitigation strategies? Are there security strategies that can protect both types of APPLICATIONS? Word count 180

source..
Content:


Big Data Security and Cloud Computing
Using big data in computing means applying a large volume of unstructured and structured data (Manogaran et al. 2016). Processing this data is difficult when local software technologies and databases are used. Although applying big data in cloud computing seem to have many advantages, there is a need for security in dealing with them. For instance, when big data is applied, it makes it challenging to explore and analyze the required data by organization.
In research and marketing fields, many business investors apply big data. The problem is that most of them do not have the required assets. In this case, once a security breach happens to the data, it results in reputational damage, the problem that most organizations are trying to avoid today using technology in storing and analyzing the information about their company.
Data is stored in different locations in cloud computing. If the location is not logically and physically safe, the data is always at risk. It becomes easy for external hackers and insiders to access the data. Because of this, it is advisable to store data in one location.
IT Security Infrastructures and Industrial Control Systems
There has been a need for most cybersecurity to protect the IT infrastructure. At the same time, threats have invaded the industrial control system, hence the need for protection. This section has outlined the significant difference between ICS and IT security infrastructure as applied in cybersecurity.
The significant difference between ICS and IT infrastructure lies in the security goals. For example, the goal of the ICS is to establish safety (Kriaa et al. 2015). It is meant to protect the entire process, whereas the goals of IT security are based on privacy, such as protecting the actual data. Two unique security issues that differentiate between ICS and IT security are outlined.

...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • A Review of Water Desalination Technologies
    Description: Water is one of the most abundant and precious natural resources on Earth, covering over 70 percent of the planet. However, it is available in a state not readily consumable or usable to humans. For instance, most of the freely available water in lakes, oceans, and underground aquifers is saline (salty) or ...
    7 pages/≈1925 words| 8 Sources | APA | Technology | Coursework |
  • Types of Digital Marketing
    Description: In recent years, traditional marketing was the most effective way of marketing your company's product until the year 2019, when digital marketing surpassed it (Chaffey & Ellis-Chadwick, 2019). Around ten years ago, you would be a fool to invest in digital marketing, unlike nowadays. Suppose you want your...
    1 page/≈275 words| 4 Sources | APA | Technology | Coursework |
  • Is Immersion in Virtual Reality Good or Bad?
    Description: Immersion is a unique experience connected with the world of virtual reality, where a stimulus is technologically used to establish an enthralling total environment. It is an act of physically being present in a non-existent world. It happens when the visual reality user gets surrounded by other visual images...
    2 pages/≈550 words| 4 Sources | APA | Technology | Coursework |
Need a Custom Essay Written?
First time 15% Discount!