Network and Cloud Security

Task
This is a business report: Moving application API to a cloud, or migration of data base to the cloud.
This coursework is to write a well-researched and referenced business report of between 2,500-3,000 words (excluding references and appendixes) covering the potential use of, and security and LSEP issues associated with, cloud computing services in an agreed (with the module leader) business sector of your choice (i.e., education sector, finance industry, transport sector, government, travel sector, entertainment sector, hospitality sector, healthcare sector, etc.…).

Introduction

Describe a company operating within the business sector of your choice –e.g., what it does, type and size of user base, what kind of data it generates, what business IT applications it requires, what its current network infrastructure likely consists of, how mobile its employees and users are, etc. It could be a real company that you are familiar with, or an archetypical one representative of the business sector that you are researching. If you decide to go for the latter, you are responsible for carrying out documented research into the business sector in order to ensure the company description you provide is suitably realistic.

Research Methodology
In this section, you need to discuss your approach to research. A research method is a systematic approach plan for conducting research. This can be qualitative and/or quantitative research methods, incl8ding experiments, survey research, participant observation, and secondary data.

Current status of Cloud Computing

Research the current usage of cloud computing in your selected business sector. Describe the typical level of a company’s involvement in cloud computing. If most appear not to have tried cloud computing services, what are the obstacles, perceived or otherwise, of them doing so? If they have already started using cloud computing services, what appear to be the current limitations if any? Critically examine the adoption of cloud computing by such companies, and outline the corresponding technical, legal, organisational, ethical, and individual employee/user impact of such usage.

This question has been answered.

Get Answer