Cloud Technology and Security
dc.contributor.author | Al Anani, Rayyan | |
dc.contributor.department | Department of Information Systems and Business Analytics | |
dc.contributor.majorProfessor | Dr. Anthony Townsend | |
dc.date | 2021-08-31T16:51:07.000 | |
dc.date.accessioned | 2021-09-09T16:53:08Z | |
dc.date.available | 2021-09-09T16:53:08Z | |
dc.date.copyright | Fri Jan 01 00:00:00 UTC 2021 | |
dc.date.embargo | 2021-07-21 | |
dc.date.issued | 2021-01-01 | |
dc.description.abstract | <p>Cloud security is a critical component in any firm’s data management framework. As such it deserves serious attention. The rapid adoption of public cloud services necessitates businesses to find new ways of detecting and mitigating cloud security breaches.</p> <p>This study investigates Cloud Storage Technology and the risks associated with it.</p> <p>It explores the differences between Cloud storage systems and Traditional storage systems, the pros and cons of using Cloud over Traditional, security concerns, and risk mitigation of the threats associated with Cloud.</p> <p>Individuals and organizations (end-users) often find it challenging to decide to adopt Cloud technology to store their information or whether to play it safe and go for the traditional way!</p> <p>This study aims to provide a clearer view of the differences between Cloud storage and Traditional storage – with the hopes of helping the end-user to determine the best approach needed for their needs!</p> | |
dc.format.mimetype | ||
dc.identifier | archive/lib.dr.iastate.edu/creativecomponents/832/ | |
dc.identifier.articleid | 1951 | |
dc.identifier.contextkey | 23963735 | |
dc.identifier.doi | https://doi.org/10.31274/cc-20240624-371 | |
dc.identifier.s3bucket | isulib-bepress-aws-west | |
dc.identifier.submissionpath | creativecomponents/832 | |
dc.identifier.uri | https://dr.lib.iastate.edu/handle/20.500.12876/2vaZPamr | |
dc.source.bitstream | archive/lib.dr.iastate.edu/creativecomponents/832/CreativeComponent_Rayyan_Al_Anani_.docx|||Sat Jan 15 02:09:57 UTC 2022 | |
dc.source.bitstream | archive/lib.dr.iastate.edu/creativecomponents/832/auto_convert.pdf|||Sat Jan 15 02:09:58 UTC 2022 | |
dc.subject.disciplines | Business | |
dc.subject.keywords | Cloud | |
dc.subject.keywords | Cloud Security | |
dc.subject.keywords | Traditional Storage | |
dc.subject.keywords | Cloud Storage | |
dc.subject.keywords | Cloud Implementation Cost | |
dc.subject.keywords | Cloud Risks | |
dc.subject.keywords | Risk Mitigation | |
dc.title | Cloud Technology and Security | |
dc.type | creative component | |
dc.type.genre | creative component | |
dspace.entity.type | Publication | |
relation.isOrgUnitOfPublication | 0099bcd5-3121-4f25-813d-0ec68d96243f | |
thesis.degree.discipline | Information Systems | |
thesis.degree.level | creativecomponent |