Write review on this article with three references that


Write review on this article with three references that includes bible, book listed below and other reference. book:- Richardson, T., & Thies, C. (2013).

Secure software design (2nd ed.). Burlington, MA: Jones & Bartlett Learning. ISBN: 9781449626327.

Cloud Computing is a fairly new method used by big organizations as well as the individual user. Technology continues to evolve based on the both ease of use for the consumer and specifications of the device.

Because of the consumer's need for comfortability and ease of use electronic devices have continued to become smaller and updated. A laptop for example, came standard with a standard size hard drive and CD ROM drive, but now the tablet is standardized to come with limited storage and no CD ROM drive.

The amount of storage that is needed by the consumer has not changed, so in an effort to provide portability at no cost to the capabilities of the device a cloud is used to store files across Internet on a server that is not physically located with the consumer. Cloud computing is normally managed by a third party that can sometimes charge the organization a set cost for their services.

If the cloud computing services are publically managed, however they are free to the user and may only require credentials to access the data. Cloud computing security can be used to protect the data as it travels through the network, secure and educate the end user, or security could be used to focus on the facility that stores the cloud computing server.

If I had to focus my security towards one service I would focus on the services as they pass through the network. Jeremiah 46:27 states, "But you, my servant Jacob, do not be afraid, and do not be discouraged, Israel, for without fail I will save you from far away and your descendants, from the land of their captivity!

Jacob will return and have calm and quiet with no one to frighten him." When using cloud computing security must be implement in depth no matter of the location of the servers.

The Lord declared punishment of the false Gods of Israel, but assured Jacob that he and his descendants would be safe and secure from all harm.

Holy Bible, red-letter edition: Holman Christian Standard Bible. (2004). Nashville: HolmanBible. Lewis, G. A. (2017). Cloud computing. Computer, 50(5), 8-9. doi:10.1109/MC.2017.141 Richard,T., & Thies, C.N. (2013). Secure software design. Burlington, Mass: Jones & Bartlett Learning Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation Computer Systems, 28(3), 583-592. doi:10.1016/j.future.2010.12.006

Request for Solution File

Ask an Expert for Answer!!
Computer Engineering: Write review on this article with three references that
Reference No:- TGS02434929

Expected delivery within 24 Hours