Topic > Current and future trends in information system infrastructure

One of the main advantages offered is technological mobility because it allows employees to access the organization's data, wherever they are and the flexibility of the service allows for business development without the use of additional infrastructure (Whitton, 2011). Say no to plagiarism. Get a tailor-made essay on "Why Violent Video Games Shouldn't Be Banned"? Get an original essay What this technology promises is related to the design and implementation of more efficient and economical application infrastructure solutions. However, the main challenge of these applications remains the platform used, which is an insecure environment: the Internet. Issues such as data availability, environmental security, performance unpredictability and supplier dependence characterize Cloud Computing technology. When it comes to data security and privacy, there is a lot of controversy and suspicion. The implementation of cloud computing in business has as its main obstacles the dependence on the supplier or intermediary (Internet connection) and the lack of security for the data stored in the cloud, as a service performed without the use of physical components. The hesitation of companies is justified when considering that confidential company information is collected, stored and possibly processed by third-party companies, which may be linked to other appointed persons who may or may not be interested in such data (ENISA, 2009). Data location can also be an issue considering data privacy laws that limit data access and movement across borders for certain categories of data. These types of restrictions need to be taken into consideration as providers are not as clear when referring to the location of the data or when providing guarantees that these restrictions will be met. Data protection is a weak point for Cloud Computing today. The technology is still young and therefore data security cannot be guaranteed in the cloud. Data protection is about controls, and control means visibility. The main disadvantage of this technology is that the organization cannot control what it cannot see. Data integrity and confidentiality refers to data being read and modified only by authorized personnel. The location of the server is unknown as is the data transfer network. Furthermore, there is no guarantee that the supplier will react dynamically to the company's demands and expectations (ISACA, 2009). Since the network and server are responsible for the data of thousands of customers, due to incorrect authentication, this data can be accessed by the service provider's staff or even someone from another organization. However, the risk of data loss is not specific to this technology, but you can also encounter it when using your own hard drives, since these are "rudimentary" components of the computer, which can break at any time leading to the loss of data (Fitz-Gerald, 2010). Despite this, it is fair to say that the data of many companies, especially SMEs, are much more exposed to risks in their own organizational environment rather than in a well-structured and secure Cloud. Another unsafe area is the relationship between supplier and company. Loss or theft of information makes sense, but a decline in service delivery also means loss of business. Using well-known vendors such as IBM, Google or Salesforce.com, which have sufficient means to maintain online security, alleviates some companies' concerns regarding information vulnerability. The main solutions for eliminating the risks of.