C.4.3 Discuss the effects of the use of cloud computing for specified organizations
In a private cloud model a company owns the data centers that deliver the services to internal users only.
C.4.5 Describe the interrelationship between privacy, identification and authentication
Private cloud can definitely be used to achieve higher levels of security and reliability and so may be suited to organisations with sensitive, business critical workloads or in regulated industries such as financial services.
- With exclusivity comes increased cost. If you plan to build your own private cloud, you face a large capital outlay. Fortunately, you can rent your private cloud from a hosting service provider, for a monthly fee, and still benefit from all the advantages
- Additional costs for cloud software
In a public cloud services are provided by a third party and are usually available to the general public over the Internet.
The idea of a hybrid cloud is to use the best of both private and public clouds by combining both. Sensitive and critical applications run in a private cloud, while the public cloud is used for applications that require high scalability on demand. As TechTarget explains, the goal of a hybrid cloud is to “create a unified, automated, scalable environment that takes advantage of all that a public cloud infrastructure can provide while still maintaining control over mission-critical data”.
Defined as the seclusion of information from others. In the context of the web this can relate to healthcare record, sensitive data from financial institutions, residential/geographic records, criminal justice investigations/proceedings. For such information it is essential to prevent unauthorized access.
Authentication is the first step in access control, and there are three common factors used for authentication: something you know, something you have, and something you are. This article provides you with good understanding of the three factors of authentication and how they can be used together with multi factor authentication.
Authentication factors classically fall into three categories:
C.4.7 Explain why the web may be creating unregulated monopolies
In theory the world wide web should be a free place where anybody can have a website. However, hosting a website usually comes with a cost - registering a domain name, getting a hosting service or investing in servers oneself, creating and maintaining the website (requires technical knowledge or the cost of hiring a web developer). In addition, to reach an audience further marketing through SEO (see C.2) is usually necessary to get good rankings in search engine results. This means that for the normal individual a traditional website is not the best option. A better alternative is to publish content on an existing platform, e.g. micro blogging on Twitter, blogging on WordPress or Blogspot, sharing social updates on Facebook, sharing photos on Flickr, etc. . This comes with improved comfort for users.
However, it easily leads to unregulated monopolies in the market because users usually stick to one platform. Tim Berners-Lee describes today’s social networks as centralized silos, which hold all user information in one place. This can be a problem, as such monopolies usually control a large quantity of personal information which could be misused commercially or stolen by hackers. There are certainly many more concerns which won’t fit into the scope of this site.
Google controls over 80% of add revenue on the WEB