Privacy

C.4.3 Discuss the effects of the use of cloud computing for specified organizations

In a private cloud model a company owns the data centers that deliver the services to internal users only.

C.4.5 Describe the interrelationship between privacy, identification and authentication

Private Cloud

Private cloud can definitely be used to achieve higher levels of security and reliability and so may be suited to organisations with sensitive, business critical workloads or in regulated industries such as financial services.

Advantages
  • Scalability
  • Self-provisioning
  • Direct control
  • Changing computer resources on demand
  • Limited access through firewalls improves security
  • Total Control ( of data )
  • Disadvantages

    • With exclusivity comes increased cost. If you plan to build your own private cloud, you face a large capital outlay. Fortunately, you can rent your private cloud from a hosting service provider, for a monthly fee, and still benefit from all the advantages
    • Additional costs for cloud software

    Public Cloud

    In a public cloud services are provided by a third party and are usually available to the general public over the Internet.

    Advantages
  • Easy and inexpensive because the provider covers hardware, application and bandwidth costs
  • Scalability to meet needs
  • No wasted resources
  • Costs calculated by resource consumption only

  • Disadvantages

  • No control over sensitive data
  • Security risks
  • Hybrid cloud

    The idea of a hybrid cloud is to use the best of both private and public clouds by combining both. Sensitive and critical applications run in a private cloud, while the public cloud is used for applications that require high scalability on demand. As TechTarget explains, the goal of a hybrid cloud is to “create a unified, automated, scalable environment that takes advantage of all that a public cloud infrastructure can provide while still maintaining control over mission-critical data”.


    • Privacy
    • Identification
    • AUTHENTICATION

    Authentication factors classically fall into three categories:

  • Something you know (such as a password)
  • Something you have (such as a smart card)
  • Something you are (such as a fingerprint or other biometric method)

  • C.4.7 Explain why the web may be creating unregulated monopolies

    In theory the world wide web should be a free place where anybody can have a website. However, hosting a website usually comes with a cost - registering a domain name, getting a hosting service or investing in servers oneself, creating and maintaining the website (requires technical knowledge or the cost of hiring a web developer). In addition, to reach an audience further marketing through SEO (see C.2) is usually necessary to get good rankings in search engine results. This means that for the normal individual a traditional website is not the best option. A better alternative is to publish content on an existing platform, e.g. micro blogging on Twitter, blogging on WordPress or Blogspot, sharing social updates on Facebook, sharing photos on Flickr, etc. . This comes with improved comfort for users.

    However, it easily leads to unregulated monopolies in the market because users usually stick to one platform. Tim Berners-Lee describes today’s social networks as centralized silos, which hold all user information in one place. This can be a problem, as such monopolies usually control a large quantity of personal information which could be misused commercially or stolen by hackers. There are certainly many more concerns which won’t fit into the scope of this site.

    Google controls over 80% of add revenue on the WEB

    Scroll to Top