Clouding computing is a computer application method, where a company does not have to have physical hardware and software in its possession however, it subscribes to use such facilities offered by a clouding computing provider. The system is operated over the internet; the computer application facility is used by a number of subscribers who pays an amount equivalent to its level of utility. Some companies that offer such services are Google and Amazon offering Saas (software as a Service) and PaaS (Platform as a service) respectively. Some of the most shared equipments are memories, networks and operating systems. Small-scale enterprises are the major users of the service, however there are a number of risks with the application (Gillam, 23). This paper discusses risks and benefits of a clouding computing-pass service.
Risk assessment and risks factors in of cloud computing as platform service
Clouding computing system is faced with security issues; the facility used by a company is not limited to its use only, but available for other pool of users over the globe. When a company registers to use any providers’ server, then the company should be aware that the same server is available for use by the entire world. Data can thus be corrupted especially if the provider has no appropriate mechanisms to hampers such occurrence. Chances of hackling are higher, especially when some information of a company is required and the company is known to use the service. Information is power; if a certain company’s information is hacked through the system, the company may lack important information that might even threaten its competitiveness. Competitors might user such information for their gain (Lozano and Eric 84).
The system lacks data confidentiality: when a company is encrypting data, some security level that should be placed with sensitive data; in a normal business situation, a company different ranks should have limited access to data stored in their servers, however in the case of clouding computing, such privileges are not available. The lack of data confidentiality has negative implication to a company.
Even with the most effective clouding service providers, data leakages seems to be unavoidable, there are chances that at one point it time data will leak form the system and have detrimental effects on a company. The system has third parties as providers of services; they may have their own risks that are passed to the final consumer, such risk includes risk of inefficiency and unreliability.
A number of companies or people living across the world utilize hardware and software in a clouding computing. Sometimes there is large number of people using the same service to a point that the server cannot handle them. In such a case, the server may automatically log off users or slow down the pace of retrieving information. This can affected the operation of business (Sosinsky, 34-56).
Advantages of a clouding computing
Compared to the cost of acquisition of hardware and software, the system is relatively cheap especially to small scale and medium scale businesses. Installation of some systems and software that are availed by clouding computing system is an expensive exercise that might hamper a business existence of positive working capital. The subscriber only pays for what he has used; this is a fair deal.
Computers services are seen as support services in an organisation; they facilitate the attainment of the noble goal in the enterprise. With a clouding computing system, a company is left with the task of concentrating with the main business as the provider cares for the information and technology needs. The hassles of maintaining an information and technology department that need to be robust and keeps upgrading their skills is removed by the system.
The system is a web service amalgamation and guidance system where it is user friendly; managers and employees who might have limited knowledge of computers can effectively use the system since it is ”self operating”,. In cases of difficulties most providers offers online chatting services to air out the problems and probably gets some further assistance.
Technology is advancing in a fast rate; keeping up with the pace of development may prove to be a challenging task to a company. The system offers modern and up to date services; this offers a company the chance to take opportunists brought about by the new technological developments. For example some computer applications have developed in various areas like accounting and strategic management fields, a subscriber will get access to such programs without feeling the loss that might have been suffered if there was an old system that have become outdated (Borko and Armando 34)
To test clouding computing system, it is important to ensure that all areas of the system will be tested accordingly. There are a number of testing strategies adopted by different companies however we this paper concentrates on three stages clouding computing system; the stages are:
Learn and identify the stages to be tested and the tests to be undertaken on each stage
To undergo this stage effectively an understanding of the operating of the system need to be learnt. Strong areas of the systems should be analysed firsts and weak points as well as risk areas established. This will assist in establishing the tests to conduct. Risks to be understood are business and inherent risks so as when making the testing their effects and mitigation should be considered.
Establish an ideal area and environment that the testing can take place
The type and characteristic of environment to test a system is crucial: it can be an in-house generated system of testing or it can be a choice from the best clouding service available at a certain time. Having the best choice will assist in ensuring that an appropriate test has been conducted.
Have provisions for special considerations
Some general considerations that might affect the operation of the system should be considered and tested as well. They are tests that can affect the operation of the entire system if ignored; they include:
Security testing
- Configuration testing and its compatibility with a company’s access points like computers
- In a multi-tenant environment, the chances of restricting the users of the system and how the system can assist in internal control system
If all the tests are positive then the system can be adopted.
Conclusion
Scientific and technological innovations have resulted to clouding computing system, where businesses can use various computer applications without having physical hardware and software. The system is web operated; it is a cheap method where user can access modern computer applications without undergoing installation costs. However, the system suffers security and data confidentiality risks.
Works Cited
Borko, Furht, and Armando Escalante. Handbook of Cloud Computing. Massachusetts: Springer, 2010.Print.
Gillam, Lee. Cloud Computing: Principles, Systems and Applications. Massachusetts: Springer, 2010.Print.
Lozano, Bob, and Eric A. Marks. Executive’s Guide to Cloud Computing. New York: John Wiley and Sons, 2009.Print.
Sosinsky, Barrie. Cloud Computing Bible. New York: John Wiley and Sons, 2011. Print.