Answered! Q. Tabulate to evaluate the risks of various threats and discuss steps to mitigate each of them….

Q. Tabulate to evaluate the risks of various threats and discuss steps to mitigate each of them.

Source: Cloud Computing by Kris Jamsa

Don't use plagiarized sources. Get Your Custom Essay on
Answered! Q. Tabulate to evaluate the risks of various threats and discuss steps to mitigate each of them….
GET AN ESSAY WRITTEN FOR YOU FROM AS LOW AS $13/PAGE
Order Essay

Expert Answer

 Hi,

Please find below the answer-

Below are the threats in Cload computing-

a) Disk Failure -Disks are physical devives and they are subject to wear and tear and hence could fail at any point of time. Generally the mean time between failure for disks is 500000 hours.This problem can be avoided in two ways-

i) Using the disk back up – In order to ensure un-interrupted data suppy for end user, we need to make sure that all the data is written at multiple places in the form of back up.

ii) Redundant array if Independent disks – As the name suggests, We have the array of disks which is used to store the data. In this method, data is just not stored at one place but it is stored in different disks.

2. Power Failure or disruption- In some systems, unwanted power failures may lead to loss of unsaved data and hence this lead to inconsistency in enterprise data.

3. Computer Viruses- Computer virsuses are the most critical factors that causes millions of computers under threat of web;

Still stressed from student homework?
Get quality assistance from academic writers!