EMERGING TRENDS IN SOFTWARE ENGINEERING
CLOUD COMPUTING
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
It is vulnerable to hacking
|
|
The storage can be easily expanded
|
|
Portability
|
|
All of the above
|
Detailed explanation-1: -Inadequate cloud security measures lead to data leakage over cloud networks which can result in intellectual property theft, contract breaches, and malware attacks. Hackers can also control how companies provide services to their customers or end-users.
Detailed explanation-2: -Explanation: While cloud computing applications excel at large-scale processing tasks, if your application needs large amounts of data transfer, cloud computing may not be the best model for you.
Detailed explanation-3: -Data breaches and malware attacks occur when hackers access and steal the organization’s data. Because cloud services are provided over the internet, they have more entry points for bad actors and are more vulnerable to cyberattacks.
Detailed explanation-4: -What makes cloud storage so safe? First, servers are usually located in warehouses that most workers don’t have access to. Secondly, the files stored on cloud servers are encrypted. This means that they are scrambled, which makes it far harder for cybercriminals to access.