QUESTION
Order Instructions:
Instructions as below.
In their Birmingham office, the NOW UK team uses a network of PCs with a server and backup storage. One of the employees originally set this up and became the de facto systems administrator. This person will however retire within a couple of months. NOW UK is considering whether to move to a cloud computing solution.
Use the argument mapping technique described in detail in Block 5 Part 5 to explore some of the arguments for and against the use of cloud computing. In preparation for this task, you may also want to revisit Question 17 of iCMA 56 which will allow you to practise your argument mapping skills.
Here is Question 17 of iCMA 56 below for your necessary reference:
Since 2008, there have been plans for Australia to implement an internet filtering system. The filter would block access to harmful sites that include child pornography, sexual violence and detailed instructions in crime or drug use. But critics say that the Australian plan, which has been proposed repeatedly over the past five years, exceeds what is necessary, cannot prevent all ways in which the internet can be abused, and strays into matters of free speech. ‘Our primary concern is that the scope of content to be filtered is too wide,’ Google wrote in its submission to the Australian government. The company said it already had its own filter to block child pornography. Yahoo said the filter would block many sites with controversial content such as euthanasia discussion forums and gay and lesbian forums that discuss sexual experiences. Yet it would not block peer-to-peer file-sharing, nor prevent predators approaching children in chat programs or social networking sites.
Complete the argument map below using the arguments, given above, for and against the proposal that ‘Australia should implement their plan for an internet filtering system’. (This question is based on extracts from the article ‘Google and Yahoo criticise Australia’s ‘heavy-handed’ internet filter plans’ by Charles Arthur. The article appeared in guardian.co.uk on 29 March, 2010.) (Hint: start by identifying the main claim and drag it into the box in the blue circle.)
A |
An internet filtering system would not block peer-to-peer file-sharing, nor prevent predators approaching children in chat programs or social networking sites. |
|
B |
Such a filter strays into matters of free speech. |
|
C |
Australia should implement their plan for an internet filtering system. |
|
D |
Such a filter cannot prevent all ways in which the internet can be abused. |
|
E |
Google already has its own filter to block child pornography. |
|
F |
Such a filter would exceed what is necessary. |
|
G |
The filter would block many sites with controversial content such as euthanasia discussion forums and gay and lesbian forums that discuss sexual experiences. |
|
H |
Such a filter would block access to harmful sites that include child pornography, sexual violence and detailed instructions in crime or drug use. |
Please note the above is simply for your reference
art 1
You are going to analyse three brief argumentative texts on cloud computing. The texts are edited extracts from several sources including the TU100 materials and The Guardian. The original source materials are not provided since they are not needed to complete this task.
Each of your analyses of the three texts must follow the following format:
- A copy of the text that you are going to analyse.
- Underline any connecting words or phrases in your copy of the text.
- An analysis of the text using the ‘Algorithm for constructing argument maps’, as found in Block 5 Part 5. Describe your analysis level by level.
As in Activities 28 and 33 of Block 5 Part 5, your analysis must consist of sections with the titles Level 0, Level 1, etc. (using as many sections as required for the analysis).
There is no single correct answer: focus on demonstrating your understanding of the points that the author of the text is trying to make.
- The argument map for the text. You must use one of the following methods to create your map:
- using Freemind, as in Block 5 Part 5
- using other argument mapping software to produce equivalent results
- producing a text-based map similar to that demonstrated in the long description of Figure 4 in Block 5 Part 5, Section 2.1
- producing a hand drawn map scanned in.
Whichever method you use, the map must be legible and follow the conventions you were introduced to in Block 5 Part 5.
You must submit each of your three argument maps as an image or as a textual description and you must include each image as a .png or .jpg file in your zip file of answers, as well as pasting it into your word-processed solution document.
If you prefer to produce text-based maps instead of diagrams, then you must paste the textual descriptions into your word-processed solution document.
Each of the three texts has already been divided into claims – you must not divide it into any further or different claims. The beginning and the end of a claim are marked by ‘[’ and ‘]X’ respectively. You can use the subscript to refer to the claim. For example, if the text contains [Bla bla bla]C, You may want to write ‘C is the main claim’. So here are the three argumentative texts. In your answer to Part 1 of Task 5, analyse each of the three texts. Your analyses must follow the format given above.
- [It’s a good idea to switch your business to the cloud.]A[One reason for this is that it offers you the storage space you need, for a fraction of the cost of a local server.]B
- [Never assume data is safe, even if it’s in the cloud.]A[Look, if there’s data online, access can be lost to it at any second, through hacking, an idle whim, a simple mistake, or some financial or even natural disaster.]B [For example, in 2008 a disgruntled former employee of the blog provider JournalSpace corrupted the database containing the customers’ blogs.]C
- [Many people can be affected by a malfunctioning cloud.]A[Even if ‘The cloud’ works for most people most of the time.]B [That’s because, if you have a lot of users, you’ll get a lot of errors.]C [With a billion users, 10% having problems – which they probably will, over 10 years – is 100 million personal disasters.]D
Part 2
In Block 5 Part 3, you learned about three guiding principles behind information security: confidentiality, integrity and accessibility. In 2014, the iCloud accounts of several celebrities were compromised. Search for background information on these incidents. Identify one particular example where one of the principles was violated. In answer to this question:
- Describe the example in your own words.
- State which principle was violated.
- Explain why that particular principle was violated and not the others.
- Include a reference to your source of information. Ensure that the reference is cited in your description of the example.
Your answer to Part 2 of Task 5 must be no more than 200 words.
Subject | Computer Technology | Pages | 6 | Style | APA |
---|
Answer
Cloud Computing
Introduction
Cloud computing is a new Information Technology aspect that allow data to be processed and shared globally over remote servers. By definition, cloud computing refers to the scenario of utilizing remote servers’ network supported by the internet in data storage, management, and processing as opposed to using a local server or personal computer (Voorsluys et al., 2011). Therefore, as a new technology, it has both advantages and disadvantages which should be succinctly examined. To this end, this paper is divided into two sections: part one and part two. Part One investigates both the advantages and disadvantages of cloud computing. Consequently, Part Two examines the guiding principles behind information security by practically assessing the iCloud account of a celebrity which was hacked and compromised in 2014. In general, this piece argues that the use of cloud computing would not be beneficial to the now UK team.
Part One
|
A |
It is a good idea to switch your business to the cloud computing platform |
|
B |
Cloud computing offers you the storage space you need |
|
C |
Cloud computing provides for a fraction of the cost of a local server |
|
D |
Cloud computing does not assure data safety |
|
E |
The online data can be accessed by the second party, and hacked as well as being vulnerable to natural disaster |
|
F |
For example, in 2008 a disgruntled former employee of the blog provider Journal Space corrupted the database containing the customers’ blogs |
|
G |
Many people can be affected by the malfunctioning cloud |
|
H |
The malfunctioning can affect most people most of the time |
|
I |
Consequently, if you have a lot of users, you will get a lot of errors |
|
J |
With a billion users, 10% having problems over a period of 10 years, approximately 100 million personal disasters will result |
Generally cloud computing is beneficial for data sharing and use over a large area. The United Kingdom is large nation comprising of various states, and this phenomenon necessitates the use of cloud computing. As already been told, the de facto systems administrator is soon to retire and this will interfere with the use of a network of PCs coupled with a server and backup storage since the new manager or administrator would not be well conversant with the system. Thus, cloud computing is the panacea. From the onset, the switch to cloud computing is a good idea because it provides unlimited storage capacity of information. Therefore, there is no anxiety or worry concerning running out of storage space or widening the current storage availability. The usage of remote servers over the internet in storing, managing, and processing data suffices as opposed to the use of personal computers (Voorsluys et al., 2011).
Additionally, data back-up and re-storage is relatively much easier over the cloud as compared to the storage of the same on physical devices (He et al., 2012). Cloud computing is also the cost efficient method to maintain, use, and upgrade. Traditional PC software costs organizations in relation to financial commitment. In addition, the licensing fees charged on multiple users prove to be expensive as far as the use of PCs is concerned (King, 2010). On the other hand, cloud computing is used at cheaper rates and, thus, significantly lowers the Information Technology (IT) expenses for an organization. Moreover, cloud computing allows for scalable options making it reasonable for an organization to adopt and implement it. These factors mentioned above support the use of cloud computing by the now UK team to store, manage, and process data.
As much as cloud computing is beneficial for a wider coverage application, it has disadvantages as well. The obvious delimitation is the issue of data insecurity. Before adopting cloud computing, companies should be informed of the fact that their sensitive information would be surrendered to the cloud service provider, third party. This scenario puts an organization at a greater risk. Additionally, the data can be hacked by other people making the data to be venerable and shared by other people (Chhibber, 2013). Thus, by using cloud computing, a company should put necessary measures in ensuring that their information is safe and secure. Nevertheless, this remains to be a challenge to most organizations. For instance, in 2008 a disgruntled former employee of the blog provider Journal Space corrupted the database containing the customers’ blogs. To this end, firms must be absolutely sure in seeking the services of reliable providers which can be trusted with the information stored in cloud computing.
On application, technical issues arise on the premise that information over the cloud is accessible anytime from anywhere causing some staid dysfunction. Consequently, the system is susceptible to outages (Mills, 2015). As such, the unexpected malfunction can affect most users often. Subsequently, the many users who are obsessed by the new technology insinuate that a plethora of problems or errors are inevitable. Cloud computing is regarded as a new technological advancement and the 21st century users have adopted it to ensure easier information storage, maintenance, and processing. Thus, system failures have affected most people in the same magnitude. Furthermore, an excellent internet connection is required for logging in into the system any time, hence there is a high likelihood of invariable struck in case of connectivity and network problems (Chhibber, 2013). These disadvantages of cloud computing are real and provide substantial setbacks to successful adoption and implementation of cloud computing in various organizations. To be precise, the issue of data insecurity has made most organizations to use a network of PCs with a server and backup storage. This is very unfortunate in the digital age where every individual is seeking after convenience in any endeavor. As such, the now UK team should strategize well putting into consideration the pros and cons of cloud computing as far as data storage and processing is concerned.
Part Two
In 2014, iCloud accounts of various celebrities were hacked and compromised that saw the release of private photos and videos being leaked over the internet. The iCloud accounts were interfered with by a besieged attack on passwords, usernames, and security questions. One of the celebrities who were majorly affected was Ariana Grande, a singer. A dozen of nude photos of this celebrity were released by anonymous message. A lot of theories have been devised to explain the phenomenon, but one of the most intriguing insinuates that many hackers had spent months to access the seemingly secure accounts either because they were hired in stealing the photos, or to trade the images online for other things bets known by the hackers themselves (Shontell, 2014). Among the three principles of information security: confidentiality, integrity, and accessibility, accessibility is the most violated principle. According to the investigation done by Apple’s engineers within a period of 40 hours, none of the cases resulted from breach in the Apple’s system. In conclusion, the organization recommended that to protect against a similar attack, the users or clients were advised to continuously use a resilient or strong password enabled through two-step verification. This is primarily to prevent accessibility by the hackers.
Conclusion
Cloud computing as a new Information Technology concept has both pros and cons: the limitations seem to outweigh the benefits. Consequently, while technology advancement proves to be an organizational asset, it can be harmful to the organization at the same time. Cloud computing has benefits such as creating almost unlimited space for data storage and processing, and affordable costs since it is relatively much easier over the cloud as compared to the storage of the same on PCs. On the other hand, cloud computing is vulnerable to various challenges. Firstly, the pronounced challenge is the information insecurity where the online data is prone to hackling by peddlers hence safety and confidentiality concern. Secondly, the possible technicalities such as system failure drastically affect a myriad of users at an instance. Thirdly, the excellent internet connection required for logging in into the system any time, presents a high likelihood of invariable struck in case of connectivity and network problems, and this has a bearing on malfunctioning experienced by a plethora of users. Successively, the fact that cloud computing is used by many clients denotes that the many errors that result negatively impact on the users. Practically, in 2014, iCloud accounts of various celebrities were hacked and compromised that saw the release of private photos and videos being leaked over the internet. The iCloud accounts were interfered with by a targeted attack on passwords, usernames, and security questions. This phenomenon just indicates how information on cloud is susceptible to accessibility by the third party. Thus, the usage of cloud computing is risky to the now UK team.
References
Chhibber, A. (2013). Security Analysis of Cloud Computing. International Journal of Advanced Research in Engineering and Applied Sciences, 2 (3), 2278-6252. He, S., Guo, L., Guo, Y., & Ghanem, M. (2012). Improving Resource Utilization in the Cloud Environment Using Multivariate Probabilistic Models. IEEE 5th International Conference on Cloud Computing (CLOUD), 574–581. King, R. (2010). Cloud Computing: Small Companies Take Flight. Bloomberg BusinessWeek, 12, 10-12. Mills, E. (2015). Cloud Computing Security Forecast: Clear Skies. [Online] Available at: <http://www.cnet.com/news/cloud-computing-security-forecast-clear-skies/> [Accessed on 3 Septembe]. Shontell, A. (2014). Apple Admits Celebrity Accounts Hacked but Denies System-wide Breach. [Online] Available at: <https://www.yahoo.com/tech/apple-admits-celebrity-accounts-hacked-but-denies-96471519984.html > [Accessed on 3 September 2015]. Voorsluys, W., Broberg, J., & Buyya, R. (2011). Introduction to Cloud Computing. In R. Buyya, J. Broberg, & A.Goscinski,Cloud Computing: Principles and Paradigms. New York, USA: Wiley Press, 1–44.
|
Related Samples
The Role of Essay Writing Services in Online Education: A Comprehensive Analysis
Introduction The...
Write Like a Pro: Effective Strategies for Top-Notch Explication Essays
Introduction "A poem...
How to Conquer Your Exams: Effective Study Strategies for All Learners
Introduction Imagine...
Overcoming Writer’s Block: Strategies to Get Your Essays Flowing
Introduction The...
Optimizing Your Online Learning Experience: Tips and Tricks for Success
The world of education...