ENG 123 Project Two Persuasive Essay

docx

School

CUNY John Jay College of Criminal Justice *

*We aren’t endorsed by this school

Course

123

Subject

English

Date

Feb 20, 2024

Type

docx

Pages

8

Uploaded by VET0003

Report
1 Project Two Victoria Thibodeaux Southern New Hampshire University ENG 123 Lisa Colletti October 17, 2023
2 Project Two Persuasive Essay In the field of cloud computing, which is changing quickly, a discussion has sprung up about the delicate balance between data convenience and safety. As more businesses and people use cloud services to store and handle their data, it is clear that these services' advantages of being scalable and cost-effective cannot be ignored (Galiveeti, et al., 2021). However, this ease comes with a cost: sensitive information is more likely to be broken into or violate privacy. This essay makes the case for good data management and strict control. It will discuss the risks of giving valuable data to outside cloud providers. It will also stress the importance of complete control over data to protect its privacy and security. Finding a good balance between data convenience and safety means putting the responsibility of protecting data firmly in the hands of those who handle it (Duggineni, 2023). In cloud computing, responsible data management and strict control ensure data security, confidentiality, ethical responsibility, compliance with regulations, and striking a balance between data convenience and security that is needed. Risks and Vulnerabilities When it comes to cloud computing, sending private data to third-party cloud providers opens it up to possible risks and flaws. According to Galiveeti et al. (2021), the shared duty model is an essential weakness in cloud computing. In this model, the cloud service company and the customer are responsible for keeping data safe. It tries to spread the work of keeping data safe but also complicates things and could leave security holes. Clients might wrongly think that the cloud provider is responsible for certain parts of data security, which could lead to oversights and security holes. This complexity shows how important it is for businesses to control their data tightly and ensure that nothing about its security is left up to chance (Islam & Reza, 2019). In addition, the possibility of unauthorized entry is a significant weakness in
3 cloud computing. Even well-known cloud companies can be attacked or have their data stolen. These breaches can cost a lot of money and hurt a company's image. The 2019 Capital One hack is an excellent example (Duggineni, 2023). Sensitive customer information was leaked because an unauthorized person could access a cloud environment through a misconfigured web application firewall. These things show how vulnerable data security is when it is given to third-party providers. Integrity and Confidentiality The lack of strict data control compromises integrity and confidentiality. According to Galiveeti et al. (2021), strict encryption control is one of the most important parts of cloud data protection. When groups keep track of their encryption keys and protocols, they can keep data from being accessed by people who should not be able to. End-to-end encryption is an example of this kind of control (Duggineni, 2023). In this method, data stays encrypted from when it leaves the client's environment until it reaches its final location. Without this level of security, data is more likely to be exposed while it is in transit. Strict access management also shows how important it is for companies to keep control of their data (Galiveeti, et al., 2021). For example, organizations can ensure that only people can interact with sensitive data by setting up access rules and ensuring they are followed (Islam & Reza, 2019). This control lets them choose who can see, change, or delete data. It makes it less likely that insider risks or breaches will happen because credentials were stolen. In this situation, storage procedures are just as necessary. By having strict control over where data is kept and how it is duplicated for redundancy, organizations can reduce the risk of losing data due to infrastructure failures or outages. Regulation Compliance Compliance with data security rules like GDPR shows how important it is for businesses to use responsible data management practices to meet legal requirements and industry standards.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4 In this situation, the importance of GDPR and its link to managing data in a responsible way directly shows how necessary strict data control and security steps are (Galiveeti, et al., 2021). GDPR requires strict rules about how personal data is collected, processed, and stored, and its effects reach cloud companies (Duggineni, 2023). Notably, GDPR has significant fines for not following the rules, meaning businesses must take responsible data management very carefully. According to Galiveeti et al. (2021), responsible data management practices, like strong encryption and access control, help keep data safe and help meet GDPR standards. By encrypting personal data, for example, you can ensure that even if a breach happens, the data will not be understandable to people who should not have it. It lowers the risk of data exposure and GDPR violations (Jiang et al., 2019). Additionally, responsible data management aligns with the GDPR principle of data minimization, which says that organizations should only gather and process the data they need for their intended purpose (Islam & Reza, 2019). By keeping strict control over data, such as through access management and safe storage, businesses can limit the amount of data they collect and process, meeting this critical GDPR requirement. Ethical Responsibility The ethical responsibility of organizations and professionals in ensuring data security and privacy transcends convenience and reinforces the need for responsible data management and stringent data control in cloud computing. The duty of care toward the people whose data is being treated is one of the most important ethical rules in data management (Jiang et al., 2019). Organizations have a moral duty to protect their customers', clients', and employees' personal information from unauthorized access, breaches, or abuse. According to Galiveeti et al. (2021), this duty of care can be met with the help of ethical data management practices, such as strong security measures and strict access controls. Ethical duty also includes ensuring that organizations and stakeholders trust each other (Duggineni, 2023). Trust is a
5 weak and valuable thing that a breach in data security can break. Even if a high-profile data breach does not break the law, it can hurt the company's image and make people less trusting. Organizations must understand that their social duty includes keeping this trust, which can take years to build but only seconds to break. The people who work in the field of cloud computing also have a significant ethical duty. They build and watch over the systems that process and store private information (Liu et al., 2019). For these professionals to act ethically, they must build systems with security as the top priority, keep them updated to deal with new threats and push for responsible data management within their organizations. While arguing for responsible data management and strict control over data in cloud computing, it is vital to address a counterargument that focuses on the ease and cost- effectiveness of outsourcing data to third-party cloud providers. Some might say that the benefits of cloud services, like growing as needed and having lower up-front infrastructure costs, far outweigh the risks of data protection and privacy (Galiveeti, et al., 2021). From this point of view, the ease and cost savings of cloud computing should be more important than strict data control (Islam & Reza, 2019). However, knowing that putting ease ahead of data security can lead to extensive and expensive problems is essential. Real-world examples of data breaches and privacy violations, even by big, well-known cloud service providers, show that the risks are genuine. For example, the Equifax breach of 2017 put the personal information of more than 140 million people at risk. It shows how bad things can get when ease is put ahead of security (Duggineni, 2023). Also, putting convenience ahead of the ethical responsibility to protect sensitive data can hurt trust and image. Customers, clients, and other stakeholders care a lot about the protection and privacy of their data. If you ignore these worries, it can be hard to get people to trust you again. Another point of view says that strict data control and responsible data management in cloud computing should be more flexible and stop new ideas from coming up. Proponents of this
6 view say that by requiring strict security measures and strict data control, organizations may lose their ability to be flexible and use cloud technologies to their fullest potential (Liu et al., 2019). Nevertheless, it is vital to show that this point of view needs to be corrected by pointing out that creativity and responsible data management can be compatible with each other. They can help bring about new ideas. Comprehensive security steps can make an organization's environment stable and safe to confidently try new technologies and services (Duggineni, 2023). By predicting and reducing possible security risks, organizations can take advantage of new possibilities without worrying about putting sensitive data at risk or breaking the law. This method allows the development of new ideas within a security and compliance system. Conclusion In cloud computing, the most important things should be responsible data management and strict data control, putting data protection ahead of convenience. This essay examined the risks when private data is sent to cloud providers not part of the company. The shared responsibility approach shows security holes and problems that could happen. Also, the danger of unauthorized access and the real-world effects of data breaches are always there. It shows how fragile data security is when convenience wins out over responsibility. Also, good data management practices align with legal requirements, especially GDPR, which shows how vital strict data control is for compliance. Organizations and workers also have an ethical responsibility to keep data safe and keep trust. In response to counterarguments, the essay debunks the idea that convenience should be more critical than security by showing how harmful the effects of a data breach are. It has also argued against the idea that strict data control stifles creativity by saying that thorough security measures can create a safe place for people to try new things and make progress. Cloud computing has benefits that cannot be matched regarding flexibility and saving money.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
7 However, these benefits cannot make people forget their moral and legal obligations to protect data and privacy. Finding a balance between ease and security in the cloud is possible, but it takes a solid commitment to responsible data management and strict data control. The facts are clear: putting data security first is not a choice. It is a must if we want a safer and more reliable digital future for everyone.
8 References Duggineni, S. (2023). Impact of Controls on Data Integrity and Information Systems. Science and Technology , 13 (2), 29-35. DOI: 10.5923/j.scit.20231302.04 Galiveeti, S., Tawalbeh, L. A., Tawalbeh, M., & El-Latif, A. A. A. (2021). Cybersecurity analysis: Investigating the data integrity and privacy in AWS and Azure cloud platforms. In Artificial intelligence and blockchain for future cybersecurity applications (pp. 329-360). Cham: Springer International Publishing. https://link.springer.com/chapter/10.1007/978-3-030-74575-2_17 Islam, M., & Reza, S. (2019). The rise of big data and cloud computing. Internet Things Cloud Comput , 7 (2), 45. doi: 10.11648/j.iotcc.20190702.12 Jiang, Y., Wang, C., Wang, Y., & Gao, L. (2019). A cross-chain solution to integrating multiple blockchains for IoT data management. Sensors , 19 (9), 2042. https://doi.org/10.3390/s19092042 Liu, X., Sun, S. X., & Huang, G. (2019). Decentralized services computing paradigm for blockchain-based data governance: Programmability, interoperability, and intelligence. IEEE Transactions on Services Computing , 13 (2), 343-355. DOI: 10.1109/TSC.2019.2951558