ENG 123 Project Two Persuasive Essay
docx
keyboard_arrow_up
School
CUNY John Jay College of Criminal Justice *
*We aren’t endorsed by this school
Course
123
Subject
English
Date
Feb 20, 2024
Type
docx
Pages
8
Uploaded by VET0003
1
Project Two
Victoria Thibodeaux
Southern New Hampshire University
ENG 123
Lisa Colletti
October 17, 2023
2
Project Two Persuasive Essay
In the field of cloud computing, which is changing quickly, a discussion has sprung up about
the delicate balance between data convenience and safety. As more businesses and people use
cloud services to store and handle their data, it is clear that these services' advantages of
being scalable and cost-effective cannot be ignored (Galiveeti, et al., 2021). However, this
ease comes with a cost: sensitive information is more likely to be broken into or violate
privacy. This essay makes the case for good data management and strict control. It will
discuss the risks of giving valuable data to outside cloud providers. It will also stress the
importance of complete control over data to protect its privacy and security. Finding a good
balance between data convenience and safety means putting the responsibility of protecting
data firmly in the hands of those who handle it (Duggineni, 2023). In cloud computing,
responsible data management and strict control ensure data security, confidentiality, ethical
responsibility, compliance with regulations, and striking a balance between data convenience
and security that is needed.
Risks and Vulnerabilities
When it comes to cloud computing, sending private data to third-party cloud providers opens
it up to possible risks and flaws. According to Galiveeti et al. (2021), the shared duty model
is an essential weakness in cloud computing. In this model, the cloud service company and
the customer are responsible for keeping data safe. It tries to spread the work of keeping data
safe but also complicates things and could leave security holes. Clients might wrongly think
that the cloud provider is responsible for certain parts of data security, which could lead to
oversights and security holes. This complexity shows how important it is for businesses to
control their data tightly and ensure that nothing about its security is left up to chance (Islam
& Reza, 2019). In addition, the possibility of unauthorized entry is a significant weakness in
3
cloud computing. Even well-known cloud companies can be attacked or have their data
stolen. These breaches can cost a lot of money and hurt a company's image. The 2019 Capital
One hack is an excellent example (Duggineni, 2023). Sensitive customer information was
leaked because an unauthorized person could access a cloud environment through a
misconfigured web application firewall. These things show how vulnerable data security is
when it is given to third-party providers.
Integrity and Confidentiality
The lack of strict data control compromises integrity and confidentiality. According to
Galiveeti et al. (2021), strict encryption control is one of the most important parts of cloud
data protection. When groups keep track of their encryption keys and protocols, they can
keep data from being accessed by people who should not be able to. End-to-end encryption is
an example of this kind of control (Duggineni, 2023). In this method, data stays encrypted
from when it leaves the client's environment until it reaches its final location. Without this
level of security, data is more likely to be exposed while it is in transit. Strict access
management also shows how important it is for companies to keep control of their data
(Galiveeti, et al., 2021). For example, organizations can ensure that only people can interact
with sensitive data by setting up access rules and ensuring they are followed (Islam & Reza,
2019). This control lets them choose who can see, change, or delete data. It makes it less
likely that insider risks or breaches will happen because credentials were stolen. In this
situation, storage procedures are just as necessary. By having strict control over where data is
kept and how it is duplicated for redundancy, organizations can reduce the risk of losing data
due to infrastructure failures or outages.
Regulation Compliance
Compliance with data security rules like GDPR shows how important it is for businesses to
use responsible data management practices to meet legal requirements and industry standards.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4
In this situation, the importance of GDPR and its link to managing data in a responsible way
directly shows how necessary strict data control and security steps are (Galiveeti, et al.,
2021). GDPR requires strict rules about how personal data is collected, processed, and stored,
and its effects reach cloud companies (Duggineni, 2023). Notably, GDPR has significant
fines for not following the rules, meaning businesses must take responsible data management
very carefully. According to Galiveeti et al. (2021), responsible data management practices,
like strong encryption and access control, help keep data safe and help meet GDPR standards.
By encrypting personal data, for example, you can ensure that even if a breach happens, the
data will not be understandable to people who should not have it. It lowers the risk of data
exposure and GDPR violations (Jiang et al., 2019). Additionally, responsible data
management aligns with the GDPR principle of data minimization, which says that
organizations should only gather and process the data they need for their intended purpose
(Islam & Reza, 2019). By keeping strict control over data, such as through access
management and safe storage, businesses can limit the amount of data they collect and
process, meeting this critical GDPR requirement.
Ethical Responsibility
The ethical responsibility of organizations and professionals in ensuring data security and
privacy transcends convenience and reinforces the need for responsible data management and
stringent data control in cloud computing. The duty of care toward the people whose data is
being treated is one of the most important ethical rules in data management (Jiang et al.,
2019). Organizations have a moral duty to protect their customers', clients', and employees'
personal information from unauthorized access, breaches, or abuse. According to Galiveeti et
al. (2021), this duty of care can be met with the help of ethical data management practices,
such as strong security measures and strict access controls. Ethical duty also includes
ensuring that organizations and stakeholders trust each other (Duggineni, 2023). Trust is a
5
weak and valuable thing that a breach in data security can break. Even if a high-profile data
breach does not break the law, it can hurt the company's image and make people less trusting.
Organizations must understand that their social duty includes keeping this trust, which can
take years to build but only seconds to break. The people who work in the field of cloud
computing also have a significant ethical duty. They build and watch over the systems that
process and store private information (Liu et al., 2019). For these professionals to act
ethically, they must build systems with security as the top priority, keep them updated to deal
with new threats and push for responsible data management within their organizations.
While arguing for responsible data management and strict control over data in cloud
computing, it is vital to address a counterargument that focuses on the ease and cost-
effectiveness of outsourcing data to third-party cloud providers. Some might say that the
benefits of cloud services, like growing as needed and having lower up-front infrastructure
costs, far outweigh the risks of data protection and privacy (Galiveeti, et al., 2021). From this
point of view, the ease and cost savings of cloud computing should be more important than
strict data control (Islam & Reza, 2019). However, knowing that putting ease ahead of data
security can lead to extensive and expensive problems is essential. Real-world examples of
data breaches and privacy violations, even by big, well-known cloud service providers, show
that the risks are genuine. For example, the Equifax breach of 2017 put the personal
information of more than 140 million people at risk. It shows how bad things can get when
ease is put ahead of security (Duggineni, 2023). Also, putting convenience ahead of the
ethical responsibility to protect sensitive data can hurt trust and image. Customers, clients,
and other stakeholders care a lot about the protection and privacy of their data. If you ignore
these worries, it can be hard to get people to trust you again.
Another point of view says that strict data control and responsible data management in cloud
computing should be more flexible and stop new ideas from coming up. Proponents of this
6
view say that by requiring strict security measures and strict data control, organizations may
lose their ability to be flexible and use cloud technologies to their fullest potential (Liu et al.,
2019). Nevertheless, it is vital to show that this point of view needs to be corrected by
pointing out that creativity and responsible data management can be compatible with each
other. They can help bring about new ideas. Comprehensive security steps can make an
organization's environment stable and safe to confidently try new technologies and services
(Duggineni, 2023). By predicting and reducing possible security risks, organizations can take
advantage of new possibilities without worrying about putting sensitive data at risk or
breaking the law. This method allows the development of new ideas within a security and
compliance system.
Conclusion
In cloud computing, the most important things should be responsible data management and
strict data control, putting data protection ahead of convenience. This essay examined the
risks when private data is sent to cloud providers not part of the company. The shared
responsibility approach shows security holes and problems that could happen. Also, the
danger of unauthorized access and the real-world effects of data breaches are always there. It
shows how fragile data security is when convenience wins out over responsibility. Also, good
data management practices align with legal requirements, especially GDPR, which shows
how vital strict data control is for compliance. Organizations and workers also have an ethical
responsibility to keep data safe and keep trust.
In response to counterarguments, the essay debunks the idea that convenience should be more
critical than security by showing how harmful the effects of a data breach are. It has also
argued against the idea that strict data control stifles creativity by saying that thorough
security measures can create a safe place for people to try new things and make progress.
Cloud computing has benefits that cannot be matched regarding flexibility and saving money.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
7
However, these benefits cannot make people forget their moral and legal obligations to
protect data and privacy. Finding a balance between ease and security in the cloud is possible,
but it takes a solid commitment to responsible data management and strict data control. The
facts are clear: putting data security first is not a choice. It is a must if we want a safer and
more reliable digital future for everyone.
8
References
Duggineni, S. (2023). Impact of Controls on Data Integrity and Information Systems. Science
and Technology
, 13
(2), 29-35. DOI: 10.5923/j.scit.20231302.04
Galiveeti, S., Tawalbeh, L. A., Tawalbeh, M., & El-Latif, A. A. A. (2021). Cybersecurity analysis: Investigating the data integrity and privacy in AWS and Azure cloud platforms. In Artificial intelligence and blockchain for future cybersecurity applications
(pp. 329-360). Cham: Springer International Publishing. https://link.springer.com/chapter/10.1007/978-3-030-74575-2_17
Islam, M., & Reza, S. (2019). The rise of big data and cloud computing. Internet Things Cloud Comput
, 7
(2), 45. doi: 10.11648/j.iotcc.20190702.12
Jiang, Y., Wang, C., Wang, Y., & Gao, L. (2019). A cross-chain solution to integrating multiple blockchains for IoT data management. Sensors
, 19
(9), 2042. https://doi.org/10.3390/s19092042
Liu, X., Sun, S. X., & Huang, G. (2019). Decentralized services computing paradigm for blockchain-based data governance: Programmability, interoperability, and intelligence. IEEE Transactions on Services Computing
, 13
(2), 343-355. DOI: 10.1109/TSC.2019.2951558