preview

Developing Counter Measures Can Help Protect Themselves From Hackers Essay

Best Essays

IV. IMPORTANCE / BENEFITS OF THE STUDY Despite the growth in cloud computing, many enterprises adopted the model, several security issues raise severe concerns about the performance which requires us to cast a wider net to find practical solutions to cloud security that work with technology that is available today. Various techniques need to be used making cloud computing secure and it will improve service delivery. The major concern is how to protect data from illegal access by hackers. The goal of this research is to help in educating organizations and individuals on how to protect themselves from hackers. Developing counter-measures can help in ensuring the safety of data in cloud computing. This will mean more organizations will trust cloud computing companies. Key areas for security concerns are (1) Data in server/rest, (2) data in transit, (3) authentication, (4) separation between customers, (5) cloud legal and regulatory issues and (6) incident response. Keeping data secure is vital in cloud computing and companies to ensure that their clients are protected. V. RESEARCH DESIGN The research will adopt a descriptive survey design approach. This approach entails utilizing the research questions as a guide to fulfilling the research objectives. The choice is informed by the lack of control or influence of the variables by the researcher. In essence, the study method entails fact finding enquires that can be implemented in different forms. In addition, the choice

Get Access