Context of the Problem
Context of the Problem
Information technology (IT) is now solidly a vital part of any organization (Stockman, Leung, Nyland, & Said, 2013). As the use of computer networks, especially the Internet, has become pervasive, the concept of computer security has expanded to denote issues pertaining to the networked use of computers and their resources (Kinkus, 2002). Computer security is a section of Information Technology known as information security as it is applied to computers and computer networks. Computer system security is the combined processes and mechanisms by which sensitive and valuable ...view middle of the document...
The main focus of computer security is protecting information, information accuracy, and availability, ensuring information delivery.
Keeping computer information safe and secure has become vital to business survival. Presumably, each time you connect to the Internet you are wandering through a neighborhood which has a reputation for being jam-packed with scammers. These scammers sole mission is stealing consumer’s money, personal information, installing damaging programs on your computer, or misleading you with an online scam (Kulkarni, Kaduskar, 2010). Because of the easiness in which information in electronic format can be shared among companies and small pieces of related information from different sources can be easily linked together to form a composite of, for example, a person's information seeking habits, it is now very important that individuals are able to maintain control over what information is collected about them, how it is used, who may use it, and what purpose it is used for (Kinkus, 2002). Although, users may believe that they have nothing to hide when they are registering with an Internet site or service, privacy on the Internet is about protecting one's personal information, even if the information does not seem, sensitive. The paper presents the risks associated with the open issues on data protection, such as vulnerabilities, security and privacy issues pertaining to cloud security. Analysis the method and model for rapid deployment of cloud resource share are proposed on basis of shared cloud security...