100-word response 1 reference
Diego
Cloud computing offers a centralized source of information. It is helpful to security managers as it allows fast and easy transfer of information over the Internet. Cloud computing has been instrumental in government and business operations as it has accelerated operations and safeguarded data from emerging and current cybersecurity threats. Concentric layering plays a significant role in ensuring the security of servers and computers. Layering ensures unauthorized criminal access to intellectual access to intellectual property does not result in security loss of a large number of clientele or consumers. Cloud computing and concentric layering are great data security measures that will enhance data security in the future.
Cloud computing will increase the data storage capacity. Many companies now produce many data that cannot be stored in hardware. Cloud providers will develop data centers at low prices. The exercise will enhance internet performance through the help of the Internet of aspects that help security managers in fast and high-quality data transmission. Quality internet will minimize the chances of cyber-breach (Goodison, 2020). Data analytics will be made more accessible with the help of cloud computing and the Internet of Things which is crucial to security managers as they will forecast any imminent threats to data security.
The concept of concentric layers can apply in future design and application access control and computers. Concentric layering ensures that unauthorized access to data does not lead to a security breach of individuals. Access control is meant to authenticate and authorize access to information (Martin, 2019). Therefore, concentric can apply in application access control by reducing the damage of data access by fake identities. For example, concentric layering can restrict unauthorized access to a company’s servers, leading to the disclosure of sensitive information. Secondly, concentric layering can curb identity theft cases through an authentication process, and finally, it minimizes chances of cybercrime, especially on social media, by barring unauthorized logins.