Cloud Computing Course Essay

Submitted By littlegirl1145
Words: 516
Pages: 3

Johnson & Wales University
Providence, Rhode Island

Assignment #1 Cloud Computing

Course: Accounting Information Systems

Robin Fino
June 24, 2013

Cloud computing according to IBA “is often referred to as “the cloud”, is the delivery on on-demand computing resources-everything from applications to data centers-over the Internet and on a pay-for-use basis” (Cisco, para, 1). There is no software to purchase, install, update or maintain, which is handled by the services providers and applications and data are accessible from any computer or device, (Ciscm, Some of the services that are provided by Cloud computing “include; software as a service or SaaS; an example would be Google gmail a cloud based SaaS application that replaces traditional emil programs that run on your computers”, stated Cisco kdfjdf Another example according to Cisco,,,, :”a platform as a a service or PaaS and this provides a cloud-based environment with everything required to support the complete lifecycle of building and delivering web-based applications without the cost and complexity of buying and managing.
The last example discussed by Cisco, “Infrastructure or IaaS; in which companies with computing resources including servers, networking, storage, and data center space on a pay-per-use basis”. The technology needed for Cloud computing is simple according to, “Cloud-based apps can be up a running in days or weeks, and they cost less -with a cloud app, you just open a browser, log in, customize the application and start using it”
Accounting applications that can be used on the cloud

Some of the risks and control issues with cloud-computing according to Romney, M. & Steinbart, P., p. 241, 2012) “Unsupervised physical access in a virtualization environment exposes not just one device but the entire virtual network to the risk of theft or destruction and compromise”. Also cloud computing’s authentication ofter relies solely on passwords; the only thing protecting one cloud customer’s data from unauthorized access by another cloud customer is the strength of the password used to sing onto the system stated Romey, M & Steinbart, P, p,. 241, 2012). According to Romney,,,,,,, “ Strong user controls, ideally