SlideShare ist ein Scribd-Unternehmen logo
1 von 15
J A W A D H A S A N ( 5 5 6 )
R A N A M U H A M M A D A D N A N A K B A R ( 5 4 0 )
M A L I K A B I D H U S S A I N ( 5 3 7 )
Network Dependency.
Security & Privacy.
Cost of bandwidth.
Trust on cloud provider.
Limited control.
Centralization.
Network Dependency
Cloud computing is dependent on the internet.
The most basic drawback of cloud computing is that
you need internet connection to access the cloud and
this direct tie to the internet means that this system is
prone to outages and service interruptions at any time.
This could occur in the middle of a task or transaction,
meaning the action could be delayed or lost entirely if
time sensitive.
Security & Privacy
There is already a huge risk with data hosted in-house, so
it’s no secret that data offsite sits at even higher risk. With Data
offsite, more avenues for attack and the fact that it will be
traveling more makes it easier to be intercepted. With
technology always improving, there are ways to make sure
of better encryption. However with technology always
improving, there are always people out there improving their
hacking skills.
Cost of Bandwidth
We are switching to the cloud computing to reduce our
cost but we spend more money in cloud computing. Look at
the scenario , we are switching to the cloud computing, we will
pay to the Cloud Provider and we will also pay to Internet
Service Provider (ISP). As we need high speed internet
connection So , we have to pay more for High Bandwidth to
ISP.
Trust on Cloud Provider
We have to trust on the internet provider. Our data is very
important. We going to give out data to the third person. We
should think about it. Is the person we are going to trust is the
trustable. Is the Cloud Provider is not our competitive from any
side. Cloud provider has the administrative rights to do
anything.
Limited Control
We can perform limited operations to our files. Clint has
the limited control to the application. The Cloud Provider can
delete or update any application but we have not the ability to
delete or update the application. We just have to use the
provided version of the software. If we have our system on
desktop we can easily update our software or change the
software.
Centralization
Organizations usually outsource data and
application services to a centralized provider. In cloud
computing, we know that network dependency is a
drawback due to outages. Centralized data can
certainly add another risk to cloud computing: If the
provider’s service goes down, all clients are affected.
Questions
Which storage medium used in cloud ?
Is data stored in clouds or not?
Questions
What is the difference between
File Server & Cloud Storage?
Questions
Can we say internet is Cloud ?
Why or Why not ?
Questions
How can you say that Cloud Computing
Saves our money?
Questions
As a Cloud Provider
How can I create our Cloud ?
Thank You!

Weitere ähnliche Inhalte

Was ist angesagt?

eSentinel™ – 360° Cybersecurity Platform Simplified
eSentinel™ – 360° Cybersecurity Platform SimplifiedeSentinel™ – 360° Cybersecurity Platform Simplified
eSentinel™ – 360° Cybersecurity Platform SimplifiedNetpluz Asia Pte Ltd
 
What is the safest vpn to use
What is the safest vpn to useWhat is the safest vpn to use
What is the safest vpn to useSathish Kumar M
 
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own DevicesForrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own DevicesNetskope
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentalsCloudflare
 
It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?Cloudflare
 
5 examples of how easily data leaks can occur
5 examples of how easily data leaks can occur5 examples of how easily data leaks can occur
5 examples of how easily data leaks can occurCristina Collado
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security pptSAIKAT BISWAS
 
Strengthen Cloud Security
Strengthen Cloud SecurityStrengthen Cloud Security
Strengthen Cloud SecurityLora O'Haver
 
Defcon 27 - The Future of Command and Control
Defcon 27 - The Future of Command and ControlDefcon 27 - The Future of Command and Control
Defcon 27 - The Future of Command and ControlNetskope
 
BeyondCorp: Closing the Adherence Gap
BeyondCorp: Closing the Adherence GapBeyondCorp: Closing the Adherence Gap
BeyondCorp: Closing the Adherence GapIvan Dwyer
 
Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cloudflare
 
Cloud Access Security Brokers
Cloud Access Security BrokersCloud Access Security Brokers
Cloud Access Security BrokersAbhishek Tripathi
 
Top Security Predictions for 2015
Top Security Predictions for 2015Top Security Predictions for 2015
Top Security Predictions for 2015Juniper Networks
 
MassTLC Opening Slides and Simulation Session
MassTLC Opening Slides and Simulation SessionMassTLC Opening Slides and Simulation Session
MassTLC Opening Slides and Simulation SessionMassTLC
 
How to Build a Practical and Cost-Effective Security Strategy
How to Build a Practical and Cost-Effective Security StrategyHow to Build a Practical and Cost-Effective Security Strategy
How to Build a Practical and Cost-Effective Security StrategyCloudflare
 
Tripwire Adaptive Threat Protection
Tripwire Adaptive Threat ProtectionTripwire Adaptive Threat Protection
Tripwire Adaptive Threat ProtectionTripwire
 
Accelerate your digital transformation
Accelerate your digital transformationAccelerate your digital transformation
Accelerate your digital transformationCloudflare
 
Risks to Cloud based critical infrastructure -- DHS bulletin
Risks to Cloud based critical infrastructure -- DHS bulletinRisks to Cloud based critical infrastructure -- DHS bulletin
Risks to Cloud based critical infrastructure -- DHS bulletinDavid Sweigert
 
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...Cloudflare
 
Personam Solution - How it Works Brief
Personam Solution - How it Works BriefPersonam Solution - How it Works Brief
Personam Solution - How it Works BriefSunny Geo
 

Was ist angesagt? (20)

eSentinel™ – 360° Cybersecurity Platform Simplified
eSentinel™ – 360° Cybersecurity Platform SimplifiedeSentinel™ – 360° Cybersecurity Platform Simplified
eSentinel™ – 360° Cybersecurity Platform Simplified
 
What is the safest vpn to use
What is the safest vpn to useWhat is the safest vpn to use
What is the safest vpn to use
 
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own DevicesForrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
 
It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?
 
5 examples of how easily data leaks can occur
5 examples of how easily data leaks can occur5 examples of how easily data leaks can occur
5 examples of how easily data leaks can occur
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
 
Strengthen Cloud Security
Strengthen Cloud SecurityStrengthen Cloud Security
Strengthen Cloud Security
 
Defcon 27 - The Future of Command and Control
Defcon 27 - The Future of Command and ControlDefcon 27 - The Future of Command and Control
Defcon 27 - The Future of Command and Control
 
BeyondCorp: Closing the Adherence Gap
BeyondCorp: Closing the Adherence GapBeyondCorp: Closing the Adherence Gap
BeyondCorp: Closing the Adherence Gap
 
Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)
 
Cloud Access Security Brokers
Cloud Access Security BrokersCloud Access Security Brokers
Cloud Access Security Brokers
 
Top Security Predictions for 2015
Top Security Predictions for 2015Top Security Predictions for 2015
Top Security Predictions for 2015
 
MassTLC Opening Slides and Simulation Session
MassTLC Opening Slides and Simulation SessionMassTLC Opening Slides and Simulation Session
MassTLC Opening Slides and Simulation Session
 
How to Build a Practical and Cost-Effective Security Strategy
How to Build a Practical and Cost-Effective Security StrategyHow to Build a Practical and Cost-Effective Security Strategy
How to Build a Practical and Cost-Effective Security Strategy
 
Tripwire Adaptive Threat Protection
Tripwire Adaptive Threat ProtectionTripwire Adaptive Threat Protection
Tripwire Adaptive Threat Protection
 
Accelerate your digital transformation
Accelerate your digital transformationAccelerate your digital transformation
Accelerate your digital transformation
 
Risks to Cloud based critical infrastructure -- DHS bulletin
Risks to Cloud based critical infrastructure -- DHS bulletinRisks to Cloud based critical infrastructure -- DHS bulletin
Risks to Cloud based critical infrastructure -- DHS bulletin
 
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
 
Personam Solution - How it Works Brief
Personam Solution - How it Works BriefPersonam Solution - How it Works Brief
Personam Solution - How it Works Brief
 

Andere mochten auch

Fusion21/CITB Merseyside & Cheshire Shared Apprentice Scheme
Fusion21/CITB Merseyside & Cheshire Shared Apprentice SchemeFusion21/CITB Merseyside & Cheshire Shared Apprentice Scheme
Fusion21/CITB Merseyside & Cheshire Shared Apprentice SchemeNancy Sutton-Professional
 
Trucos y tratos para cobrar más y mejor
Trucos y tratos para cobrar más y mejorTrucos y tratos para cobrar más y mejor
Trucos y tratos para cobrar más y mejorIMSolutions
 
Informe EGM- 3er acumulado 2013 22gradosº
Informe  EGM- 3er acumulado 2013 22gradosº  Informe  EGM- 3er acumulado 2013 22gradosº
Informe EGM- 3er acumulado 2013 22gradosº 22gradosº
 
Memoria Cineclubista PE
Memoria Cineclubista PEMemoria Cineclubista PE
Memoria Cineclubista PEMemória FEPEC
 
Top 10 Internet Trends 2011
Top 10 Internet Trends 2011Top 10 Internet Trends 2011
Top 10 Internet Trends 2011Jürg Stuker
 
Estrategias de marketing en Redes 2.0 para el isb
Estrategias de marketing en Redes 2.0 para el isbEstrategias de marketing en Redes 2.0 para el isb
Estrategias de marketing en Redes 2.0 para el isbDitto Silva
 
apoksiomen-de-en
apoksiomen-de-enapoksiomen-de-en
apoksiomen-de-enAna Nikolic
 
True stories booklet - Allianz Global Assistance 2010 Annual Report
True stories booklet - Allianz Global Assistance 2010 Annual ReportTrue stories booklet - Allianz Global Assistance 2010 Annual Report
True stories booklet - Allianz Global Assistance 2010 Annual ReportAllianz Global Assistance
 
Blog de motos
Blog de motosBlog de motos
Blog de motosMotos2015
 
Formacion De Especialistas Responsabilidad Compartida
Formacion De Especialistas Responsabilidad CompartidaFormacion De Especialistas Responsabilidad Compartida
Formacion De Especialistas Responsabilidad Compartidaguest1c9ac82
 
Herramientas de comunicación web 2.0 en la dirección de proyectos cio 2009 ...
Herramientas de comunicación web 2.0 en la dirección de proyectos   cio 2009 ...Herramientas de comunicación web 2.0 en la dirección de proyectos   cio 2009 ...
Herramientas de comunicación web 2.0 en la dirección de proyectos cio 2009 ...Ramon Costa i Pujol
 
Curso de rescatadores. Apuntes2013. Soto Vercher
Curso de rescatadores. Apuntes2013. Soto VercherCurso de rescatadores. Apuntes2013. Soto Vercher
Curso de rescatadores. Apuntes2013. Soto VercherMÓNICA M. SOTO VERCHER
 
Vitalism & its acceptance in modern sciences
Vitalism & its acceptance in modern sciencesVitalism & its acceptance in modern sciences
Vitalism & its acceptance in modern sciencesAnju Jethani
 
Blazek - Legal Framework
Blazek - Legal FrameworkBlazek - Legal Framework
Blazek - Legal FrameworkJan Fried
 
How do social technologies change knowledge worker business processes km me...
How do social technologies change knowledge worker business processes   km me...How do social technologies change knowledge worker business processes   km me...
How do social technologies change knowledge worker business processes km me...Martin Sumner-Smith
 
Startup Selling: How to sell if you really, really have to and don't know how...
Startup Selling: How to sell if you really, really have to and don't know how...Startup Selling: How to sell if you really, really have to and don't know how...
Startup Selling: How to sell if you really, really have to and don't know how...SalesQualia
 

Andere mochten auch (20)

Fusion21/CITB Merseyside & Cheshire Shared Apprentice Scheme
Fusion21/CITB Merseyside & Cheshire Shared Apprentice SchemeFusion21/CITB Merseyside & Cheshire Shared Apprentice Scheme
Fusion21/CITB Merseyside & Cheshire Shared Apprentice Scheme
 
Trucos y tratos para cobrar más y mejor
Trucos y tratos para cobrar más y mejorTrucos y tratos para cobrar más y mejor
Trucos y tratos para cobrar más y mejor
 
Yearning voices
Yearning voicesYearning voices
Yearning voices
 
Informe EGM- 3er acumulado 2013 22gradosº
Informe  EGM- 3er acumulado 2013 22gradosº  Informe  EGM- 3er acumulado 2013 22gradosº
Informe EGM- 3er acumulado 2013 22gradosº
 
Memoria Cineclubista PE
Memoria Cineclubista PEMemoria Cineclubista PE
Memoria Cineclubista PE
 
Top 10 Internet Trends 2011
Top 10 Internet Trends 2011Top 10 Internet Trends 2011
Top 10 Internet Trends 2011
 
Estrategias de marketing en Redes 2.0 para el isb
Estrategias de marketing en Redes 2.0 para el isbEstrategias de marketing en Redes 2.0 para el isb
Estrategias de marketing en Redes 2.0 para el isb
 
apoksiomen-de-en
apoksiomen-de-enapoksiomen-de-en
apoksiomen-de-en
 
True stories booklet - Allianz Global Assistance 2010 Annual Report
True stories booklet - Allianz Global Assistance 2010 Annual ReportTrue stories booklet - Allianz Global Assistance 2010 Annual Report
True stories booklet - Allianz Global Assistance 2010 Annual Report
 
Blog de motos
Blog de motosBlog de motos
Blog de motos
 
Formacion De Especialistas Responsabilidad Compartida
Formacion De Especialistas Responsabilidad CompartidaFormacion De Especialistas Responsabilidad Compartida
Formacion De Especialistas Responsabilidad Compartida
 
Ponto+pd buro2013
Ponto+pd buro2013Ponto+pd buro2013
Ponto+pd buro2013
 
Herramientas de comunicación web 2.0 en la dirección de proyectos cio 2009 ...
Herramientas de comunicación web 2.0 en la dirección de proyectos   cio 2009 ...Herramientas de comunicación web 2.0 en la dirección de proyectos   cio 2009 ...
Herramientas de comunicación web 2.0 en la dirección de proyectos cio 2009 ...
 
Curso de rescatadores. Apuntes2013. Soto Vercher
Curso de rescatadores. Apuntes2013. Soto VercherCurso de rescatadores. Apuntes2013. Soto Vercher
Curso de rescatadores. Apuntes2013. Soto Vercher
 
Vitalism & its acceptance in modern sciences
Vitalism & its acceptance in modern sciencesVitalism & its acceptance in modern sciences
Vitalism & its acceptance in modern sciences
 
Blazek - Legal Framework
Blazek - Legal FrameworkBlazek - Legal Framework
Blazek - Legal Framework
 
How do social technologies change knowledge worker business processes km me...
How do social technologies change knowledge worker business processes   km me...How do social technologies change knowledge worker business processes   km me...
How do social technologies change knowledge worker business processes km me...
 
Edad media vocal
Edad media vocalEdad media vocal
Edad media vocal
 
UniCall - prezentace společnosti
UniCall - prezentace společnosti  UniCall - prezentace společnosti
UniCall - prezentace společnosti
 
Startup Selling: How to sell if you really, really have to and don't know how...
Startup Selling: How to sell if you really, really have to and don't know how...Startup Selling: How to sell if you really, really have to and don't know how...
Startup Selling: How to sell if you really, really have to and don't know how...
 

Ähnlich wie Cloud computing disadvantages

9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloud9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloudkairostech
 
How Cloud Computing Works
How Cloud Computing WorksHow Cloud Computing Works
How Cloud Computing WorksJason Robinson
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Editor IJARCET
 
The Top 5 Risks of Cloud Migration
The Top 5 Risks of Cloud Migration The Top 5 Risks of Cloud Migration
The Top 5 Risks of Cloud Migration Protected Harbor
 
White Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area NetworksWhite Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area NetworksChristopher Lietz
 
White Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area NetworksWhite Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area NetworksChristopher Lietz
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 
Implementation of user authentication as a service for cloud network
Implementation of user authentication as a service for cloud networkImplementation of user authentication as a service for cloud network
Implementation of user authentication as a service for cloud networkSalam Shah
 
Implementation_of_User_Authentication_as
Implementation_of_User_Authentication_asImplementation_of_User_Authentication_as
Implementation_of_User_Authentication_asMasood Shah
 
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGIRJET Journal
 
Fog computing document
Fog computing documentFog computing document
Fog computing documentsravya raju
 
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsSecurity for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsEditor IJCATR
 
Virtual private network feature and benefits
Virtual private network feature and benefitsVirtual private network feature and benefits
Virtual private network feature and benefitsAnthony Daniel
 
ICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference PublicationICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference PublicationTejaswi Agarwal
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 

Ähnlich wie Cloud computing disadvantages (20)

9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloud9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloud
 
How Cloud Computing Works
How Cloud Computing WorksHow Cloud Computing Works
How Cloud Computing Works
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409
 
The Top 5 Risks of Cloud Migration
The Top 5 Risks of Cloud Migration The Top 5 Risks of Cloud Migration
The Top 5 Risks of Cloud Migration
 
White Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area NetworksWhite Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area Networks
 
White Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area NetworksWhite Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area Networks
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Fog doc
Fog doc Fog doc
Fog doc
 
Implementation of user authentication as a service for cloud network
Implementation of user authentication as a service for cloud networkImplementation of user authentication as a service for cloud network
Implementation of user authentication as a service for cloud network
 
Implementation_of_User_Authentication_as
Implementation_of_User_Authentication_asImplementation_of_User_Authentication_as
Implementation_of_User_Authentication_as
 
Security threat in cloud computing
Security threat in cloud computingSecurity threat in cloud computing
Security threat in cloud computing
 
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
 
Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
 
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsSecurity for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi Clouds
 
Virtual private network feature and benefits
Virtual private network feature and benefitsVirtual private network feature and benefits
Virtual private network feature and benefits
 
ICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference PublicationICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference Publication
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
H017155360
H017155360H017155360
H017155360
 

Mehr von Muhammad Zubair (14)

Cloud computing
Cloud computingCloud computing
Cloud computing
 
Lecture10
Lecture10Lecture10
Lecture10
 
Lecture9 recursion
Lecture9 recursionLecture9 recursion
Lecture9 recursion
 
Lecture8
Lecture8Lecture8
Lecture8
 
Lecture7
Lecture7Lecture7
Lecture7
 
Lecture6
Lecture6Lecture6
Lecture6
 
Lecture5
Lecture5Lecture5
Lecture5
 
Lecture4
Lecture4Lecture4
Lecture4
 
Lecture3
Lecture3Lecture3
Lecture3
 
Lecture3
Lecture3Lecture3
Lecture3
 
Lecture2
Lecture2Lecture2
Lecture2
 
Lecture1
Lecture1Lecture1
Lecture1
 
Indin report by zubair
Indin report by zubairIndin report by zubair
Indin report by zubair
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 

Kürzlich hochgeladen

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 

Kürzlich hochgeladen (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 

Cloud computing disadvantages

  • 1.
  • 2. J A W A D H A S A N ( 5 5 6 ) R A N A M U H A M M A D A D N A N A K B A R ( 5 4 0 ) M A L I K A B I D H U S S A I N ( 5 3 7 )
  • 3. Network Dependency. Security & Privacy. Cost of bandwidth. Trust on cloud provider. Limited control. Centralization.
  • 4. Network Dependency Cloud computing is dependent on the internet. The most basic drawback of cloud computing is that you need internet connection to access the cloud and this direct tie to the internet means that this system is prone to outages and service interruptions at any time. This could occur in the middle of a task or transaction, meaning the action could be delayed or lost entirely if time sensitive.
  • 5. Security & Privacy There is already a huge risk with data hosted in-house, so it’s no secret that data offsite sits at even higher risk. With Data offsite, more avenues for attack and the fact that it will be traveling more makes it easier to be intercepted. With technology always improving, there are ways to make sure of better encryption. However with technology always improving, there are always people out there improving their hacking skills.
  • 6. Cost of Bandwidth We are switching to the cloud computing to reduce our cost but we spend more money in cloud computing. Look at the scenario , we are switching to the cloud computing, we will pay to the Cloud Provider and we will also pay to Internet Service Provider (ISP). As we need high speed internet connection So , we have to pay more for High Bandwidth to ISP.
  • 7. Trust on Cloud Provider We have to trust on the internet provider. Our data is very important. We going to give out data to the third person. We should think about it. Is the person we are going to trust is the trustable. Is the Cloud Provider is not our competitive from any side. Cloud provider has the administrative rights to do anything.
  • 8. Limited Control We can perform limited operations to our files. Clint has the limited control to the application. The Cloud Provider can delete or update any application but we have not the ability to delete or update the application. We just have to use the provided version of the software. If we have our system on desktop we can easily update our software or change the software.
  • 9. Centralization Organizations usually outsource data and application services to a centralized provider. In cloud computing, we know that network dependency is a drawback due to outages. Centralized data can certainly add another risk to cloud computing: If the provider’s service goes down, all clients are affected.
  • 10. Questions Which storage medium used in cloud ? Is data stored in clouds or not?
  • 11. Questions What is the difference between File Server & Cloud Storage?
  • 12. Questions Can we say internet is Cloud ? Why or Why not ?
  • 13. Questions How can you say that Cloud Computing Saves our money?
  • 14. Questions As a Cloud Provider How can I create our Cloud ?