Enhancing Data Security on Corporate Servers Essay

Exclusively available on Available only on IvyPanda® Written by Human No AI

Ensuring the security of data stored on corporate servers is a priority for most companies working with digital information. For this purpose, organizations require reliable data storage and processing algorithms, and as operating systems, Unix or Linux are preferred. According to Brys and Martínez (2022), based on a report from various providers, about 91% of all cyberattacks are against Windows-based databases (p. 4). Linux, which is the commercial equivalent of Unix, is more secure and stable, which makes it the preferred choice for protecting large amounts of corporate data. Unix is ​​more commonly used for technical purposes, while Linux is a more convenient adaptation for commercial and private purposes.

Compared to Windows, Unix/Linux systems have a number of advantages, which is also important for corporate servers. Firstly, these systems are mostly free, have advanced configurations, and are more stable (Schartz, 2021). Secondly, having large amounts of data to manage on corporate servers, companies need to be sure of the reliability of storage and the absence of internal problems and errors. Unix/Linux systems have official support from the manufacturer, and any maintenance is legal and does not require the involvement of third parties (Schartz, 2021). This factor indicates the safety of work and confirms that no malware is used. Finally, customization is a valuable option that sets Unix/Linux apart from Windows, for instance. As Schartz (2021) states, corporate professionals can set up such an operating system and adapt it to specific business processes and tasks while maintaining the basic functionality. All these characteristics speak in favor of the use of Unix/Linux in corporate servers instead of other less stable systems with a higher risk of data leakage.

The distinctive types of computing in use today are intended to address different tasks, despite some common basic functions. Cloud computing is in-demand today, which, as Srivastava and Khan (2018) note, is due to the delivery of services over the Internet and the differences from traditional algorithms in greater cost-effectiveness and speed. Cloud computing allows for maintaining the stable operation of databases, servers, and other digital nodes.

Green computing is a principle associated with the trend toward safer use of technological potential. Saha (2018) draws attention to the reduced environmental impacts and reduced energy consumption compared to cloud computing. This technology is actively used in modern devices, including household items, and contributes to the rational distribution of energy. Economic viability is one of the goals that users of this type of computing pursue.

Unlike the other two types, quantum computing is more complex and narrow technology. Gyongyosi and Imre (2019) study its features and note that the algorithms involved in these processes engage quantum mechanics as one of the main algorithms for data processing and interpretation. Among the terms that the authors name, “quantum superposition, quantum entanglement, or the no-cloning theorem” deserve attention (p. 51). Calculations are carried out through the analyses of energy and material levels.

While comparing the three types of computing, one can note that quantum technology stands apart from the other two due to the more complex algorithms involved in their operations. The differences between cloud and green computing are, first of all, in the share and dynamics of energy consumption, although the functions and tasks are similar. Thus, quantum processes make computing schemes different from both traditional and modern ways of working with digital data.

References

Brys, C., & Martínez, D. L. L. R. (2022). . Revista de Investigación en Tecnologías de la Información, 10(22), 1-14. Web.

Gyongyosi, L., & Imre, S. (2019). . Computer Science Review, 31, 51-71. Web.

Saha, B. (2018). . International Journal of Computer Sciences and Engineering, 6(3), 467-469. Web.

Schartz, S. M. (2021). Information systems: No boundaries! A concise approach to understanding information systems for all disciplines. Open Educational Resources. Web.

Srivastava, P., & Khan, R. (2018). A review paper on cloud computing. International Journal of Advanced Research in Computer Science and Software Engineering, 8(6), 17-20. Web.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2023, December 2). Enhancing Data Security on Corporate Servers. https://ivypanda.com/essays/enhancing-data-security-on-corporate-servers/

Work Cited

"Enhancing Data Security on Corporate Servers." IvyPanda, 2 Dec. 2023, ivypanda.com/essays/enhancing-data-security-on-corporate-servers/.

References

IvyPanda. (2023) 'Enhancing Data Security on Corporate Servers'. 2 December.

References

IvyPanda. 2023. "Enhancing Data Security on Corporate Servers." December 2, 2023. https://ivypanda.com/essays/enhancing-data-security-on-corporate-servers/.

1. IvyPanda. "Enhancing Data Security on Corporate Servers." December 2, 2023. https://ivypanda.com/essays/enhancing-data-security-on-corporate-servers/.


Bibliography


IvyPanda. "Enhancing Data Security on Corporate Servers." December 2, 2023. https://ivypanda.com/essays/enhancing-data-security-on-corporate-servers/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
1 / 1