Enhancing Data Security on Corporate Servers Essay

Exclusively available on IvyPanda Available only on IvyPanda
Updated: Dec 2nd, 2023

Ensuring the security of data stored on corporate servers is a priority for most companies working with digital information. For this purpose, organizations require reliable data storage and processing algorithms, and as operating systems, Unix or Linux are preferred. According to Brys and Martínez (2022), based on a report from various providers, about 91% of all cyberattacks are against Windows-based databases (p. 4). Linux, which is the commercial equivalent of Unix, is more secure and stable, which makes it the preferred choice for protecting large amounts of corporate data. Unix is ​​more commonly used for technical purposes, while Linux is a more convenient adaptation for commercial and private purposes.

We will write a custom essay on your topic a custom Essay on Enhancing Data Security on Corporate Servers
808 writers online

Compared to Windows, Unix/Linux systems have a number of advantages, which is also important for corporate servers. Firstly, these systems are mostly free, have advanced configurations, and are more stable (Schartz, 2021). Secondly, having large amounts of data to manage on corporate servers, companies need to be sure of the reliability of storage and the absence of internal problems and errors. Unix/Linux systems have official support from the manufacturer, and any maintenance is legal and does not require the involvement of third parties (Schartz, 2021). This factor indicates the safety of work and confirms that no malware is used. Finally, customization is a valuable option that sets Unix/Linux apart from Windows, for instance. As Schartz (2021) states, corporate professionals can set up such an operating system and adapt it to specific business processes and tasks while maintaining the basic functionality. All these characteristics speak in favor of the use of Unix/Linux in corporate servers instead of other less stable systems with a higher risk of data leakage.

The distinctive types of computing in use today are intended to address different tasks, despite some common basic functions. Cloud computing is in-demand today, which, as Srivastava and Khan (2018) note, is due to the delivery of services over the Internet and the differences from traditional algorithms in greater cost-effectiveness and speed. Cloud computing allows for maintaining the stable operation of databases, servers, and other digital nodes.

Green computing is a principle associated with the trend toward safer use of technological potential. Saha (2018) draws attention to the reduced environmental impacts and reduced energy consumption compared to cloud computing. This technology is actively used in modern devices, including household items, and contributes to the rational distribution of energy. Economic viability is one of the goals that users of this type of computing pursue.

Unlike the other two types, quantum computing is more complex and narrow technology. Gyongyosi and Imre (2019) study its features and note that the algorithms involved in these processes engage quantum mechanics as one of the main algorithms for data processing and interpretation. Among the terms that the authors name, “quantum superposition, quantum entanglement, or the no-cloning theorem” deserve attention (p. 51). Calculations are carried out through the analyses of energy and material levels.

While comparing the three types of computing, one can note that quantum technology stands apart from the other two due to the more complex algorithms involved in their operations. The differences between cloud and green computing are, first of all, in the share and dynamics of energy consumption, although the functions and tasks are similar. Thus, quantum processes make computing schemes different from both traditional and modern ways of working with digital data.

References

Brys, C., & Martínez, D. L. L. R. (2022). . Revista de Investigación en Tecnologías de la Información, 10(22), 1-14. Web.

1 hour!
The minimum time our certified writers need to deliver a 100% original paper

Gyongyosi, L., & Imre, S. (2019). . Computer Science Review, 31, 51-71. Web.

Saha, B. (2018). . International Journal of Computer Sciences and Engineering, 6(3), 467-469. Web.

Schartz, S. M. (2021). Information systems: No boundaries! A concise approach to understanding information systems for all disciplines. Open Educational Resources. Web.

Srivastava, P., & Khan, R. (2018). A review paper on cloud computing. International Journal of Advanced Research in Computer Science and Software Engineering, 8(6), 17-20. Web.

Print
Need an custom research paper on Enhancing Data Security on Corporate Servers written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2023, December 2). Enhancing Data Security on Corporate Servers. https://ivypanda.com/essays/enhancing-data-security-on-corporate-servers/

Work Cited

"Enhancing Data Security on Corporate Servers." IvyPanda, 2 Dec. 2023, ivypanda.com/essays/enhancing-data-security-on-corporate-servers/.

References

IvyPanda. (2023) 'Enhancing Data Security on Corporate Servers'. 2 December.

References

IvyPanda. 2023. "Enhancing Data Security on Corporate Servers." December 2, 2023. https://ivypanda.com/essays/enhancing-data-security-on-corporate-servers/.

1. IvyPanda. "Enhancing Data Security on Corporate Servers." December 2, 2023. https://ivypanda.com/essays/enhancing-data-security-on-corporate-servers/.


Bibliography


IvyPanda. "Enhancing Data Security on Corporate Servers." December 2, 2023. https://ivypanda.com/essays/enhancing-data-security-on-corporate-servers/.

Powered by CiteTotal, best bibliography tool
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Cite
Print
1 / 1