Verified Document

Cloud Computing Risks And Security Essay

¶ … Security Flaws and Risks in Cloud Computing DEDICTATION

Significance of the Problem to Leadership

Primary research

Secondary research

Review of the Literature

Title searches, Articles, Research Documents, and Journals

History of Cloud Computing

Enhance cloud-computing security

Data is entrusted to a stranger

Inside attacks

Government & Marketing Intrusion

No standardization of safety

No customer service

Cyber attacks

Vodafone phishing scam

Eric Snowden NSA Breach

Salesforce.com phishing attack.

Target Breach

Contrasting Views: Safety of Cloud computing

Historical Summary of Cloud computing

Evolution of Cloud computing

Evolution of Cloud Computing as outsourcing agent

Current Security Tools in Cloud computing

Intrusion Detection Systems

Anti-virus/Anti Malware

Risk management in Cloud computing

Manage Inside Attacks: Ensure safe hiring practices

2.24 Make a proper contract with your cloud provider 64

2.25 Know the protocol for Data Loss and Recovery 65

2.26 Outsourcing: A Risk Management Strategy 65

2.27 Summary 66

3 Chapter 3: Methodology 68

3.1 Research Method and Design Appropriateness 69

3.2 Population 71

3.3 Sampling 72

3.4 Informed Consent 73

3.5 Confidentiality 74

3.6 Geographic Location 74

3.7 Data Collection 75

3.8 Instrumentation 79

3.9 Validity and Reliability 80

3.10 Data Analysis 81

3.11...

al (2011) defined that cloud computing is a large-scale computing paradigm that is moved by economies of scale. In this pool, there is abstracted, dynamically scalable, virtualized, storage and platforms delivered to external customers over the internet (Foster et. al, 2011). This known as cloud computing basically encompassed activities such as interpersonal computing and use of social network sites. Beginning from 2008, a variety of services came into being that enable computing resources to be accessed over the Internet. Nonetheless, cloud computing basically is concerned with data storage, accessing online software applications and processing power. In simpler terms, cloud computing is referred to a way on adding capabilities or increasing capacity without having to invest in more infrastructure, personnel or software (Popovic & Hocenski, 2010). In the old days, people used to save everything on the computer; either data was stored on the computer or on a personal storage device.
Cloud computing has enabled the coming generation to be exposed to internet based and distributed computing system. The cloud system is quite elastic and multi-tenant. This means that within the cloud computing system, more than one tenant can make use of a single service.…

Sources used in this document:
Chapter 1: Introduction

Foster et. al (2011) defined that cloud computing is a large-scale computing paradigm that is moved by economies of scale. In this pool, there is abstracted, dynamically scalable, virtualized, storage and platforms delivered to external customers over the internet (Foster et. al, 2011). This known as cloud computing basically encompassed activities such as interpersonal computing and use of social network sites. Beginning from 2008, a variety of services came into being that enable computing resources to be accessed over the Internet. Nonetheless, cloud computing basically is concerned with data storage, accessing online software applications and processing power. In simpler terms, cloud computing is referred to a way on adding capabilities or increasing capacity without having to invest in more infrastructure, personnel or software (Popovic & Hocenski, 2010). In the old days, people used to save everything on the computer; either data was stored on the computer or on a personal storage device.

Cloud computing has enabled the coming generation to be exposed to internet based and distributed computing system. The cloud system is quite elastic and multi-tenant. This means that within the cloud computing system, more than one tenant can make use of a single service. Elasticity means that resources can either be added or reduced from a service depending on the demand the service has (AlMorsy et.al, 2010) The end result is that the resource can be utilized in a much easier and cost effective way. The cloud model that was introduced has encouraged various different industries and academia to adopt this method of computing to host various applications. This model is preferred by various businesses because it allows for the business to make use of technology without putting in a lot of investment in infrastructure and other costs. A survey carried out by Gartner revealed that cloud computing has been increasing in profit and has been expanding ever since it was introduced (Gartner, 2011). In 2009, the cloud market
Cite this Document:
Copy Bibliography Citation

Related Documents

Cloud Computing Information Security in
Words: 6099 Length: 18 Document Type: Research Paper

This approach to defining a performance-based taxonomy will also allow for a more effective comparison within industries as well. All of these factors taken together will provide enterprise computing buyers with more effective foundations of arguing for more thorough measures of application performance. The net result will be much greater visibility into how cloud computing is actually changing the global economics of the enterprise computing industry. III. Final Report: Introduction The foundational

Private Cloud Computing Risk and Challenges Bahrain Government
Words: 1476 Length: 4 Document Type: Research Paper

Private -- Cloud Computing Risks and Challenges -- Bahrain Gov. Cloud Computing Experiences of Other Countries Focus on Japan Japan has in the past had the rather lousy record of being an unwilling (or late) adopted of non-Japanese technology. Indeed, as a matter of fact, most of the country's businesses were rather reluctant to embrace West-developed technological innovations including but not limited to Twitter and Facebook. It hence comes as a complete surprise

Cloud Computing and Security
Words: 729 Length: 2 Document Type: Web Content

Department of Defense (Dod) And Cloud Computing Through cloud computing services and technology, the Dod is able to set up an enterprise cloud that is in line with department-wide federal-level IT efficiency programs and plans. Cloud computing facilitates consolidation of infrastructure, leveraging of commodity information technology services, and elimination of operational redundancies, whilst simultaneously boosting operational continuity. These programs' success, on the whole, is reliant on well-implemented security requirements that are

Cloud Computing Assessing the Risks of Cloud
Words: 1163 Length: 4 Document Type: Essay

Cloud Computing Assessing the Risks of Cloud Computing Despite the many economic advantages of cloud computing, there are just as many risks, both at the information technologies (IT) and strategic level for any enterprise looking to integrate them into their operations. The intent of this analysis is to evaluate three of the top risks of cloud computing and provide prescriptive analysis and insight into how best to manage each. Despite widespread skepticism

Security in Cloud Computing
Words: 3274 Length: 10 Document Type: Research Paper

Security in Cloud Computing Security issues associated with the cloud Cloud Security Controls Deterrent Controls Preventative Controls Corrective Controls Detective Controls Dimensions of cloud security Security and privacy Compliance Business continuity and data recovery Logs and audit trails Legal and contractual issues Public records The identified shortcomings in the cloud computing services and established opportunities for growth regarding security aspects are discussed in the current research. The security of services is regarded as the first obstacle. The opportunity for growth is provided as combination

Cloud Computing
Words: 752 Length: 3 Document Type: Essay

Cloud and all of its benefits have begun taking hold in today's society. This trend of outsourcing important computer operations has been met with some resistance. The purpose of this essay is to explore the risks involved with cloud computing. This essay will argue that there are four main risks that potential cloud users must be aware of before fully adopting it: security, compliance, data loss, outages. Security The largest and most

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now