By implementing some fairly basic security protocols and trusting cloud computing service providers to utilize available resources to ensure proper encryption and access control on their end, companies can greatly minimize their exposure to insider risks (Durkee, 2010). This trust is in and of itself a risk, however, and the lack of direct control presents an unavoidable risk in cloud computing.
A recent case that is both highly unique and highly extreme in many of its details highlights many of the specific problems that are encountered with cloud computing networks and their inherent dependence on off-site and external systems, equipment, and personnel. Last year's flooding in Thailand forced many companies to move to cloud computing options for their data storage and communication needs as well as for many ongoing operations, as on-site data centers and other hardware become inoperable due to rising water levels and power interruptions/other infrastructure problems (Sambandaraska, 2012). The immediacy and the totality of the switch that became necessary for these Thai companies, migrating their networking dependencies from in-house traditional systems to cloud systems provided by off-shore companies, not to mention the forced nature of this transition as cloud computing presented the only option to these companies other than shutting down and potentially losing all of their data, brought several key problems quite quickly and pressingly to light (Sambandaraska, 2012). Controlling the amount of data flowing through the network is necessary to eliminate or at least limit accidental data loss, service interruption, and other technical problems that constitute insider threats; ensuring that proper understanding and adherence to protocol is utilized within the business organization by both management and personnel when such changes are made; and a host of other issues are still being confronted by these businesses (Sambandaraska, 2012). Ongoing attention to Thailand could prove very fruitful in understanding and addressing similar problems elsewhere.
Aside from the directly technical aspects of network security control, the ethical, legal, and financial aspects of implementing security measures are a highly important though...
Cloud Computing Benefits As cloud-computing starts to take hold, a number of significant advantages have turned out to be evident. The first one of these, and perhaps the most important, is the costs. The cloud claims to decrease the price of obtaining, providing, and sustaining computing power, a gain of specific significance during times of financial hardship. By allowing agencies to buy just the computing solutions required, rather than purchasing complicated and
Cloud and all of its benefits have begun taking hold in today's society. This trend of outsourcing important computer operations has been met with some resistance. The purpose of this essay is to explore the risks involved with cloud computing. This essay will argue that there are four main risks that potential cloud users must be aware of before fully adopting it: security, compliance, data loss, outages. Security The largest and most
Cloud computing is defined by Cearly and Phifer in their case study titled "Case Studies in Cloud Computing" as "a style of computing in which scalable and elastic it-related capabilities are provided ' as a service' to customers using Internet technologies." Cloud computing services had been provided by major vendors such as Google, Amazon, Microsoft, IBM, Hewlett-Packard, and others for business computing until recently when Apple Corporation announced iCloud for
Cloud Computing Explain why cloud computing differs from other traditional forms of providing IT support. This answer should include the characteristics of cloud computing. There are many different definitions that can be used to describe cloud computing. However, the importance of how the technology is transforming business models greatly exceeds any specific definition. There are three different forms of the cloud that are cited in any definition of cloud computing (Gabrielsson, Hubertsson,
Cloud Computing as an Enterprise Application Service Reordering the economics of software, cloud computing is alleviating many of the capital expenses (CAPEX), inflexibility of previous-generation software platforms, and inability of on-premise applications to be customized on an ongoing basis to evolving customer needs. These are the three top factors of many that are driving the adoption of cloud computing technologies in enterprises today. Implicit in the entire series of critical success
Cloud Computing Assessing the Risks of Cloud Computing Despite the many economic advantages of cloud computing, there are just as many risks, both at the information technologies (IT) and strategic level for any enterprise looking to integrate them into their operations. The intent of this analysis is to evaluate three of the top risks of cloud computing and provide prescriptive analysis and insight into how best to manage each. Despite widespread skepticism
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now