Verified Document

Security Information Security Is A Primary Concern Essay

Security Information security is a primary concern for consumers and businesses. In "IT security fails to keep pace with the rise of cloud computing," the author claims that in spite of the advancements in cloud technology, information security has not kept pace. This assessment is rooted firmly in fact and best practices in the information security industry. Although their analysis is thorough, the authors would do well to point out the potential legal problems that arise due to the situation of poor security measures. As the Bureau of Consumer Protection points out, "Having a sound security plan in place to collect only what you need, keep it safe, and dispose of it securely can help you meet your legal obligations to protect that sensitive data." Companies and individuals who take advantage of cloud computing need to be aware of how the data being stored are also being protected against loss, manipulation, or theft. As many as "one in five global organisations cited hybrid cloud (public and private) in current use," ("IT security fails to keep pace with the rise of cloud computing,"). Therefore, the need for improved security in the cloud is becoming pressing.

The authors assert that organizations are starting to budget more for information security, though. This is consistent with recent data from the United States Department...

The author of "IT security fails to keep pace with the rise of cloud computing," (2012) also mentions two of the most important methods of safeguarding information: "stronger oversight on the contract management process for cloud providers or the use of encryption techniques." These two methods are substantiated by recent IEEE forum proceedings. In addition to encryption and managerial oversight, access control policies, firewall improvement, better methods of detecting intrusions, and better tools for system evaluation are also integral to information security upgrades ("Why information security is hard - an economic perspective," 2001). The same report points out some of the limitations and burdens that can constrain the implementation of effective information security within cloud computing. The following microeconomic issues have been identified: "network externalities, asymmetric information, moral hazard, adverse selection, liability dumping and the tragedy of the commons," ("Why information security is hard - an economic perspective," 2001). Unfortunately, many organizations are failing to fathom the need for information security management. "Many organisations lack…

Sources used in this document:
References

Bureau of Consumer Protection. Retrieved online: http://business.ftc.gov/privacy-and-security/data-security

Denning, D. (2000). Information warfare and security. EDPACS 27(9).

Dhillon, G. & Backhouse, J. (2000). Technical opinion: information system security management in the new millennium. Communications of the ACM 43(7).

Gordon, L.A. & Loeb, M.O. (2002). The economics of information security. Transactions on Information and System Security 5(4).
"Information Security." Retrieved online: http://www.scmagazine.com/information-security/topic/7178/
Information Security Forum. Retrieved online: https://www.securityforum.org/
"IT security fails to keep pace with the rise of cloud computing," (2012). Silicon Republic. Retrieved online: http://www.siliconrepublic.com/cloud/item/30042-it-security-fails-to-keep/
Kissell, R., Stine, K., Scholl, M., Rossman, H., Fahlsing, J. & Gulick, J. (2008). Security considerations in the system development life cycle. National Institute of Standards and Technology. Retrieved online: http://csrc.nist.gov/publications/nistpubs/800-64-Rev2/SP800-64-Revision2.pdf
Cite this Document:
Copy Bibliography Citation

Related Documents

Security Risk Assessment the Steps
Words: 676 Length: 2 Document Type: Essay

The same does apply to security metrics such that these metrics establish the performance within the organization and the effectiveness of the organization's security. The purpose of Risk Analysis is to spot and find security risks in the current framework and to resolve the risk exposure identified by the risk analysis. The type of security risk assessment for an organization is a function of a number of available assessments. However,

Information Technology a Brief Critique of Database
Words: 676 Length: 2 Document Type: Essay

Information Technology A Brief Critique of Database Security Articles The focus of both papers to be critiqued is the definition, status, and significance of database security. As many corporations such as Amazon and Google move toward using cloud computing, there is greater concern for the security of information contained within databases. Long before cloud computing (long in technology terms), database security was a primary concern in information technology. The paper will offer

Information Technology Annotated Bibliography Annotated Bibliography...
Words: 883 Length: 2 Document Type: Annotated Bibliography

Information Technology Annotated Bibliography Annotated Bibliography Cloud Computing and Insider Threats Bhadauria, R., Chaki, R., Chaki, N., & Sanyal, S. (2011) A Survey on Security Issues in Cloud Computing. CoRR, abs/1109.5388, 1 -- 15. This article is very explanatory in nature. This article would serve best in the opening sections of a research paper, such as in the introduction or the historical review. This article has a formal and academic tone; the intention to

Security Risk Assessment of a Corporate Campus
Words: 533 Length: 2 Document Type: Essay

Vulnerabilities The client is a three-building corporate campus, with indications that each building is occupied and managed by different tenants. Multiple tenants and multiple structures multiplies security threats because of the varied points of entry and no centralized system of monitoring or patrolling the campus. Security infractions are made even more likely given the fact that the parking area is shared among all buildings, and the fifty visitor spaces are not

Information Technology in Peru
Words: 2566 Length: 8 Document Type: Term Paper

Information Technology in Peru The current environment in Peru is not conducive for huge IT investments The IT revolution has encouraged people to look for opportunities in different countries, particularly the third world countries which have been successful in providing the basic amenities at a cost lesser when compared to developed nations. This study is an effort to rank Peru as a possible IT destination for businesses that are planning to

Information System on Ethical and
Words: 6479 Length: 15 Document Type: Research Paper

They have a moral obligation to the South African people in this area for many reasons. First, they have an obligation to make certain that they can participate in the global economy to give their citizens the same chances for advancement as other nations. Secondly, they have a moral obligation to do everything possible to keep their citizens safe. When one discusses the topic of security in Information and Communication

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now