Verified Document

Survey For Cloud Computing And Insider Threats Essay

¶ … Cloud Computing and Insider Threats) A survey will be conducted of 40 businesses that have successfully dealt with insider threats. These 40 businesses will be compared with another online survey that arbitrarily and randomly samples other businesses.

My objectives will be to assess how 40 large companies successfully deal with insider threats and how these practices contrast with practices from other companies.

My methodology will be the following: I will randomly select 40 companies from the top Fortune 500 companies and, approaching their manager, will ask the manager whether I can conduct a survey on computer security on their company and whether I can distribute this survey to officials form their IT division. The survey will have certain key items, some of which will be graded on a Likert scale from 0 to 5. One of the questions may, for instance, be "How secure do you think your company's computer is from the following:

the spread of computer viruses infiltration and theft of data from external hackers engineered network overloads triggered by malicious mass e-mailing electronic surveillance of corporate computer data by outside parties damage from malfunction, fire, or natural disasters (Computer Security)

The questions will be a combination of short, quantitative questions (yes or no, rate this from 1 to 5, etc.) as well as qualitative questions...

I will have a group of assistants who will review the questions beforehand to ensure that questions are open-ended and not directive and that they preclude bias and are sensitive. This will prevent response bias. In order to deter fatigue and improve clarity, I will also place easier questions first, avoid words that provoke bias or emotional responses, use a logical order and place similar questions together (The Community Tool Box). I will use the questions produced by Power (1999) in his survey as my base modifying them to suit my particular population.
The survey will be accompanied by a SAE and recipients will be asked to complete and mail the survey within the month. Researcher and/or assistants will contact a tardy recipient to query reason for lateness.

The survey results of these 40 companies will then be analyzed to see whether they possess any common themes. The respondents too will be consulted if the researcher has any difficulty in understanding (or may possibly misinterpret) one of the responses.

As comparison to these 40 companies, an alternate survey will be held online of arbitrary companies who choose to enter. The questions will be the same as those drafted…

Sources used in this document:
How Online Surveys Work

http://money.howstuffworks.com/business-communications/how-online-surveys-work8.htm

Power, Richard. (1999) CSI/FBI Computer Crime and Security Survey." Computer Security Issues & Trends..20
Cite this Document:
Copy Bibliography Citation

Related Documents

Prep: The Insider Threat in
Words: 1097 Length: 4 Document Type: Multiple Chapters

Without the ability to test the cloud computing insider threat risk assessment framework through the development of best practice recommendations for controlling these risks, this framework would be all but useless, and thus the concrete and practical nature of the second research purpose is important internally to the research as well as to the real-world business and technology communities. Research that is immediately and practically useful tends to find

Cloud Computing and Insider Threats
Words: 1411 Length: 5 Document Type: Introduction

adopting the use of cloud-based technologies in the last five years. This trend has caused a significant shift in the way that many organizations interact with information both internally and externally. Yet there are also many risk factors inherent in these technologies, some of which are the result of insider conspiracy (Brender & Markov, 2013). Cloud computing offers many advantages over traditional IT infrastructure which make it an attractive option,

Justifying Research Methods and Design Insider Threats
Words: 2243 Length: 7 Document Type: Research Paper

Justifying Research Methods and Design Insider threats are one of the primary sources of risk to an enterprise network and to intellectual property. For decades, the internet security realm has been rather narrowly focused on pre-empting insider threats by mean of sophisticated architecture and conventional login identification barriers. More recently, internet communications and technology (ICT) experts have taken an active position by using technological capacity to identify risk patterns, and

Cloud Computing
Words: 3424 Length: 10 Document Type: Essay

Brodkin, J. (2008). Gartner: Seven cloud-Computing security risks. Infoworld, pp. 1 -- 3. Carlin, S. & Curran, K. (2011). Cloud computing security. International Journal Of Ambient Computing And Intelligence (IJACI), 3 (1), pp. 14 -- 19. Cloud Computing Benefits, risks and recommendations for information security. (2009). [e-book] Available through: ENISA https://resilience.enisa.europa.eu/cloud-security-and-resilience/publications/cloud-computing-benefits-risks-and-recommendations-for-information-security [Accessed: 24 Mar 2014]. Cloudsecurityalliance.org. (2011). Top threats to cloud computing: cloud security alliance. [online] Retrieved from: https://cloudsecurityalliance.org/research/top-threats [Accessed: 24 Mar 2014]. Feng,

Cloud Computing Will Be Discussed to Show
Words: 9986 Length: 26 Document Type: Research Proposal

cloud computing will be discussed to show that the good outweighs the bad. Furthermore, it will be further discussed that the government is looking into using cloud computing because it will cut IT cost down and increase capabilities despite the fact people are concerned with security issues that this may bring to the public. In completing a dissertation, it is very hard to go through the challenges that it requires.

Cloud Computing and Computing
Words: 7745 Length: 25 Document Type: Thesis

Risk, Risk Management Strategies, and Benefits in Cloud Computing SITUATIONAL ANALYSIS PREMISE STATEMENT KEY DEFINITIONS SERVICE AND DEPLOYMENT MODELS BENEFITS OF CLOUD COMPUTING SECURITY ASPECTS Storage Reliability Virtualization Trust Physical Security Legal Compliance CLOUD COMPUTING RISKS RISK Management STRATEGIES Vendor Evaluation Centralized Information Governance Other Organization-Level Measures Individual-Level Security Measures Cloud computing model Cloud computing service and deployment models ISO/IEC broad categories The emergence of cloud computing has tremendously transformed the world of computing. Today, individuals, organizations, and government agencies can access computing resources provided by a vendor on an on-demand basis.

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now