Preview

Secure Cloud

Better Essays
Open Document
Open Document
1589 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Secure Cloud
Case Study: How Secure is the Cloud?
CSQ1: Although cloud computing have the potential to deliver powerful benefits, they pose new challenges to system security and reliability. Cloud computing is indeed cloudy, and due to lack of transparency it creates so many problems. One of the major security issue is cloud computing is highly distributed. Cloud applications and application mash-ups reside in virtual libraries in large remote data centers and server mainly supplies business services and data management for multiple corporate and organizations clients. To save money and keep costs low, cloud computing providers often distribute work to data centers around the globe where work can be accomplished most efficiently. When we are using the cloud, we don’t know where our data is hosted and might not even know the country where they are being stored. The dispersed nature of cloud computing makes it difficult to track unauthorized activity. Virtually all cloud providers use encryption, such as Secure Sockets Layer, to secure the data they handle while the data are being transmitted. But if the data are stored on devices that also store other companies’ data, it’s important to ensure these stored data are encrypted as well. It is essential to understand if and how data can move in and out of the cloud. Having a high-level understanding of the security risks involved also enables businesses to understand which security and risk controls are appropriate to be executed, and to act proactively. CSQ2: The factors that contribute to these problems are as follows:
One way to deal with this is to use a cloud vendor that is a public company, which is managed by law to keep a eye on it how it manages information. Another way is to use a cloud provider that give subscribers the option to choose where their cloud computing work takes place.
Even if your data are



References: * Management and Information Systems-Managing the Digital Firm-12th edition. * http://cloudcomputingtopics.com/2010/09/understand-the-security-risks-in-cloud-computing/. * http://www.xerox.com/downloads/usa/en/gdo/whitepapers/GDO_whitepaper_cloud_computing_120611_HR.pdf. * http://blog.microstrategy.com/2012/07/how-secure-is-cloud-computing-part-4/. * http://www.infosecisland.com/blogview/17690-Is-Cloud-Computing-Secure.html. * http://www.sans.org/reading_room/analysts_program/McAfee_Data_Protection_Cl_Jul09.pdf. CASE STUDY

You May Also Find These Documents Helpful

  • Better Essays

    Cloud computing is a fast growing information technology trend that many companies including Google, Microsoft, and IBM are currently looking to get a stake in as demand for the service grows. Cloud computing is the concept of allowing both individuals and businesses to store data and applications on remote servers (owned and operated by a third party company), rather than on their own hard drives and data centers. The service boasts the ability to securely access data and applications from just about any device with an internet connection, allowing for such services as streaming music from a personal collection from multiple devices, and even to business development and storage of applications on remote servers. For the past few years, cloud computing has quickly grown in popularity, and as such, has come with its own set of risks and security concerns. As use of this service grows by both consumers and businesses, it will no doubt continue to attract the attention of hackers and cyber criminals, as it offers a central repository of data that can contain everything from financial statements, to company intellectual property. On 7/11/2011, eweek.com posted an article called “Cloud Computing Security: 10 Ways to Enforce It”, which attempts to give several suggestions on the best way to ensure that cloud computing is as safe as it is convenient.…

    • 1626 Words
    • 7 Pages
    Better Essays
  • Better Essays

    Trust is not easily defined, but most people agree that when it comes to cloud computing, transparency is essential to creating trust. Businesses must be able to see cloud service providers are complying with agreed data security standards and practices. These must include controls around who has access to data, staff security vetting practices, and the technologies and processes to segregate, backup and delete data. Suppliers of cloud technologies and services are quick to claim that cloud computing is well equipped to provide the necessary controls. Virtualization, they argue, underlies cloud computing, and therein lies the potential to achieve hitherto impossible levels of security. While virtualization is viewed with suspicion and fear by many IT directors, suppliers like RSA, IBM and other say that the technology enables organizations to build security into the infrastructure and automate security processes, to surpass traditional data protection…

    • 1351 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Large enterprises have been reluctant to move certain files or apps to the cloud network. The market size for cloud is far behind what it was expected to be, and for good reason. Consumers have concerns with cloud computing security, especially when it involves data security and confidentiality issues. This article shows the legitimacy of concerns people are have when dealing with…

    • 2396 Words
    • 10 Pages
    Good Essays
  • Best Essays

    With the unprecedented growth and spread of information, there is no wonder why large Information Technology companies have been investing in the “cloud”. To expand, when referring to Cloud Computing, this means to access and store information not stored with in your computer whether it be public, private, or hybrid cloud computing. In technological terms, the server you are accessing is somewhere else and therefore, the information and tools you are using are “up in the clouds” but more so stored in another server space. However, whether you are paying for services through software, total usage, or free usage (hence the types of cloud services) Cloud Computing seems to be everywhere. Yet, it is important to recognize what is to gain by using cloud computing from big businesses to individual users and what are some risky moves when utilizing cloud storage over the Internet. Hence, the content of this paper will discuss the pros and cons of cloud computing and where cloud computing is headed in todays online society.…

    • 1307 Words
    • 6 Pages
    Best Essays
  • Better Essays

    Cis 500- Cloud Computing

    • 1078 Words
    • 5 Pages

    Technology has taken great leaps of advancement. Some of the new technology that companies and consumers are taking advantage of to store and process data is cloud computing. Cloud computing was derived from virtualization. Virtualization allows companies to separate business applications from hardware. Doing this gives the company the capability of assigning applications as needed. The option to manage applications is a great benefit to companies. Resulting from the virtualization error, cloud computing has emerged to provide flexible IT infrastructures. This has not only enhanced the options companies now have, but it is also proven to be more cost efficient. This has increasingly become a preferred method of companies and consumers alike. (Turban, & Volonino, 2011, p.47)…

    • 1078 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    In this article, Patrick Thibodeau comments on Federal CIO Vivek Kundra’s claim that cloud computing concerns are exaggerated. Thibodeau explains clearly the claims made by Kundra about the overall security with cloud computing. Thibodeau blames the scare of cloud computing to IT developers belief of a status quo. Thibodeau concludes the article with a few success stories of basic cloud computing services working in the U.S. Government.…

    • 659 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Cloud Security Report

    • 9993 Words
    • 40 Pages

    Cloud Computing is the result of a rapid evolution of computing technologies and a response to the new world business requirements. The adoption of the technology is widely accepted and its future is promising. However the cloud computing phenomena does not come without a risk. There are many issues of concerns that might slow the adoption of the cloud computing; most notably are the security concerns which come as a result of the complexity of cloud technologies and the wide parties involved with them. Issues such as cloud computing compliance and governance, cloud computing deployment and architectural models, virtualization, cloud computing applications, cloud operations, standards, guidelines, frameworks and contracting for cloud service provisioning are all necessary for any business to understand before adopting the technology. This report will explain the top security risks of using cloud service providers for essential business applications and how they can be identified using the cloud risk assessment process. It will also explore various topics related to cloud computing, including concepts and terminologies of cloud security, risk assessment, frameworks and standards. It will conclude with a scenario of a case study to explain the process of analyzing a cloud service provider services security; and to show some of the most common cloud computing risks that exist in the world.…

    • 9993 Words
    • 40 Pages
    Powerful Essays
  • Powerful Essays

    Cloud computing is a new name for an old concept: the delivery of computing services from a remote location, analogous to the way electricity, water, and other utilities are provided to most customers. Cloud computing services are delivered through a network, usually the Internet. Some cloud services are adaptations of familiar applications, such as e-mail and word processing. Others are new applications that never existed as a local application, such as online maps and social networks. Since 2009, the federal government has been shifting its data storage needs to cloud-based services and away from agency-owned data centers. This shift is intended to reduce the total investment by the federal government in information technology (IT) (data centers), as well as realize other stated advantages of cloud adoption: efficiency, accessibility, collaboration, rapidity of innovation, reliability, and security. In December 2010, the U.S. Chief Information Officer (CIO) released “A 25-Point Implementation Plan to Reform Federal IT Management” as part of a comprehensive effort to increase the operational efficiency of federal technology assets. One element of the 25-Point Plan is for agencies to shift to a “Cloud First” policy, which is being implemented through the Federal Cloud Computing Strategy. The Cloud First policy means that federal agencies must (1) implement cloud-based solutions whenever a secure, reliable, and cost-effective cloud option…

    • 13907 Words
    • 56 Pages
    Powerful Essays
  • Powerful Essays

    Business Trend Memo

    • 1299 Words
    • 6 Pages

    Nowadays, all types of organizations are trending toward cloud computing. It reflects the ability of having access to information, software, and computing resource infrastructure without necessarily having to own them. By deploying cloud computing, it will allow students to personalize their environments in which they learn, help cut down our expense on IT management cost, and provide greater flexibility in maintaining security, reliability and compliance. Overall, the cloud computing can be a strong tool in enhancing our teaching and learning.…

    • 1299 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Cloud Computing: Fact vs Fog

    • 9067 Words
    • 37 Pages

    News of Cloud is everywhere, and its predominance in IT is a foregone conclusion. In fact, the push to adopt Cloud has been so strong that risks inherent in this model have largely been ignored The recent economic turmoil and the promise of Cloud leading a renaissance of the tech sector are shaping the perspective and appetite for Cloud rather than the readiness of the technology itself. Cloud is a powerful tool for mobilizing data; however, there are no regulations, standards, or assurances of data protection from a technical perspective Major breaches at Google, Salesforce.com, and Amazon, have exposed the fragility of the Cloud delivery model, and the fundamental issues of data security, privacy, and standards that have yet to be addressed. Though price points gained in Cloud can be significant, businesses should weigh advantages against the hidden costs of compromised data Analyst sentiment seems to be the sole voice of reason. Principal analysts from Forrester, Gartner, and Yankee cite major security concerns with Cloud. Hackers have also highlighted the vulnerabilities of Cloud and issued a manifesto of mayhem against it (Black Hat 2009 – Clobbering the Cloud by SensePost) Assessing your organization’s readiness for Cloud should include the evaluation of hybrid models, hybrid architectures, integration constraints, and innovative data protection…

    • 9067 Words
    • 37 Pages
    Good Essays
  • Good Essays

    assignment IST309

    • 1030 Words
    • 3 Pages

    The purpose of this paper is to talk about how security concerns of cloud computing matter to business as well as to other organizations and looking for the solution of the problems. Public cloud computing provides immense convenience but at the same time consists of huge privacy and security risks. The paper will discuss this problem from survey done by other researchers and the realistic problems cause by leakage of cloud data.…

    • 1030 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Cloud Computing Security Threats and Responses Farzad Sabahi Faculty of Computer Engineering Azad University Iran fsabahi@ieee.org Abstract-Cloud Hybrid clouds. A public cloud is standard model which providers make several resources, such as applications and storage, available to the public.…

    • 3527 Words
    • 15 Pages
    Best Essays
  • Good Essays

    Itm 501 Cloud Computing

    • 717 Words
    • 3 Pages

    Cloud computing has moved from being just a business feature to also servicing the needs of individuals. Apple, Samsung, Google, Century Link Prism and many other customer based businesses have identified that individuals need the cloud service to manage their everyday needs. Pictures, contacts, music, account information and various other data are synced in the cloud and is able to be retrieved on any of the individuals’ devices.…

    • 717 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Security Principles

    • 682 Words
    • 3 Pages

    The management issue has concurred with technological innovations that enable information to be used and stored more effectively than previously. Management needs to understand the issues impacting information systems to be effective meet the company goals. A cloud is a powerful arrangement of cloud computing, networking, storage, management solutions, and business applications that facilitate a new generation of IT and consumer services. These services are available on demand and are delivered economically without compromising security or functionality. Solving today 's biggest business and technology challenges requires an approach that fully integrates the three pillars of cloud computing: applications and services, data centers, and networks (Cloud Computing, 2012). There is an issue that should be very important to all of us regarding the internet. Security problems happen on a consistent when we are using our computer to do business online. When we are doing our banking or setting up…

    • 682 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Cloud computing is an incredible resource that allows a user to store data over a network. This network is usually accessed over the internet and stored on a server. The cloud creates one location for all the users’ information to be stored and easily accessed. Storing data over the internet on a server brings up a huge security risk to all users. Since it is on a server connected to the internet it is susceptible to internet hackers and foreign countries. Using the cloud presents a major security risk to companies or individual users. Since it is easy for them to access their data from one central location it also lets the hackers do that same thing. The cloud creates a single point of failure if it gets hacked by an individual or another country. A single point of failure is one of the worst security measures to be used. A good security system has multiple different layers incorporated into it so it becomes more difficult to break into. Leaving all information on one central location gives the hacker an easy target with only one account to hack to gain information on multiple different data files and user accounts. Another problem with the cloud technology is that the server the data is stored on could be located in a different country. This causes a major security risk for the companies and individual user’s since different countries have different laws dealing with…

    • 5810 Words
    • 24 Pages
    Powerful Essays

Related Topics