Cloud Computing And Insider Threats Introduction

¶ … adopting the use of cloud-based technologies in the last five years. This trend has caused a significant shift in the way that many organizations interact with information both internally and externally. Yet there are also many risk factors inherent in these technologies, some of which are the result of insider conspiracy (Brender & Markov, 2013). Cloud computing offers many advantages over traditional IT infrastructure which make it an attractive option, however it also exposing organizations to new forms of security issues (Brender & Markov, 2013).

There are many security measures that are needed to mitigate potential security risks associated with cloud computing such as data theft, fines, and privacy

. Many of the most technologically advanced companies, such as IBM, Amazon, and Google, faced many challenges when implementing cloud-based platforms. Furthermore, despite rapid development in cloud technologies in recent years, there are many different cloud computing definitions that are being used (Du & Cong, 2010).

Definitions differ on the basis of many different factors including their applications and their abilities, costs, the requirement for cloud computing, security, goals for adoption, growth trends, and security threats. Despite the loose definition that has emerged, cloud computing is considered by many businesses to be powerful, efficient and highly cost effective. It is predicted that cloud computing will become an ubiquitous component of the business model for all medium and large enterprises within the next decade (Subashini & Kavitha, 2011).

Jansen (2011) articulated that this growth will make the insider security threat even more salient in the technologies future implementation.

Statement of the Problem

There are several risks are associated with cloud computing and some do not yet have an industry-wide solution

. The emerging body of literature has identified that the future risks will exceed the risks that are currently validated. The internal risks associated with cloud technologies are seen as potential threats that may devastate an entire organization; for this reason, it is important to have protections against insider's attacks as well as recovery plans for damage inflicted by cloud computing.

According to the 2011 CyberSecurity Watch Survey result, 43% of respondents indicated that the threats are more caused by insider's attack than the outsiders...

...

Enterprise-wide risk assessment helps to prevent an organization from easily overlooking the fact that trusted business partners and other such contractors still have access to the enterprise's information and networks. While these partners are trusted, the business absolutely should not overlook the fact that these partners have the ability to attack and thus, might attack at some point in the future (Cappelli et al., 2013).
A new study conducted by the Computer Emergency Response Team (CERT) Insider Threat Center found that nearly 93% of fraud occurrences were carried out away from technical control. For this purpose, an effective way to prevent and detect insider crimes is to make an initiative that could master behavior aspects beside the technical controls that are recommended (Lynch, 2012).

This study will focus on behavioral factors that have the potential to mitigate internal risks that are presented with the implementation of cloud based infrastructures. The identification of behavioral factors could facilitate spotting the insider threat before it manifests and mitigating it through disciplinary intervention in the organization. The Situational Leadership Model integrated with Thomas Gordon's problem ownership approach (figure 1) is an instrument that could be adapted to provide an adequate framework for investigating organizational commitments (Hersey, Blanchard, & Johnson, 2013). This study will analyze the possibility off identifying insider threats by using identified performance readiness of involved people to deliver more security in cloud computing.

Purpose of the Study

The purpose of this study is to develop quantitative research methods to measure the readiness of the managers and staff assigned to accomplish security tasks associated with cloud computing. The Center for the leadership studies developed two performances readiness scale instruments, the manager readiness scale and staff rating scale as it is shown in Appen

dix B. Both instruments measure the job performance readiness and psychological readiness (Hersey, Blanchard, & Johnson, 2008). Those instruments will be adapted for this study with permission from the Center for the leadership studies.

This study will incorporate the Situational Leadership Model in integration with Gordon's problem ownership approach…

Sources Used in Documents:

reference list in every writing submission, even if you are only sending the intro/problem/purpose

This citation appears to be a book.

All citations in the CP must be from primary, peer-reviewed sources, with a few exceptions related to theoretical resources, and foundational methodological resources.

This is not a primary peer-reviewed sources that would serve to support the strength of your problem statement.

Please review the template for required elements in the problem statement.


Cite this Document:

"Cloud Computing And Insider Threats" (2015, February 26) Retrieved April 26, 2024, from
https://www.paperdue.com/essay/cloud-computing-and-insider-threats-2148562

"Cloud Computing And Insider Threats" 26 February 2015. Web.26 April. 2024. <
https://www.paperdue.com/essay/cloud-computing-and-insider-threats-2148562>

"Cloud Computing And Insider Threats", 26 February 2015, Accessed.26 April. 2024,
https://www.paperdue.com/essay/cloud-computing-and-insider-threats-2148562

Related Documents

Without the ability to test the cloud computing insider threat risk assessment framework through the development of best practice recommendations for controlling these risks, this framework would be all but useless, and thus the concrete and practical nature of the second research purpose is important internally to the research as well as to the real-world business and technology communities. Research that is immediately and practically useful tends to find

Cloud Computer and Insider Threats Cloud computing is widely regarded as the wave of the future. "Cloud computing is all the rage. It's become the phrase du jour" (Knorr & Gruen 2011). However, many people throw the phrase around without truly understanding what it really is. "Cloud computing comes into focus only when you think about what IT always needs: a way to increase capacity or add capabilities on the fly

There is a difference in the approach to this challenge considering the two platforms, and the fact that they may be based on different configurations. Therefore, it is essential that proper techniques are instituted counter this. Evidently, insider threats are a menace in the cloud computing environment, just as is the case in a normal organizational set up. Most of the threats posed by such individuals are detrimental to the

By implementing some fairly basic security protocols and trusting cloud computing service providers to utilize available resources to ensure proper encryption and access control on their end, companies can greatly minimize their exposure to insider risks (Durkee, 2010). This trust is in and of itself a risk, however, and the lack of direct control presents an unavoidable risk in cloud computing. A recent case that is both highly unique and

It's a tidal wave that's going to engulf us all within the next five years. Cloud services will be a $160 billion industry by the end of 2011" (Ginovsky 2011, 21). Although the decision to transition from a traditional approach to cloud computing will depend on each organization's unique circumstances, a number of general benefits have been cited for those companies that have made the partial or complete transition to

This approach to defining a performance-based taxonomy will also allow for a more effective comparison within industries as well. All of these factors taken together will provide enterprise computing buyers with more effective foundations of arguing for more thorough measures of application performance. The net result will be much greater visibility into how cloud computing is actually changing the global economics of the enterprise computing industry. III. Final Report: Introduction The foundational