¶ … adopting the use of cloud-based technologies in the last five years. This trend has caused a significant shift in the way that many organizations interact with information both internally and externally. Yet there are also many risk factors inherent in these technologies, some of which are the result of insider conspiracy (Brender & Markov, 2013).
Cloud computing offers many advantages over traditional IT infrastructure which make it an attractive option, however it also exposing organizations to new forms of security issues (Brender & Markov, 2013).
There are many security measures that are needed to mitigate potential security risks associated with cloud computing such as data theft, fines, and privacy
. Many of the most technologically advanced companies, such as IBM, Amazon, and Google, faced many challenges when implementing cloud-based platforms. Furthermore, despite rapid development in cloud technologies in recent years, there are many different cloud computing definitions that are being used (Du & Cong, 2010).
Definitions differ on the basis of many different factors including their applications and their abilities, costs, the requirement for cloud computing, security, goals for adoption, growth trends, and security threats. Despite the loose definition that has emerged, cloud computing is considered by many businesses to be powerful, efficient and highly cost effective. It is predicted that cloud computing will become an ubiquitous component of the business model for all medium and large enterprises within the next decade (Subashini & Kavitha, 2011).
Jansen (2011) articulated that this growth will make the insider security threat even more salient in the technologies future implementation.
Statement of the Problem
There are several risks are associated with cloud computing and some do not yet have an industry-wide solution
. The emerging body of literature has identified that the future risks will exceed the risks that are currently validated. The internal risks associated with cloud technologies are seen as potential threats that may devastate an entire organization; for this reason, it is important to have protections against insider's attacks as well as recovery plans for damage inflicted by cloud computing.
According to the 2011 CyberSecurity Watch Survey result, 43% of respondents indicated that the threats are more caused by insider's attack than the outsiders...
Cloud Computer and Insider Threats Cloud computing is widely regarded as the wave of the future. "Cloud computing is all the rage. It's become the phrase du jour" (Knorr & Gruen 2011). However, many people throw the phrase around without truly understanding what it really is. "Cloud computing comes into focus only when you think about what IT always needs: a way to increase capacity or add capabilities on the fly
By implementing some fairly basic security protocols and trusting cloud computing service providers to utilize available resources to ensure proper encryption and access control on their end, companies can greatly minimize their exposure to insider risks (Durkee, 2010). This trust is in and of itself a risk, however, and the lack of direct control presents an unavoidable risk in cloud computing. A recent case that is both highly unique and
There is a difference in the approach to this challenge considering the two platforms, and the fact that they may be based on different configurations. Therefore, it is essential that proper techniques are instituted counter this. Evidently, insider threats are a menace in the cloud computing environment, just as is the case in a normal organizational set up. Most of the threats posed by such individuals are detrimental to the
Justifying Research Methods and Design Insider threats are one of the primary sources of risk to an enterprise network and to intellectual property. For decades, the internet security realm has been rather narrowly focused on pre-empting insider threats by mean of sophisticated architecture and conventional login identification barriers. More recently, internet communications and technology (ICT) experts have taken an active position by using technological capacity to identify risk patterns, and
Brodkin, J. (2008). Gartner: Seven cloud-Computing security risks. Infoworld, pp. 1 -- 3. Carlin, S. & Curran, K. (2011). Cloud computing security. International Journal Of Ambient Computing And Intelligence (IJACI), 3 (1), pp. 14 -- 19. Cloud Computing Benefits, risks and recommendations for information security. (2009). [e-book] Available through: ENISA https://resilience.enisa.europa.eu/cloud-security-and-resilience/publications/cloud-computing-benefits-risks-and-recommendations-for-information-security [Accessed: 24 Mar 2014]. Cloudsecurityalliance.org. (2011). Top threats to cloud computing: cloud security alliance. [online] Retrieved from: https://cloudsecurityalliance.org/research/top-threats [Accessed: 24 Mar 2014]. Feng,
Many people know that they are not educated enough in the complicated technologies that are seen in cloud computing and insider threats. As such, it is often a general consensus of the people to not trust such technologies they cannot clearly define. Using a systems-oriented approach will allow the current research to dive into these opinions and help uncover what societal structures are leading to this general sense of
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now