Cloud Computing And Security Web Content

PAGES
2
WORDS
729
Cite
Related Topics:

Department of Defense (Dod) And Cloud Computing Through cloud computing services and technology, the Dod is able to set up an enterprise cloud that is in line with department-wide federal-level IT efficiency programs and plans. Cloud computing facilitates consolidation of infrastructure, leveraging of commodity information technology services, and elimination of operational redundancies, whilst simultaneously boosting operational continuity. These programs' success, on the whole, is reliant on well-implemented security requirements that are delineated and comprehended by Dod Components as well as industry. Consistent application and functioning of the abovementioned requirements guarantees mission execution, offers protection to sensitive information, enhances success of the mission, and eventually leads to the operational efficiencies and results sought by the Dod (DISA, 2016 ).

A memo by the defense department's Chief Information Officer, dated December 15, 2014, with regard to up-to-date guidance in the area of acquiring and using commercial services in cloud computing defines the responsibilities of the Dod Component when availing themselves of enterprise cloud services. This memo enables responsible minimal acquisition of cloud services by components, according to security requirements delineated in the Fedramp (Federal Risk and Authorization Management Program) and the CC SRG (Cloud...

...

Earlier, the DISA (Defense Information Systems Agency) presented concepts to operate in the business cloud in its Cloud Security Model (CSM), whose first version described the general framework and offered early guidance on the area of public data. A subsequent version (v. 2.1) also incorporated the subject of Controlled Unclassified Information. CC SRG covers cloud security conditions in a similar format to the remaining DISA-issued SRGs. This particular SRG covers, displaces, and repeals the CSM that was issued earlier (DISA, 2016 ).
Based on using the NIST definitions, is it a private, public, hybrid cloud?

DoD's cloud is private, with services offered for the department exclusively. It supports a number of department- sponsored or department tenants within a single cloud. The Dod has the final authority over cloud service usage, and all non-Dod service utilization has to be Dod -sanctioned and -sponsored. Resources that offer cloud services have to be reserved for the department's use. They should be physically separated from those that are not reserved for the Dod. The defense department's business service programs that are classified as Saas cloud services (e.g., DCO (Defense Connect Online), DEE (Defense Enterprise Email), DEPS (Dod Enterprise Portal Service)), have to comply with Dodi 8510.01 prerequisites as well. These programs do…

Sources Used in Documents:

Bibliography

DISA. (2016 ). Department of Defense Cloud Computing Security Requirements Guide. Defense Information Systems Agency.

Mell, P., & Grance, T. (2011). The NIST Definition of Cloud Computing. Gaithersburg: NIST Special Publication 800-145.


Cite this Document:

"Cloud Computing And Security" (2016, August 22) Retrieved April 26, 2024, from
https://www.paperdue.com/essay/cloud-computing-and-security-2161761

"Cloud Computing And Security" 22 August 2016. Web.26 April. 2024. <
https://www.paperdue.com/essay/cloud-computing-and-security-2161761>

"Cloud Computing And Security", 22 August 2016, Accessed.26 April. 2024,
https://www.paperdue.com/essay/cloud-computing-and-security-2161761

Related Documents
Security in Cloud Computing
PAGES 10 WORDS 3274

Security in Cloud Computing Security issues associated with the cloud Cloud Security Controls Deterrent Controls Preventative Controls Corrective Controls Detective Controls Dimensions of cloud security Security and privacy Compliance Business continuity and data recovery Logs and audit trails Legal and contractual issues Public records The identified shortcomings in the cloud computing services and established opportunities for growth regarding security aspects are discussed in the current research. The security of services is regarded as the first obstacle. The opportunity for growth is provided as combination

Cloud Computing Is a Term
PAGES 11 WORDS 2980

The user, of course, sees a virtual service (appearing like the data is stored in certain icon), the actual storage could be anywhere, and could vary from day-to-day. This is an advantage to the overall efficiency of the system because storage resources can then be allocated rather than static (Smith, Computing Beyond the Firewall, 2010). Cloud services are any web-based application -- from calendars and contact applications to word processing,

Cloud Computing Research Question and Experimental Design Develop a research question that addresses one of the unknowns you identified in Part I of the literature review and sketch a quantitative or qualitative study that can answer the question about what is unknown and contribute to theory. Draw on the additional resources for this course for guidance in understanding the concepts (e.g., internal validity, threats to validity, and operationalization) needed to address

Cloud Computing Security Pros & Cons Over the last ten years, cloud computing has rapidly grown and it is expected to grow even further as more businesses move online. When cloud computing was first conceived, many skeptics dismissed it as being just another tech fad that will quickly disappear. However, over the last three years cloud computing has truly changed the way we think about IT nowadays. The Cloud has significantly

Cloud Computing
PAGES 10 WORDS 3424

Brodkin, J. (2008). Gartner: Seven cloud-Computing security risks. Infoworld, pp. 1 -- 3. Carlin, S. & Curran, K. (2011). Cloud computing security. International Journal Of Ambient Computing And Intelligence (IJACI), 3 (1), pp. 14 -- 19. Cloud Computing Benefits, risks and recommendations for information security. (2009). [e-book] Available through: ENISA https://resilience.enisa.europa.eu/cloud-security-and-resilience/publications/cloud-computing-benefits-risks-and-recommendations-for-information-security [Accessed: 24 Mar 2014]. Cloudsecurityalliance.org. (2011). Top threats to cloud computing: cloud security alliance. [online] Retrieved from: https://cloudsecurityalliance.org/research/top-threats [Accessed: 24 Mar 2014]. Feng,

cloud computing will be discussed to show that the good outweighs the bad. Furthermore, it will be further discussed that the government is looking into using cloud computing because it will cut IT cost down and increase capabilities despite the fact people are concerned with security issues that this may bring to the public. In completing a dissertation, it is very hard to go through the challenges that it requires.