Verified Document

Cloud Computing Assessing The Risks Of Cloud Essay

Cloud Computing Assessing the Risks of Cloud Computing

Despite the many economic advantages of cloud computing, there are just as many risks, both at the information technologies (IT) and strategic level for any enterprise looking to integrate them into their operations. The intent of this analysis is to evaluate three of the top risks of cloud computing and provide prescriptive analysis and insight into how best to manage each. Despite widespread skepticism of cloud computing with many Chief Information Officers (CIOs) and senior executives, its value continues to re-define the enterprise software industry with projections of between 17% to 22% growth through 2015, becoming a $15B segment of the software industry (Blumenthal, 2011). The three top risks of cloud computing include data security and access, data segregation, and regulatory auditing and compliance (Blumenthal, 2011). As many cloud computing platforms are on open source-based operating systems including Linux, security is exacerbated by the reliance on low-cost, often highly egalitarian-designed platforms (Aslam, Ullah, Ansari, 2010).

Analysis of Cloud Computing Risks

The three top risks of data security and access, data segregation and regulatory auditing and compliance of a cloud computing partner taken together form the majority of risks enterprises face when moving to a cloud computing platform. Data security and access refers to the entire spectrum of security, from the physical access to the servers, stability from harm or destruction as a result of environmental factors including earthquakes and severe weather, and the physical security of the server room sand locations. Even more important is the software-based security that must begin at the infrastructure layer of cloud computing platforms, often called the Platform-as-a-Service (PaaS) functions of the overall cloud computing model (Vaquero, Rodero-merino, Moran, 2011). The PaaS component of...

This type of security can be achieved by a very thorough analysis of inbound and outbound ports of servers, the definition of authentication keys and pervasive use of firewalls and other deterrents to unauthorized access (Rodero-Merino, Vaquero, Caron, Muresan, Desprez, 2012). Data security and access must also be managed to the role level of any organization to be effective (Walters, 2010). This translates into the need for managing each and every account that has access to the cloud-based systems and resources on a role-based profile that delineates which items they have access to or not (Walters, 2010). Data security and access strategies must be also enterprise-wide, ensuring systems integrated to the cloud architecture are also protected from a systems- and role-based access to ensure the highest level of security possible. All of these considerations are often defined in an enterprise security management plan or strategy (Walters, 2010).
The second significant risk is data segregation, or the lack of data orthogonality in the inherent structure of cloud computing platforms. Many CIOs and senior management teams are very concerned about this risk, given the early failures of the Amazon Web Services (AWS) architecture to support true multitenancy and lock down specific memory and disk locations to protect one accounts' data from another (Rodero-Merino, Vaquero, Caron, Muresan, Desprez, 2012). Amazon Web Services customers at one point were able to see each others' data, even though they were assured their individual accounts had multitenancy included. Amazon promptly redesigned their entire Web Services architecture to make sure that level of security error would never happen again (Newcombe, 2009). Just the exposure of other account data across the Amazon Web Services complex however made many CIOs and senior…

Sources used in this document:
References

Aslam, U., Ullah, I., & Ansari, S. (2010). Open source private cloud computing. Interdisciplinary Journal of Contemporary Research in Business, 2(7), 399-407.

Blumenthal, M.S. (2011). Is security lost in the clouds? (*). Communications & Strategies, (81), 69-86.

Newcombe, L. (2009). Enabling confidence in the cloud. Computer Weekly, (00104787), 10-10.

Nicolaou, C.A., Nicolaou, A.I., & Nicolaou, G.D. (2012). Auditing in the cloud:
Cite this Document:
Copy Bibliography Citation

Related Documents

Cloud Computing Emerging Trends for
Words: 2873 Length: 7 Document Type: Thesis

In addition to the stability, scalability and extensibility of its architecture, cloud platform have made it possible for workflows across government to become more pervasive and secure as a result [4]. The TCO of a given cloud platform or series of applications therefore has continued to become reduced by the experience effect (comparable to economies of scale yet only applied to data aggregated and knowledge creation) across government [6]. This

Cloud Computing Research Question and Experimental Design
Words: 1907 Length: 7 Document Type: Term Paper

Cloud Computing Research Question and Experimental Design Develop a research question that addresses one of the unknowns you identified in Part I of the literature review and sketch a quantitative or qualitative study that can answer the question about what is unknown and contribute to theory. Draw on the additional resources for this course for guidance in understanding the concepts (e.g., internal validity, threats to validity, and operationalization) needed to address

Cloud Service and Prescription
Words: 2493 Length: 6 Document Type: Essay

.....prescription process can incur high costs in the healthcare industry due to poor risk management. Lack of continued assessment, technological upgrades, and information sessions can lead to an increased rate of data entry errors. Data entry errors may result in patient deaths, and lawsuits that lessen the financial success of any hospital/clinic. However, there is opportunity to reduce data entry errors in order to minimize negative outcomes related to prescription

Cloud Computing and Insider Threats
Words: 1411 Length: 5 Document Type: Introduction

adopting the use of cloud-based technologies in the last five years. This trend has caused a significant shift in the way that many organizations interact with information both internally and externally. Yet there are also many risk factors inherent in these technologies, some of which are the result of insider conspiracy (Brender & Markov, 2013). Cloud computing offers many advantages over traditional IT infrastructure which make it an attractive option,

What Organizations Should Be Aware of Regarding Cloud Technology
Words: 1089 Length: 3 Document Type: Essay

Cloud Computing Security Security flaws and risks in cloud computing are numerous. Current security issues range from data breaches to broken authentication, hacked interfaces, advanced persistent threats (APTs), permanent data loss, malicious insiders, DOS attacks, and cloud service abuses (Prashanth, Rao, 2015; Khan et al., 2016). This paper will discuss the current security issues, what organizations look for when implementing cloud systems, and whether security is the main factor for an

Benefits Values Cloud Computing Business Enterprises." You
Words: 5385 Length: 19 Document Type: Essay

Benefits Values Cloud Computing Business Enterprises." You reputable research papers, articles journals alongside ACM Communications Journal Professor Dr. Rajkumar Buyya's articles, research papers journal materials found (Prof Buyya) -line home page "www. The benefits and values of cloud computing to business enterprises Introduction to the literature review section The scope of the current chapter is that of assessing the values and benefits of cloud computing to enterprises. The literature review section is

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now