Verified Document

Security Information Security Is A Primary Concern Essay

Security Information security is a primary concern for consumers and businesses. In "IT security fails to keep pace with the rise of cloud computing," the author claims that in spite of the advancements in cloud technology, information security has not kept pace. This assessment is rooted firmly in fact and best practices in the information security industry. Although their analysis is thorough, the authors would do well to point out the potential legal problems that arise due to the situation of poor security measures. As the Bureau of Consumer Protection points out, "Having a sound security plan in place to collect only what you need, keep it safe, and dispose of it securely can help you meet your legal obligations to protect that sensitive data." Companies and individuals who take advantage of cloud computing need to be aware of how the data being stored are also being protected against loss, manipulation, or theft. As many as "one in five global organisations cited hybrid cloud (public and private) in current use," ("IT security fails to keep pace with the rise of cloud computing,"). Therefore, the need for improved security in the cloud is becoming pressing.

The authors assert that organizations are starting to budget more for information security, though. This is consistent with recent data from the United States Department...

The author of "IT security fails to keep pace with the rise of cloud computing," (2012) also mentions two of the most important methods of safeguarding information: "stronger oversight on the contract management process for cloud providers or the use of encryption techniques." These two methods are substantiated by recent IEEE forum proceedings. In addition to encryption and managerial oversight, access control policies, firewall improvement, better methods of detecting intrusions, and better tools for system evaluation are also integral to information security upgrades ("Why information security is hard - an economic perspective," 2001). The same report points out some of the limitations and burdens that can constrain the implementation of effective information security within cloud computing. The following microeconomic issues have been identified: "network externalities, asymmetric information, moral hazard, adverse selection, liability dumping and the tragedy of the commons," ("Why information security is hard - an economic perspective," 2001). Unfortunately, many organizations are failing to fathom the need for information security management. "Many organisations lack…

Sources used in this document:
References

Bureau of Consumer Protection. Retrieved online: http://business.ftc.gov/privacy-and-security/data-security

Denning, D. (2000). Information warfare and security. EDPACS 27(9).

Dhillon, G. & Backhouse, J. (2000). Technical opinion: information system security management in the new millennium. Communications of the ACM 43(7).

Gordon, L.A. & Loeb, M.O. (2002). The economics of information security. Transactions on Information and System Security 5(4).
"Information Security." Retrieved online: http://www.scmagazine.com/information-security/topic/7178/
Information Security Forum. Retrieved online: https://www.securityforum.org/
"IT security fails to keep pace with the rise of cloud computing," (2012). Silicon Republic. Retrieved online: http://www.siliconrepublic.com/cloud/item/30042-it-security-fails-to-keep/
Kissell, R., Stine, K., Scholl, M., Rossman, H., Fahlsing, J. & Gulick, J. (2008). Security considerations in the system development life cycle. National Institute of Standards and Technology. Retrieved online: http://csrc.nist.gov/publications/nistpubs/800-64-Rev2/SP800-64-Revision2.pdf
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now