Verified Document

What Organizations Should Be Aware Of Regarding Cloud Technology Essay

Cloud Computing Security Security flaws and risks in cloud computing are numerous. Current security issues range from data breaches to broken authentication, hacked interfaces, advanced persistent threats (APTs), permanent data loss, malicious insiders, DOS attacks, and cloud service abuses (Prashanth, Rao, 2015; Khan et al., 2016). This paper will discuss the current security issues, what organizations look for when implementing cloud systems, and whether security is the main factor for an organization when implementing cloud systems or whether there are other factors involved in the decision.

As Singh and Malhotra (2015) show, organizations are not just primarily interested in cloud computing because of security issues -- in fact, the main reasons they are interested in cloud computing are that the cloud system can help them to "expand their infrastructure at cheaper rates" and grow their organizational framework (p. 41). In other words, cloud computing allows firms to expand to new heights and store data in a manner that facilitates easier business interactions. However, there are several attendant risks associated with cloud computing, as has already stated.

One of the main current security issues associated with cloud computing is the fact that the cloud is like "a box" where everything is put inside, in one location, making it an easy target for hackers and intruders...

32). The vulnerabilities of the cloud system, moreover, are numerous and may be defined as any "loop holes in the security architecture of the cloud, which can be exploited by malicious users to gain access to the cloud network and the resource infrastructure" (Kashyap, Sharma, 2015, p. 33). Control of encryption keys, legal issues pertaining to international law and non-adherence across borders (the cloud is not confined to a single nation or region and thus the issue of risk related to law is evident), transferring and storing data, the kinds of data to be stored (is it lawful to store data that is considered illegal in some countries but not in others?), the violation of privacy rights, and payment security -- all of these are current concerns that relate to the security features of cloud computing and that can be accessed or hacked via loop holes in the security infrastructure (Chou, 2015).
There are also security issues related to the usage of the cloud's "hardware, virtualization, network, data and service providers" (Kazim, Zhu, 2015, p. 109). In fact securing data in the cloud is a major issue that few organizations are aware of, as their primary focus is on the ease with which they can operate their organization by utilizing the cloud and not the primary security issues associated with cloud computing (Singh, Malhotra, 2015). The data security issues that…

Sources used in this document:
References

Amit, K., Lizmary, C. (2015). Cloud computing: vulnerabilities, privacy and legislation. IITM Journal of Management and IT, 6(1): 152-156.

Callender, C. (2015). Obstacles to the adoption of cloud computing: best practices in technology and communication. Issues in Information Systems, 16(2): 133-139.

Chou, D. (2015). Cloud computing risk and audit issues. Computer Standards & Interfaces, 42: 137-142.

Haimes, Y. et al. (2015). Assessing systemic risk to cloud computing technology as complex interconnected systems of systems. Systems Engineering, 18(3): 284-299.
Cite this Document:
Copy Bibliography Citation

Related Documents

Cloud Computer and Insider Threats Cloud Computing
Words: 1924 Length: 6 Document Type: Term Paper

Cloud Computer and Insider Threats Cloud computing is widely regarded as the wave of the future. "Cloud computing is all the rage. It's become the phrase du jour" (Knorr & Gruen 2011). However, many people throw the phrase around without truly understanding what it really is. "Cloud computing comes into focus only when you think about what IT always needs: a way to increase capacity or add capabilities on the fly

Cloud Computing Will Be Discussed to Show
Words: 9986 Length: 26 Document Type: Research Proposal

cloud computing will be discussed to show that the good outweighs the bad. Furthermore, it will be further discussed that the government is looking into using cloud computing because it will cut IT cost down and increase capabilities despite the fact people are concerned with security issues that this may bring to the public. In completing a dissertation, it is very hard to go through the challenges that it requires.

Technology Strategic Planning Through Corporate Governance
Words: 3239 Length: 10 Document Type: Term Paper

CIO in Effective Information Technology Strategic Planning through Corporate Governance Corporate Governance Corporate governance can be defined as the governing structure which allows a board of directors to ensure transparency, quality, accountability and fairness within a firm and in their relationships with their stakeholders (Monks & Minow, 2011). The corporate governance structure constitutes of: Direct and indirect engagements between a firm and its various stakeholders. Measures for integrating the often incompatible interests of stakeholders. Measures taken

IT Professionals and a Survey of Respondents
Words: 5682 Length: 11 Document Type: Essay

total of 60 surveys were sent to IT professionals, with 22 respondents returning questionnaires. The questions contained in the survey were qualitative in nature. The responses varied substantially, which is not surprising given that some of the questions were open-ended in nature. Overall, the questionnaire was a mixture of open-ended and closed questions, which provided basic data on the respondents and their practices, combined with more detailed information that

Security and Cloud Computing
Words: 2417 Length: 8 Document Type: Research Paper

Cloud Computing: Security Threats & Countermeasures, Auditing and Strategies Regarding the Cloud Abstract The cloud is the latest development in the world of the Information Age. It provides a way for data to be stored, shared, managed, and protected in an efficient and effective manner. This paper looks at some of the security threats and countermeasures that can be conducted to help make the cloud safer. It examines why auditing is essential

Security for Networks With Internet Access
Words: 4420 Length: 12 Document Type: Term Paper

Security for Networks With Internet Access The continual process of enterprise risk management (ERM) has become an integral component of successful organizational assessment, because the process of accurately identifying various risk factors, and interpreting their potential advantages and disadvantages, ensures that a business remains capable of anticipating and addressing internal and external contingencies. The following ERM implementation plan for the security of internet-accessible networks is intended to provide a navigable framework

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now