What Organizations Should Be Aware Of Regarding Cloud Technology Essay

PAGES
3
WORDS
1089
Cite

Cloud Computing Security Security flaws and risks in cloud computing are numerous. Current security issues range from data breaches to broken authentication, hacked interfaces, advanced persistent threats (APTs), permanent data loss, malicious insiders, DOS attacks, and cloud service abuses (Prashanth, Rao, 2015; Khan et al., 2016). This paper will discuss the current security issues, what organizations look for when implementing cloud systems, and whether security is the main factor for an organization when implementing cloud systems or whether there are other factors involved in the decision.

As Singh and Malhotra (2015) show, organizations are not just primarily interested in cloud computing because of security issues -- in fact, the main reasons they are interested in cloud computing are that the cloud system can help them to "expand their infrastructure at cheaper rates" and grow their organizational framework (p. 41). In other words, cloud computing allows firms to expand to new heights and store data in a manner that facilitates easier business interactions. However, there are several attendant risks associated with cloud computing, as has already stated.

One of the main current security issues associated with cloud computing is the fact that the cloud is like "a box" where everything is put inside, in one location, making it an easy target for hackers and intruders...

...

32). The vulnerabilities of the cloud system, moreover, are numerous and may be defined as any "loop holes in the security architecture of the cloud, which can be exploited by malicious users to gain access to the cloud network and the resource infrastructure" (Kashyap, Sharma, 2015, p. 33). Control of encryption keys, legal issues pertaining to international law and non-adherence across borders (the cloud is not confined to a single nation or region and thus the issue of risk related to law is evident), transferring and storing data, the kinds of data to be stored (is it lawful to store data that is considered illegal in some countries but not in others?), the violation of privacy rights, and payment security -- all of these are current concerns that relate to the security features of cloud computing and that can be accessed or hacked via loop holes in the security infrastructure (Chou, 2015).
There are also security issues related to the usage of the cloud's "hardware, virtualization, network, data and service providers" (Kazim, Zhu, 2015, p. 109). In fact securing data in the cloud is a major issue that few organizations are aware of, as their primary focus is on the ease with which they can operate their organization by utilizing the cloud and not the primary security issues associated with cloud computing (Singh, Malhotra, 2015). The data security issues that…

Sources Used in Documents:

References

Amit, K., Lizmary, C. (2015). Cloud computing: vulnerabilities, privacy and legislation. IITM Journal of Management and IT, 6(1): 152-156.

Callender, C. (2015). Obstacles to the adoption of cloud computing: best practices in technology and communication. Issues in Information Systems, 16(2): 133-139.

Chou, D. (2015). Cloud computing risk and audit issues. Computer Standards & Interfaces, 42: 137-142.

Haimes, Y. et al. (2015). Assessing systemic risk to cloud computing technology as complex interconnected systems of systems. Systems Engineering, 18(3): 284-299.


Cite this Document:

"What Organizations Should Be Aware Of Regarding Cloud Technology" (2016, May 31) Retrieved April 19, 2024, from
https://www.paperdue.com/essay/what-organizations-should-be-aware-of-regarding-2160495

"What Organizations Should Be Aware Of Regarding Cloud Technology" 31 May 2016. Web.19 April. 2024. <
https://www.paperdue.com/essay/what-organizations-should-be-aware-of-regarding-2160495>

"What Organizations Should Be Aware Of Regarding Cloud Technology", 31 May 2016, Accessed.19 April. 2024,
https://www.paperdue.com/essay/what-organizations-should-be-aware-of-regarding-2160495

Related Documents

Cloud Computer and Insider Threats Cloud computing is widely regarded as the wave of the future. "Cloud computing is all the rage. It's become the phrase du jour" (Knorr & Gruen 2011). However, many people throw the phrase around without truly understanding what it really is. "Cloud computing comes into focus only when you think about what IT always needs: a way to increase capacity or add capabilities on the fly

cloud computing will be discussed to show that the good outweighs the bad. Furthermore, it will be further discussed that the government is looking into using cloud computing because it will cut IT cost down and increase capabilities despite the fact people are concerned with security issues that this may bring to the public. In completing a dissertation, it is very hard to go through the challenges that it requires.

Cloud Computing Security Pros & Cons Over the last ten years, cloud computing has rapidly grown and it is expected to grow even further as more businesses move online. When cloud computing was first conceived, many skeptics dismissed it as being just another tech fad that will quickly disappear. However, over the last three years cloud computing has truly changed the way we think about IT nowadays. The Cloud has significantly

This means that no deeper view into the system and its underlying infrastructure is provided to the customer." The constant flow of information makes compiling a forensics report on any given item very difficult. Legal issues may also hamper digital forensics in dealing with cloud issues. Cloud computing raises some unique law enforcement concerns regarding the location of potential digital evidence and its subsequent forensic analysis. When a savvy and

Cloud Computing Changes Systems Analysis and Design Instiution/University affiliation Both information systems and information technology infrastructure have been incorporated into business procedures for at least two decades. In the initial development of information technology, organizations which greatly invested in information technology infrastructure achieved strong growth in market shares and returns. Given that IT is now the core of businesses, nearly all organizations own their own IT infrastructures to manage their daily

CIO in Effective Information Technology Strategic Planning through Corporate Governance Corporate Governance Corporate governance can be defined as the governing structure which allows a board of directors to ensure transparency, quality, accountability and fairness within a firm and in their relationships with their stakeholders (Monks & Minow, 2011). The corporate governance structure constitutes of: Direct and indirect engagements between a firm and its various stakeholders. Measures for integrating the often incompatible interests of stakeholders. Measures taken