Cloud computing

Posted by Winnie Melda on January 23rd, 2019

Introduction

            Cloud computing technology is among the most growing and successful technologies on the dependency on the full implementation of security measures. The cloud computing defines the technology whereby the many organizations, firms, companies, individuals get to receive some services from a third party who is the cloud service provider at a relative cost without the owning of the service providing equipment. The technology gets to have the customers who are the end users of the technology to rent the servers and the software from the cloud service provider. The technology works with the provision of the following services. The Infrastructure as a service (IaaS) that defines the usage and access of the computing devices and resources. The Platform as a service (PaaS) that gets to explain the access and use of the basic operating system from a shared point. The software as a service (SaaS) that defines the integrated access to cloud computing provider of software applications.

Risks of Implementing the Cloud Computing Technology

            During the implementation of the cloud computing technology, there are risks that the cloud computing technology provider should get to address some of the risks that the technology gets to subject the provider. The end user should include the environmental security, data privacy and security, data availability and business continuity, the record retention requirements and the disaster recovery. The mentioned above defines the summary of the risk content behind the implementation of the cloud computing technology within organizations at the current world generation of innovations and inventions.

The environmental security gets to define the threats and the vulnerabilities behind the cloud computing technology. The environment gets to include the computing resources and the users of the resources that get to result to the security threats. The environmental security captures the targets of the virtual machines by the intruders. Subsequently, the security concerns include the brute force attacks on the technology as well as the malware activities and other information technology related attacks (Pfleeger, C. P., & Pfleeger, S. L., 2003).

            The storage as a service gets to provide the servers that hold the large sets of data from the different organizations. The data stored on the cloud servers require the privacy and the overall data security. It gets to have the organizations sharing the storage facility meaning the servers gets accessed at a random time and will automatically require the protection against the malicious activities of the illegitimate end users (Backes, Ning, & European Symposium on Research Computer Security, ESORICS., 2009). At the same time, the data stored is sensitive to the organizations and firms and should be kept private to the respective personnel.

            The technology since works o the basis of the provision of service to groups of clients the data stored on the cloud servers should be kept available to the end users with the retention of the data confidentiality and the integrity. The availability of the data will get through the retention of the business operations continuity.

            In the case of the disaster happening how would the data within the cloud server recover? It is the question that gets most of the clients to the question of the computing service providers in the making sure that information gets recovered at an easy.

Strategies to Manage the Risks

            Most of the cloud computing service providers has had the development of some strategies to get the risks pointing to the technology prevented from the execution and have them at the tip of implementing the technology for the good of the client. The service providers have had the implementation of the security architecture controls that gets to control the accessibility of the information and service within the technology. The technology relies on the network and the internet hence the network security in the case should get improved as a mechanism to start getting the appropriate way of protecting the technology. The accessibility at the current gets the application of the multi- factor authentication that detects and blocks the illegitimate users of the application (Vacca, 2009). The providers have had the adoption of better data and general governance of the technology with the set of responsive policies and the implementation of the risk assessment and management activities.

            The implementation of the awareness of the security matters to end users is another mechanism that gets the end user to operate vigilantly for the correct and responsive operations. The implementation of resiliency gets to boosts the security factors over the cloud computing technology. Furthermore, the data related security mitigation such as the encryptions and physical protection of the resources such as the servers through the application and implementation of the physical computing security has been a boost as a risk curbing strategy (Salomon, 2003).

Conclusion

            Cloud computing technology is modern technology that gets to pose the highest level of benefits to the end users at the appreciation of the mode of providing and delivering the service. The technology gets the organizations to work under reduced information technology costs as the management of the organization assets gets done by the third party without the owning of the servers and the software. The technology further gets to prove that it is scalable to the organization as the growth is allowable since the requirements are readily available. However, the implementation and use of the cloud computing technology get to subject the organization to some risks that the service provider should get to address to have the full deployment of the technology for the benefit of the given organization. The mitigation measures to the risks should get deployed at the all level of the service provider and the end user for the fastening of the protection mechanisms. It takes to have the best to the organization on the provision further researched measures and mechanisms.

References

Backes, M., Ning, P., & European Symposium on Research Computer Security, ESORICS. (2009). Computer security - ESORICS 2009: 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009 : proceedings. Berlin [etc.: SpringerLink [host.

Chao, L. (2012). Cloud computing for teaching and learning: Strategies for design and implementation. Hershey, PA: Information Science Reference.

Pfleeger, C. P., & Pfleeger, S. L. (2003). Security in computing. Upper Saddle River, NJ: Prentice Hall PTR.

Prakash, S. (2011). Risk Management in Cloud Computing. 

Reynolds, G. W., & Stair, R. M. (2013). Fundamentals of information systems. Mason, Ohio: South-Western.

Romes, R. (2013). The Benefits and Risks of Cloud Computing. 

Salomon, D. (2003). Data privacy and security. New York: Springer.

Vacca, J. R. (2009). Computer and information security handbook. Amsterdam: Elsevier.

 

Sherry Roberts is the author of this paper. A senior editor at MeldaResearch.Com in Online Writing Services if you need a similar paper you can place your order from free essay writing services.

Like it? Share it!


Winnie Melda

About the Author

Winnie Melda
Joined: December 7th, 2017
Articles Posted: 364

More by this author