Cloud Security Planning Essay

2972 words - 12 pages

Cloud Security Planning
Cloud systems as new online storage and computing systems provide great potentials to all businesses and organizations of creating new approach of storage and computing; cloud system guarantee that all your files and valuable data can be accessed and recovered from anywhere in the world, providing a new meaning of technology. Unfortunately and as to what happen with all emerging technologies there are new threats, risks, breaches, and problems arise with such technologies. They are considered challenges that vary from configuration problems to security breaches to harmful attacks; which may cost the company large losses and in some time financial disasters. ...view middle of the document...

Second, discover the possible breaches and weakness within the system chosen services. It will also practice the possibility of filling any gaps in the system while not affecting other parts of the system. Third, what IT Managers should do to alleviate security vulnerabilities and reduce their impacts on the company; such as data encryption, secure the platform and infrastructure, and so on? Fourth, how to protect the data while it on the movement or processing, which suggest encryption as the best possible method. Of course it will come with an extra cost so we will need to know what should be or shouldn’t be encrypted. Fifth, create a trust foundation starting from the platform and extended it through trusted roots. Sixth extend the trust circle through the cloud systems. Finally, choosing the right service provider; which will involve a series of tests and measurements?
In conclusion, with everyone today is talking about cloud systems and with a lot of major companies considering cloud to be the next step for their databanks; great risks are rising as well. So, with the potential threats and the outcome penalties that may arise from them. Those companies should consider a cloud security plans to prevent such threats. In our case study we create an approach to achieve the desired security goals, plus other recommendations to make it cost effective as well.

The Cloud, What is it?
The cloud computing and cloud storage is the magic word in today’s information technology communities and networks. We hear and read about cloud almost everywhere. Businesses, organizations, firms, and even personal applications are relying on cloud systems to be the next move in their growth, and the chain continues to grow, with expectation of the number of users to be doubled by 2014.
So, what is the cloud, where is it, why it is so important, and what we can expect from it? Well the answer is quite simple; cloud system is the ability of storing and accessing information, applications, and resources that stored on super computers which in turn located on the internet instead of using your own computer to store and access the same data and applications. So, what is considered new technology it is not quite new, actually cloud concept goes back to the day of the internet and networking in the early of the 60s. So, in order for us to use Cloud Computing we will need to store our data, applications, or programs and access them over the internet, The big idea here that you will have the flexibility of accessing these data from anywhere in the world as long as you have a computer and an internet connection, of course along with your security login credentials. So, the other part of the question is why it is important and why should I care about it? The answer to this part is; as individual as we already mentioned you will be able to access your data remotely from anywhere not having to worry that you had forgotten your thumb drive or to print important documents...

Other Papers Like Cloud Security Planning

Securing Data and Infrastructure in a Cloud Computing Environment at Mobile Insurance Corporation

2584 words - 11 pages infrastructure. Business Problem(s) With Mobile One moving to the cloud, security issues play a big role in the livelihood of our organization and our customers. There are several security issues that the organization needs to be aware of so that they can protect themselves and the customers. Some of these threats are data breach, data loss, account or service traffic hijacking, denial of service, abuse of cloud services, insufficient due

Cloud Computing Essay

5607 words - 23 pages measures you need to take to meet security requirements. Banks that take advantage of cloud computing are better positioned to respond to economic uncertainties, interconnected global financial systems and demanding customers. They can use information to enhance customer segmentation techniques and to develop more focused services that are aligned with customer needs. Banks also can optimize their channel investments and differentiate themselves

Sr. Manager

4209 words - 17 pages , storage and facilities to server the needs of customers. Each year they plan to put spending control mechanisms to cut IT dollars but they haven’t been successful. The total IT budget overage for Amtrak was about of $40 million, end of this fiscal year. So Amtrak is looking at possible solutions that can reduce this overage with a proper planning and framework in place. Lockheed Martin recognized as a global aerospace, defense, security, and

Cloud Computing

4432 words - 18 pages design and manage. Challenges of cloud computing Security concerns Disaster recovery, private key management, and disclosure of controls activities are security concerns in the SaaS environment in the pay-on-demand infrastructure. Without proper planning and implementation, the costs of security safeguards can far outweigh the economic advantages of SaaS and cloud computing Disaster recovery Planning for a disaster recovery became a very

Cloud Computing

4889 words - 20 pages IaaS to have multi-tenancy. This means resources have to be shared. “The resources shared are not only the physical machines but also the network (conventional links and even the network interface on the machine)” (Vaquero et al, 2011). This is at the root of the security concerns surrounding cloud computing as system flaws mean that hackers gaining some control or influence, potentially accessing customer data. As well as, this there is s

Migrating Business to the Cloud

2421 words - 10 pages provision of cloud service environment which is essential. To achieve the objective, the cloud migration services must comply with the applicable business, technical, security, management, and administrative objectives. There is a need to align therefore the cloud migration services with the aims of an enterprise delivery model and support the ability to deliver future sustainable services to the clients. The project in progress is supposed to

Data Consolidation

857 words - 4 pages the world of computer-aided design. The cloud helps to lower the capital cost. They are charged based on the services used. The fees are based a scale. It can help to eliminate the cost of extra staff and the help desks. There should be some planning done before actually switching to cloud. The company should make should all the services it is looking for is being offered through cloud computing. Example: You try to use Yahoo in cloud and there

Outage and Downtime

1526 words - 7 pages Term Paper: Downtime and Outage Aliaksandr Piatrou Course SEC 6010: Planning for Information Security Instructor: Mr. Dwight Robinson December 10, 2015 Abstract An outage or downtime at the online reservation system Sabre caused difficulties for many airlines, hotels and other hospitality industries all around the world. It affects business credibility, causes loss in revenue and legal procedures. Because of the recent delays

Cloud Computing - 2743 words

2743 words - 11 pages vendors and are available for anyone’s use. Public clouds offer the ability to avoid large capital expenditures while reducing operating expenses associated with managing a large assortment of compute, storage, data center, and bandwidth resources.  There are a few drawbacks; security, performance tuning, audit compliance, service levels, and public cloud limits flexibility. Those who use private clouds wish to maintain control of their data

The Future of Corporate Performance Management

2198 words - 9 pages The Future of Corporate Performance Management Abstract Adaptive Planning is a Corporate Performance Management system that has foreseen the future of IT. They have adapted a full service CPM system which can accommodate customers from beginning to end. The “cloud” has become a vital asset to the selling point which will forever change IT as we know it. This new system has allowed companies to “Dramatically reduce budgeting and forecasting

Technical Paper

895 words - 4 pages region. d. Provide a copy of your working SQL code as part of the paper. 5. Research the Internet for database vendors that provide cloud computing services and complete the following: a. Estimate the types of costs involved or the pricing structure required when implementing a cloud-hosted solution for a database. b. Analyze security considerations and pricing of the different cloud implementation types. c. Rank the cloud services options of

Related Essays

Toulmin Model Essay

1782 words - 8 pages cloud is security. Data in the Cloud is more susceptible to privacy invasion because of increased access. This objection is not convincing, however, because with all things especially emerging technologies, careful assessment and planning has to be done before committing. Business Wire (2013) reports that security is still the top inhibitor, however it is declining year-over-year from 55% of 855 respondents in 2012 to only 46% in 2013. Gartner (2008

Cloud Computing Essay 1456 Words

1456 words - 6 pages CLOUD COMPUTING – An Overview Abstract Resource sharing in a pure plug and play model that dramatically simplifies infrastructure planning is the promise of „cloud computing‟. The two key advantages of this model are easeof-use and cost-effectiveness. Though there remain questions on aspects such as security and vendor lock-in, the benefits this model offers are many. This paper explores some of the basics of cloud computing with the aim of

Global Security Policy Week 5 Cmgt 400

969 words - 4 pages strategies as the global organization. Planning and understanding how the data is acquired, knowing what is the most sensitive data, who is responsible for securing the data, and creating and testing a disaster recovery plan can help business leadership understand the severity of cyber security. Cloud Computing According to Chris Ciborowski at Digital Guardian, “Understanding what "the cloud" is and how cloud computing should be utilized given unique

Cloud Computing Essay 3888 Words

3888 words - 16 pages . Literature Review 1.Identifying Cloud Computing Security Risks (February 2011) -Paul Wooley Tyco Electronics Abstract Cloud computing services including Infrastructure as a Service promise potential cost savings for businesses by offering remote, scalable computing resources. However attractive these services are, they pose significant security risks to customer applications and data beyond what is expected using traditional on-premises