Cloud Computing: Information Security, BCP, Resource Management, SLA Management

   

Added on  2023-06-11

20 Pages4947 Words200 Views
Running head: CLOUD COMPUTING
Cloud Computing
Name of the Student
Name of the University
Author’s Note:
Cloud Computing: Information Security, BCP, Resource Management, SLA Management_1
1
CLOUD COMPUTING
Table of Contents
Question 3................................................................................................................................ 2
Question 4................................................................................................................................ 6
Question 5................................................................................................................................ 9
Question 6.............................................................................................................................. 12
References..............................................................................................................................16
Cloud Computing: Information Security, BCP, Resource Management, SLA Management_2
2
CLOUD COMPUTING
Question 3
Information Security Steps and Controls for Securing Hybrid Cloud
Information security or simply InfoSec is the perfect practice for the prevention of
the unauthorized access, disclosure, recording, inspection, utilization, modification,
destruction and disruption of data or information. This information security could be
eventually utilized for the data form they are undertaking (Carlin & Curran, 2013). The main
focus of the information security is the significant balanced protection about the CIA or
confidentiality, integrity and availability of information and data. An efficient policy
implementation is easily done with the information security by not hampering the
productivity of the organization. This type of achievement is obtained from the multi step
risk management procedure, which eventually recognizes various assets, sources of threats,
potential impacts as well as vulnerabilities that are well followed by the proper assessment
of an effective plan of risk management (Hashem et al., 2016). For the proper
standardization of this particular discipline, all the users seek or collaborate in setting the
guidance, policies or industry standards over the passwords. Moreover, the antivirus,
firewalls, legal liabilities, encryption software and many more are the best information
securities in this process.
With the increment of laws and regulations that would be affecting the proper data
accessing, processing, storing and transferring, the entire phenomenon of information
security would be increasing the overall security of various organizational systems and
assets (Li et al., 2013). For the purpose of reducing the complexities of data loss and data
prevention, information security measures or controls should be implemented and
incorporated within the organization of Regional Gardens Ltd. Since, the organization of
Cloud Computing: Information Security, BCP, Resource Management, SLA Management_3
3
CLOUD COMPUTING
Regional Gardens Ltd. has decided to shift their business to cloud and Micro services
strategy and thus information security is the mandatory step in their business. This would
help them in enhancing their business to a greater level. The various information security
steps as well as controls, which would be securing the Hybrid cloud, are given below:
i) Security from the Advanced Threats: The most important and significant security
step or control for the security of hybrid cloud in the Regional Gardens Ltd is the proper and
perfect security from various and several advanced threats. Each and every storage,
network and the every computing environment are eventually secured and protected from
the several advanced threats (Krishna, 2013). These advanced threats are nothing but the
several kinds of dangerous and hazardous attacks, which are faced by the entire
technological and cyber world. All of these advanced attacks have become the core and
significant issues or problems for the company that are facing with them within their various
information systems or adapted hybrid cloud. This type of security is the very first step for
securing the hybrid cloud in Regional Gardens Ltd.
ii) Scaling of the Security: The next significant and vital step for information security
within the company of Regional Gardens Ltd is scaling of the security. This is majorly done to
change as well as amend to the new providers of cloud. The overall scaling of security is very
much vital for the specific organizational hybrid cloud, since this would be incrementing the
proper security. It must be perfectly done in the company.
iii) To Keep Low Operational Costs: The next significant and important step for
information security within the company of Regional Gardens Ltd is keeping the operational
costs much lower than others. All of these operational costs and expenses must be checked
as well as kept lower to provide organizational competitive benefits to the company. All of
Cloud Computing: Information Security, BCP, Resource Management, SLA Management_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cloud Computing - Assignment PDF
|11
|2222
|133

Cloud Computing: Selection of Cloud Architectures for a Hybrid Cloud and Risks Associated with Hybrid Cloud and Microservices Strategy
|21
|5740
|256

Cloud Computing: Selection of Cloud Architectures for a Hybrid Cloud
|26
|7544
|430

Cloud Computing for Regional Gardens: Benefits, Risks and Mitigation Strategies
|20
|4796
|398

Cloud Computing
|26
|7299
|249

Hybrid Cloud Strategy Assignment
|14
|3015
|73