logo

Cloud Computing Risk Assessment

   

Added on  2023-04-21

16 Pages3217 Words457 Views
 | 
 | 
 | 
Running head: CLOUD COMPUTING RISK ASSESSMENT
CLOUD COMPUTING RISK ASSESSMENT
Name of the Student
Name of the University
Author note
Cloud Computing Risk Assessment_1

2
CLOUD COMPUTING RISK ASSESSMENT
Table of Contents
PART 1................................................................................................................................4
PART 2..............................................................................................................................10
Reference...........................................................................................................................15
Cloud Computing Risk Assessment_2

3
CLOUD COMPUTING RISK ASSESSMENT
Executive Summary
This report mainly focuses on discussing the security that must be implemented in the cloud
computing system. This report will discuss about the issues that are present in the usage of the
cloud computing system. This report will provide a risk analysis and risk management guidelines
that must be used in order to proclaim the management of the risk with the help of the risk
management guidelines. Potential privacy issues are also stated in the report. Security issues and
recommendations to mitigate the issues are also stated in this report. Proposal of the compliance
program will also be stated in this report.
Cloud Computing Risk Assessment_3

4
CLOUD COMPUTING RISK ASSESSMENT
PART 1
Risk Analysis
Risk
ID Cause(s)
Risk
Nam
e Risk Description
Risk
Owner
(Responsi
ble
Person or
Group)
Probab
ility Impact Risk Score
Response Action
Type Response Actions
1 Uninten
ded
cyber-
attacks,
compro
mise in
hardware
Lack
of
data
Integ
rity
In case of unauthorized
access to data, the
ability to alter the data
gets accustomed and
corruption of data is
viable. Collapsing of
data as per the
management of storage
of the data also acts as a
major risk.
IT
Manager
Likely Moderate Unacceptable
Risk:
Extremely
High
Avoid Creation of dynamic environment is
necessary in the commencement of the
project. This is the main reason that
prosecution of the data that are restored
in the cloud will get integrated in a better
manner. Dynamic operation will help in
getting updates. Batch auditing also gets
performed in a better manner. Clustering
of high dimensional data with the help pf
set algorithm can also be used for better
management of the project.
2 Lack of
security
tool
impleme
ntation
Data
theft
In case of data theft the
data that are stored on
the database of the
ballot online can be
accessed in an
unauthorized manner.
This gaining of data as
the main disadvantage.
In case the data is
gathered in an
unauthorized manner,
IT
Manager
Likely Major Acceptable
Risk: Medium
Mitigate Implementation of tracking of employee
activity is one of the most important
aspect of the sites must be done.
Blocking of USB and SD card slots.
Installing of Snort can also be beneficial.
This insists that the access of data that
are stored in the cloud system gets
prosecuted. This is the sole reason that
the mangement of the data that are stored
in the cloud database gets performed in
Cloud Computing Risk Assessment_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security Issues and Risks associated with the Migration of Data into a Cloud
|12
|2330
|178

Cloud Privacy and Security: Risks and Solutions for Employee Data Protection
|19
|5918
|457

Security Threats in Cloud Computing and Preventive Methods
|7
|1380
|340

Case Study- Department of Administrative Services
|4
|527
|74

Cloud Services in Risk Assessment 2022
|5
|1151
|26

Ethical Dilemma: Issues and Solutions in IT
|6
|1485
|64