Cloud Computing Security: Comprehensive Risk Analysis & Strategies

Verified

Added on  2023/06/11

|8
|1067
|140
Report
AI Summary
This report provides a comprehensive overview of cloud computing security, focusing on the security issues, risks, and risk management strategies associated with adopting cloud technology in an enterprise. It highlights the advantages of cloud computing, such as cost savings through pay-per-demand IT infrastructure, while also addressing the challenges, including data protection, loss of governance rights, and the complexities of migrating between cloud vendors. The report emphasizes the importance of enterprises acknowledging risk factors and implementing well-planned cloud strategies, including customized approaches to align with workload and business objectives. Furthermore, it discusses the need for collaboration between business units and cloud vendors to identify potential outcomes and integrate cloud technology effectively within both private and public environments, ultimately aiming to bridge the gap through diligent partner selection and successful strategy implementation. Desklib offers a platform to explore similar solved assignments and past papers.
Document Page
Cloud Computing Security 0
Title: Cloud Computing Security
Assignment Name:
Student Name:
Course Name and Number:
Professor:
Date:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Cloud Computing Security 1
Executive Summary
This report summarizes the basics of adopting the cloud computing technology in an
enterprise. The number of security issues in cloud computing has been summarized and how the
business organizations are incorporating within its structure. Risk management strategies in
cloud computing have been summarized. The emphasis has been given to reducing the overall
switching costs and implementing a customized strategy.
Content
Document Page
Cloud Computing Security 2
s
1. Security Issues in Cloud Computing........................................................................................3
1.1 Introduction................................................................................................................................3
1.2 Aim of the Study...................................................................................................................3
1.3 Objectives of Cloud Computing................................................................................................3
1.4 Research Methodology..............................................................................................................3
1.5 Cloud Computing Architecture..................................................................................................4
1.6 Discussion..................................................................................................................................4
1.7 Limitations.................................................................................................................................4
1.8 Conclusion.................................................................................................................................4
2. Risks and Risk Management Strategies in Cloud Computing.....................................................5
2.1 Introduction................................................................................................................................5
2.2 Aim of the Study........................................................................................................................5
2.3 Methodology..............................................................................................................................5
2.4 Risk and Risk Management Strategies......................................................................................5
2.5 Research Challenges..................................................................................................................6
2.6 Discussion..................................................................................................................................6
2.7 Limitations.................................................................................................................................6
2.8 Conclusion.................................................................................................................................6
References........................................................................................................................................7
Document Page
Cloud Computing Security 3
1. Security Issues in Cloud Computing
1.1 Introduction
Cloud computing is a promising methodology of delivering IT computing resources.
Cloud computing technology has been embraced with different technologies.
1.2Aim of the Study
The cloud computing technology has many advantages and Enterprises can utilize IT
infrastructure through Pay Per demand mode. This can save the costs for purchasing the physical
resources.
1.3 Objectives of Cloud Computing
1. Shared pooling of resources
2. Service oriented
3. Geo-distribution network access
1.4 Research Methodology
The review surveys the digital library like SaaS and other data analytics software.
Extending the data, developing applications and storage service or on-demand. The technology
category further deals with protocols and standards and interfaces with related technologies.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Cloud Computing Security 4
1.5 Cloud Computing Architecture
1. The data transactions within the portal may prove to be disastrous because of reduced
encryption techniques.
2. Multi-tenancy and remoteness failure are the significant features of cloud. This can be
categorized as risky as it provides the failure for mechanisms that separate memory and
storage (Shahzad and Hussain, 2013).
1.6 Discussion
There are major switching costs involved when migrating from vendor cloud computing
infrastructure to another. This can introduce a lot of complexity. Security in cloud computing
refers to the set of technologies and policies that can protect data and applications and associated
consumers.
1.7 Limitations
Data protection is one of the major threats as anyone can handle the data in improper
lawful actions are not taken. This requires a lot of proper security certification and data
compliances (Mathkunti, 2014). The loss of governance rights over the cloud computing
infrastructure. The enterprise needs to select the cloud vendor and therefore relinquishing vendor
control.
1.8 Conclusion
With the unintentional growth in cloud computing infrastructure, security is one of the
prime concerns for enterprises to build cloud into their business processes.
Document Page
Cloud Computing Security 5
2. Risks and Risk Management Strategies in Cloud Computing
2.1 Introduction
Cloud strategy is one of the major challenges for many enterprises. In spite of the
premise, cloud computing infrastructure gaining wide acceptance, the enterprises need to adopt
long planning and comprehensible implementation.
2.2 Aim of the Study
Most of the business practices are meant for reducing the IT costs and the companies are
taking broader steps for meeting with different objectives (Alashoor, 2014). This implies
working on the overall improvement of business units and flexibility ratio.
2.3 Methodology
Delphi Study has been carried out, that explores the perceptions of the implementation of
cloud technology. The risk factors have been identified and qualitative responses elaborate the
risk factors.
2.4 Risk and Risk Management Strategies
The objective is to realize the strengths and weaknesses and manage the workload
efficiently. The departments like business development, marketing and sales need to give proper
relevance to the IT processes and cloud service. This can have a lot of positive impact on the
procurement behavior. The enterprises need to acknowledge the risk factors around its adoption
and deployment strategy (Yang, 2011).
Document Page
Cloud Computing Security 6
2.5 Research Challenges
In order to make the most out of the cloud computing technology, the business units need
to work in cohesion with the vendors and discuss the possible outcomes and work towards the
achievement of set goals. The vendors need to think how cloud computing technology can be
integrated with private and public environment.
2.6 Discussion
The major contribution in cloud computing services is to identify the risk factors. A Risk
management matrix can be applied for the measurement of risks and prioritizing risks.
2.7 Limitations
Cloud compatibility must be handled with extra caution. Privacy is one of the most
severe issues that must be the clear priority, before the implementation of cloud computing
technology.
2.8 Conclusion
The gap can be bridged through the selection of diligent partners and successful
implementation of cloud strategy. The enterprises can outsource the expertise and vendors can
identify the appropriate customized services for meeting with the business objectives. This is a
customized strategy that can be aligned with workload and streamline the enterprise objectives
with outcomes.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Cloud Computing Security 7
References
Alashoor, T. (2014). Cloud computing: a review of security issues and solutions. International
Journal of Cloud Computing, 3(3), p.228.
Mathkunti, N. (2014). Cloud Computing: Security Issues. International Journal of Computer and
Communication Engineering, 3(4), pp.259-263.
Shahzad, A. and Hussain, M. (2013). Security Issues and Challenges of Mobile Cloud
Computing. International Journal of Grid and Distributed Computing, 6(6), pp.37-50.
Yang, S. (2011). Cloud Computing Security Issues and Mechanisms. Advanced Materials
Research, 225-226, pp.706-709.
chevron_up_icon
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]