logo

Cloud Privacy and Security: A Comprehensive Analysis of Risks and Threats

   

Added on  2024-07-12

23 Pages5693 Words483 Views
 | 
 | 
 | 
CLOUD PRIVACY AND SECURITY
Assessment Item-2
1
Cloud Privacy and Security: A Comprehensive Analysis of Risks and Threats_1

Contents
Security of Employee Data........................................................................................................3
Establish the existing threats and risks to the security of that data and information
contained in the in-house HR database..................................................................................3
Are there any additional risks and threats to employee data that may arise after migration
to a SaaS application?............................................................................................................5
Assess the resulting severity of risk and threat to employee data..........................................7
Privacy of Employee Data.........................................................................................................8
Establish the existing threats and risks to the privacy of that data and information contained
in the in-house HR database...................................................................................................8
Are there any additional risks and threats to the privacy of the employee data after
migration to a SaaS application?..........................................................................................10
Assess the resulting severity of risk and threat to the privacy of employee data.................12
Digital Identity Issues..............................................................................................................14
Provider Solution Issues...........................................................................................................16
Data Sensitivity........................................................................................................................19
References................................................................................................................................21
2
Cloud Privacy and Security: A Comprehensive Analysis of Risks and Threats_2

Security of Employee Data
Establish the existing threats and risks to the security of that data and information
contained in the in-house HR database.
In the system, hackers are tried to thieve confidential information and an organization
database has contained all data. This huge amount of information is targeted by the attackers.
The database is determined as the most important function for any organization. For a long
period of time, HR systems develop and deliver software solutions to the people and they
have to deal with many groups of companies. The HR database is ready to meets to the
demands of the customers and delivers a robust solution that helps to secure the database
across the internet. The threats that are identified in the databases are the reason make errors
in the database design. Most of the database threat include:
When users grant the rights of the database and these functionality increase the requirement
of the job. These rights are useful for a person to update the information in an account when
the role of a person is changed in the organization. Some databases are failed to update the
rights for the users whose roles are changed in the organization. (Databases, 2014)
In the case of unauthorized purpose accessing legal data is not valid.
Some attacks are being applied to the databases. These attacks are termed as database
injection and traditional system of storing the database is fails when all the data is attacked at
some crucial point.
The common database attacks are occurring due to lack of functionality and the design. Some
few implications are applied to check the things doing in the database or not.
Sometimes many parts of databases are infected by the system because bugs are exploiting
the system functionality. In some cases, system time and resources are lacking and leave the
database in the state of being attacked.
The database is considered as the backend part in the system and it must be kept secure from
the threats generated by the internet. In any system, the database generates an interface in the
network and the services. Attackers acquire the data and destroy it. Some encrypted
administrations provide communication platforms for avoiding damage in the system.
3
Cloud Privacy and Security: A Comprehensive Analysis of Risks and Threats_3

When duties of the database are subdivided into several forms then it is complex for a hacker
to steal the data. The internal operations in the system can take care of fraud and theft and it
makes the limits on complete control of the database.
The major threat arises from the inconsistency in the data. Because it is due to the lack of
database technology administration in the system. (Malcher, 2017)
Figure 1: Security of Data
4
Cloud Privacy and Security: A Comprehensive Analysis of Risks and Threats_4

Are there any additional risks and threats to employee data that may arise after
migration to a SaaS application?
The risk is considered as a huge amount of threat which arises to provide many services and
benefits to the employee. In the large organizations, growth is increasing the as large amount
of services are adopted. Information technology providers are aware of risk occur in cloud
applications. (Thuraisingham, n.d.)
Some points are arising to compute risk in cloud applications:
Disable unauthorized access: The persons who don’t like to work accordingly then they
provide a network to small businesses and hack the data of small as well as large businesses.
These businesses combine data from multiple organizations and pushing towards larger
organization to protect a large amount of data in the system. Every business in the network
that uses cloud services and increases the value of those services as a targeted service. These
risks are generated by the internal threats that occur in the cloud services.
Risk occurs at organizations: When cloud services store critical data of an organization such
as payment options and another detail list. Most of the small organization doesn’t have any
idea about the cloud services they use. These services mainly consider the security techniques
and access control of data. When data depend on the cloud services then trust for the business
is a move to the others hand and the quality of the business is available for data. For a moving
business, its reputation is important and it depends on the services provided by the cloud.
The risk of legal actions: Some companies that show the big impact on data security is
government companies, bank etc. If there is some risk in the processing of data in the cloud
then it leaks the company’s information.
Sometimes it happens that the data is accessed from the cloud every time but in any case, if
data is not available due to improper connection of network services then risk occurs at
improper processing of resources. (Aime et al., 2011)
5
Cloud Privacy and Security: A Comprehensive Analysis of Risks and Threats_5

Figure 2: Attacks in SAAS
6
Cloud Privacy and Security: A Comprehensive Analysis of Risks and Threats_6

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents