logo

Cloud Privacy and Security: Threats and Risks in SaaS and HR Database

   

Added on  2022-10-04

19 Pages5964 Words366 Views
Running head: CLOUD PRIVACY AND SECURITY
CLOUD PRIVACY AND SECURITY
Name of the Student
Name of the University
Author Note

CLOUD PRIVACY AND SECURITY1
Executive Summary
The data can be stored into the various technology now a days. Each and every organization
has the problems to store the data properly. This huge data containing problem is solved by
the cloud computing technology. The cloud computing is a space where data can be stored
and fetched properly through the cloud. Now the protection of these data is needed. Various
sensitive data and cash transaction has been done through this method. The following report
is the explanation of the security, privacy of the employee. In the explanation the process of
threat and Risk of the SaaS, HR department and the employee database is clearly described.
Threat as well as Risk of the government employee in the SaaS / Software as a Service has
been also described properly.

CLOUD PRIVACY AND SECURITY2
Table of Contents
Introduction:...............................................................................................................................2
Discussion..................................................................................................................................3
Security of Employee Data:......................................................................................................3
1. Threat and Risk in HR database:.....................................................................................3
2. Threat and Risk of Data after migration of SaaS:...........................................................4
3. Severity Risk and threat in employee data:.....................................................................6
Privacy of Employee Data:........................................................................................................7
1. Threat and Risk in HR database:.....................................................................................7
2. Threat and Risk of Data after migration of Software as a Service:................................8
3. Severity Risk and threat in employee data:...................................................................10
Digital Identity Issues:.............................................................................................................12
Threat and Risk of Government employee (digital identities, using Software as a Service):
..............................................................................................................................................12
Conclusion:..............................................................................................................................13
Referencing:.............................................................................................................................14

CLOUD PRIVACY AND SECURITY3
Introduction:
The adoption of the Cloud technology is needed for the proper privacy and the
security. The company or the organization are needed to solve the security problem properly.
The flexibility, agility, security are crucial part of the system. All of these are maintained
through the cloud computing. The interoperability issue and the data ownership also taking
care by the cloud computing. In today’s world, the data mining is done through the data
migration. There are several experts are assigned to take care of the responsibility and the
vendor security. The Administrative Services Department has been taken care of the cyber
surety from a decade. The multi cloud computing has been done with the different type of
cloud environment. This formation is applicable for the multiple cloud platform and the
services. The cloud operation has been done sometimes with the third party. Data integration
is also done by this procedure. The final procedure and the complexity is needed to be
complete that the organization security remain stable. The SaaS or the software as a service is
the distribution model of the software which is the third party provider which is capable of
the application service. In this system the provider will get one copy of application that will
help for the service level agreement. The application programming interface is also
maintained by the SaaS. Various SaaS applications like the email, sales management, human
resource management are essential. All these application is needed for the cloud privacy and
the security. The Department of Administrative Services has been maintain the payroll
properly. The COTS or the Commercial off The Shelf application is also maintained through
the Administrative Services Department. In the organization there are several problems has
been created by the spam, malicious attack. That is why the risk management is needed
(Esposito et al., 2016). For the better result, the information technology concern about the
complex environment. There are several professionals for taking care the cloud computing
system. The Cloud Security Alliance has more than 700 professionals for taking care the

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cloud Security Report 2022
|23
|6412
|11

Cloud Privacy and Security
|18
|6014
|296

Cloud Security and Risk
|19
|5365
|373

Data Privacy and Security in Cloud Computing
|28
|7001
|70

Securing and Privacy Name of the University Author Name: Cloud based Approach
|24
|5598
|311

Cloud Privacy and Security
|21
|6371
|142