logo

Cloud Privacy and Security: Risks and Solutions for Employee Data Protection

Summary: This is the subject outline for ITC568 - Cloud Privacy and Security at Charles Sturt University.

19 Pages5918 Words457 Views
   

Added on  2023-06-08

About This Document

This report discusses the privacy and security measures needed for cloud computing technology, specifically for employee data protection. It covers risks and solutions for SaaS, data breaches, digital identity issues, and more.

Cloud Privacy and Security: Risks and Solutions for Employee Data Protection

Summary: This is the subject outline for ITC568 - Cloud Privacy and Security at Charles Sturt University.

   Added on 2023-06-08

ShareRelated Documents
Running head: CLOUD PRIVACY AND SECURITY
CLOUD PRIVACY AND SECURITY
Name of the Student
Name of the University
Author Note
Cloud Privacy and Security: Risks and Solutions for Employee Data Protection_1
1CLOUD PRIVACY AND SECURITY
Table of Contents
Introduction:...............................................................................................................................2
Employee Data Security:............................................................................................................2
Threats and Risk:....................................................................................................................2
SaaS Risks:.............................................................................................................................3
Results of Threats:..................................................................................................................4
Employee Data Privacy:.............................................................................................................5
Existing Threats:....................................................................................................................5
Additional Risk:.....................................................................................................................6
Result of Risks:......................................................................................................................7
Digital Identity Issue:.................................................................................................................8
Provider Solution Issues:..........................................................................................................10
Key Cloud Provider:............................................................................................................10
Contract:...............................................................................................................................11
Infrastructure of Enterprise:.................................................................................................11
Data Encryption:..................................................................................................................11
Data Sensitivity:.......................................................................................................................12
Ethical Issues:.......................................................................................................................12
Conclusion:..............................................................................................................................13
Cloud Privacy and Security: Risks and Solutions for Employee Data Protection_2
2CLOUD PRIVACY AND SECURITY
Introduction:
The purpose this report is to discuss about the privacy and security that are needed to
be implemented by the cloud computing technology. The main objective of the charity is to
provide health care facility to the peoples who do not get benefits from the society, and does
not receive any advantages . As a principal consultant of the charity, I need to prepare a
report that will provide the guidelines for managing the privacy and policies while using this
technology. For managing their personal data , the charity bought application from an
organization which is US based for providing the SaaS platform (Pearson, 2013). The report
will focus on all the possible risks that can get provoked by the use of cloud computing
technology and their services. The main concern of the organization is to protect the data of
the employee, so that unauthorized person does not get the access over it. The data of each
employee needs to keep secured and safe. Charity needs to plan things in order to preserve
the security and privacy of the data provided by them in the cloud system (Xiao & Xiao,
2013). The report will discuss about the effects that may arise once the system is being
migrated to the SaaS application. The possible risk that may arise with this is also being
discussed in the report. The data is being stored in such a way so that it can maintain the
privacy and the confidentiality of this information from getting data breached. Further, the
stored data needs to be encrypted, so in case of data breaching the confidentiality of the data
will be maintained.
Employee Data Security:
Threats and Risk:
Every organization prepare some set of rules in order to provide their employee with
security. An employee will join an organization after learning about the privacy and security
provided by them and a good security provided by any organization will attract attention and
Cloud Privacy and Security: Risks and Solutions for Employee Data Protection_3
3CLOUD PRIVACY AND SECURITY
trust of their employee. Several risks are faced by the database that is maintained by cloud
system, this will affect the system adversely. This cloud database contains a lot of precious
and personal database that are needed to be protected from the attackers (Kshetri, 2013). The
concern is to discuss about the risk and threats that can affect the data of the Charity. The
risks and the threats are discussed below:
APIs: API stands for application programme interface. API establishes a communication
with the cloud by user. The organization that adopted cloud-computing technology had
modified their security process, in order to protect the system from cyber attackers. Still their
remains chances of facing problems in the area of API administration.
Data Breach: Data breaching is a method of altering someone else data without their
permission. This is a major threat faced by cloud computing. Through this method of data
breaching the attackers get information from the cloud database and as this re sensitive data
that’s why this are stored in the cloud (Wei et al., 2014). The details of users like the name,
address, bank information and other personal details are exposed to the hackers. Data breach
can affect million of peoples at a time.
Hijacking account: Account hijack is another risk that are likely to be faced by the users.
The account of the users is hacked by the victims. This is done by the method of phishing.
Phishing is a method through which the data can be effected, this search for the holes in the
network and enters through their to attack the system. With the help of this method the one
who is in search of hole for attacking the system can easily, access data and information
stored (Suo et al., 2013).
SaaS Risks:
When a database is migrating to a SaaS application, many risks are generated and one
of the main threats is the security of the data. It is possible with every SaaS application that
Cloud Privacy and Security: Risks and Solutions for Employee Data Protection_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cloud Privacy and Security: Risks and Mitigation Strategies
|14
|4006
|102

Cloud Privacy and Security
|19
|6060
|166

Cloud Privacy and Security
|18
|6014
|296

Cloud Privacy and Security
|25
|6717
|441

Cloud Privacy and Security
|21
|6371
|142

Cloud Services and Security
|7
|1539
|269