logo

Cloud Security and Privacy Assignment 2022

   

Added on  2022-10-17

18 Pages5246 Words12 Views
Running head: CLOUD SECURITY AND PRIVACY
Cloud Security and Privacy
Name of the Student
Name of the University
Author’s Note:

1
CLOUD SECURITY AND PRIVACY
Table of Contents
1. Introduction............................................................................................................................2
2. Discussion on Case Study......................................................................................................2
2.1 Security of the Employees’ Data......................................................................................3
2.2 Privacy of Employees’ Data.............................................................................................8
2.3 Digital Identity Issues....................................................................................................12
3. Conclusion............................................................................................................................13
References................................................................................................................................14

2
CLOUD SECURITY AND PRIVACY
1. Introduction
Cloud computing technology can be termed as the on demand accessibility of several
computer based system resource, majorly for the computing power as well as system
resource. This is being done even without any direct user management (Baron et al., 2019).
The large clouds comprise of the functionalities that are being distributed over numerous
locations from the centralized servers. When the respective connection to any specific user is
extremely closer, it might be subsequently designated over the edge servers. These typical
clouds might be restricted to any one organization, so that they are available to several
distinctive companies such as public cloud and even an amalgamation of both the clouds for
hybrid cloud (Almorsy, Grundy & Müller, 2016). The following report would be providing a
proper analysis of the case scenario of DAS about the recent movement of this company to
cloud services to enhance their overall productivity and performance management. The
various details related to security as well as privacy of employee’s confidential data and
information with subsequent identification of the various risks and vulnerabilities. The final
part of the report discusses about the major risks related to digital identifies from movement
to the applications of SaaS.
2. Discussion on Case Study
DAS is solely responsible for providing several products and services to every other
department f an Australian State Government. Each of the service mainly includes
procurement, management of contractors, management of contract tender, payroll,
management of human resources and personnel. All of these services are being provided from
the own data centres of the Department and as a result of the change within the policy of the
respective government policy, this particular organization of Department of Administrative
Services has decided to make a movement to the approach of Shared Services. The approach

3
CLOUD SECURITY AND PRIVACY
refers to the fact that DAS would eventually centralize a series of services for the entire
Government or WofG. It is being evaluated that as a result of this type of movement, there
would be a requirement of the migration of their confidential data so that the data could be
consolidated into any one of the central database of DAS. The organization would then
provide the consolidated services to any other agency or department for the same
government.
According to any other policy of the government, there would be a mandatory cloud
first approach that helps in up gradation as well as acquiring of the services and software.
There are few strategic policy changes from the government, which include purchasing
applications of personnel as well as HR management from the United States based
organization, which gives a software as a service solution and movement of the DAS payroll
to the application of COTS, which could be controlled within a specific public cloud. This
transferring to cloud approach and application is responsible for eradicating all types of
issues ad complexities to a high level and hence reducing the overall expenses in a better
manner.
2.1 Security of the Employees’ Data
2.1.1 Establishment of Existing Vulnerabilities and Threats to Security of Data as well
as Information contained in the Database of HR
The confidential datum or information of the staff within the DAS major and
significant issues and threats related to security (Krasnyanskaya & Tylets, 2015). This type of
sensitive datum is being stored in the respective databases of HR department. As a result,
there exists some of the major issues related to data loss threat. The data might be under stake
and could even be completely lost. The major reason for such distinctive threat would be the
lack of recognition of every existing threat or risk in the database of human resources. The

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cloud Computing Report 2022
|24
|7085
|19

Securing and Privacy Name of the University Author Name: Cloud based Approach
|24
|5598
|311

Cloud Security and Privacy
|27
|5040
|357

Cloud Confidentiality is defined as assurance
|34
|2951
|30

Report | Cloud Computing in DAS
|22
|5610
|356

Implementation of Privacy Issues for Personal Data
|26
|7272
|353