logo

Cloud Security and Privacy for Land Titles Agency: Threat and Risk Assessment

   

Added on  2023-05-30

13 Pages3073 Words431 Views
Running head: CLOUD SECURITY AND PRIVACY
Land Titles Agency: Case Scenario
Name of the student:
Name of the university:

2CLOUD SECURITY AND PRIVACY
1. Development of Threat and Risk Assessment for PII data for people
registered
The responsibility of Land Titles Agency is to maintain the land registry details of block
of lands that are either sold or transferred from one owner to any new owner. The role of the
agency is to keep the records of all the block of lands that are newly bought and sold. They
create new registered certificates for the new land owners. These certificates ensure the proof for
land ownership. In order to verify the identification of every person the agency needs to deal
with large number of lawyers and conveyancers as well (Ibrahim et al., 2018). With the changing
time the number of information regarding the legal certificates and ownership are also
increasing. In order to deal properly with the information it has become important for the agency
to change their operational environment from the general to cloud based. The agency is willing
to upgrade their system from the current one to a public cloud based one. It is found that, the
upgraded system will help the agency to increase its operational, functional and business
efficiency. The threats and risks that may occur due to these changes are developed (Serhani,
Atif & Benharref, 2014). In addition to this, the risk and threats identified in this case include
both privacy and data protection and elaborated in the below section:
Risk assessment
Features Subcharacteristics Cloud risks
Functionality Business requirement
suitability
The developed functional
solution may not meet the
business requirements.

3CLOUD SECURITY AND PRIVACY
correctness The system may fail to meet
the system and business
requirements
Interoperability The system may fail to fulfill
the need of IT architectural
needs, interface and data
migration needs.
Compliance risks considering
policy and regulations
Regulatory compliances
Reliability Risks with the offered
maturity model
Quality issues
Fault tolerance Business continuity and
resilience risks
Usability Technical understanding of
the associates users
Inadequate people may fail to
reach the business
requirements
Efficiency Learning ability Network management and
data integration risks
During development of Threat and Risk Assessment (TRA), some measures are there to
be considered by the agency. For protecting confidential information from the external attackers
the overall road map for migration to cloud computing should focus on certain factors n terms of
vision, visibility, accountability and sustainability (Elmubarak, Yousif & Bashir, 2017). Apart

4CLOUD SECURITY AND PRIVACY
from this, other features that are to be considered for managing data include confidentiality,
integrity and availability. Significant remediation and approve can provide effective control over
the activities of the agencies. The technical review should be served over the agency security
model. Matured IT processing should be followed accordingly by the agency to gain measurable
resultants.
Privacy for the data: Cloud computing technology has been identified as a boon for the
millennial and technical world for very obvious reason. Only data storage and data management
are not the privacy actions but also it gives the users high time data access capabilities. The users
can access needful data from the server regardless of time and location (Pham et al., 2017). The
security related issues are categorized in security concerns faced by consumers and the
consumers. the providers should make sure that the infrastructure they have developed is
completely secured and the data of the users are absolutely protected.
Data protection: In order to protect server data two different technologies should be followed
by the agency are encryption and application firewall. With the help of encryption technology
none of the unauthenticated and unauthorized user will be able to access data from the server
without permission. The data transmission channel will also be secured and the unwanted users
can not access the transmission channel (Hussain, Hussain & Hussain, 2014). It will give high
time as well as sustainable protection to the agency. The agency can avoid loss of sensitive data,
malware infection, hacked interface, violation of existing regulatory controls etc.
2. Discussion on stability of using PaaS and SaaS database

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Migration to SaaS Cloud Computing Platform - Land Titles Agency
|18
|1135
|269

IT Risk Assessment Report for Aztek's Technology Decision
|2
|990
|458

Security and Privacy of Employee Data - Desklib
|25
|6301
|272

IT Risk and Cloud Computing Assignment
|12
|5400
|80

Report on Analysis of the STP network
|14
|3581
|32

Analysis of the Big Data Threats- Assignment
|13
|3388
|176