logo

Cloud Security and Privacy

Write a report on a topic of your choice related to recent developments in information security and prepare a 5-minute presentation on the major ideas of the topic.

9 Pages1887 Words372 Views
   

Added on  2023-06-01

About This Document

This report discusses cloud security and privacy, including advantages and challenges. Cloud computing is a significant delivery of hosted services that are provided to users on the Internet. Cloud security is a broader set of technologies, controls, and policies that are deployed for the proper protection and security of applications, data, or associated infrastructures of the technology of cloud computing.

Cloud Security and Privacy

Write a report on a topic of your choice related to recent developments in information security and prepare a 5-minute presentation on the major ideas of the topic.

   Added on 2023-06-01

ShareRelated Documents
Running head: CLOUD SECURITY AND PRIVACY
Cloud Security and Privacy
Name of the Student
Name of the University
Author’s Note:
Cloud Security and Privacy_1
1
CLOUD SECURITY AND PRIVACY
Table of Contents
Introduction................................................................................................................................2
Discussion..................................................................................................................................2
Cloud Computing Security.....................................................................................................2
Cloud Storage Security..........................................................................................................3
Advantages of Cloud Security and Privacy...........................................................................3
Challenges of Cloud Security and Privacy.............................................................................4
Conclusion..................................................................................................................................5
References..................................................................................................................................7
Cloud Security and Privacy_2
2
CLOUD SECURITY AND PRIVACY
Introduction
Cloud computing can be stated as the shared pools of the configurable resources of
computer system as well as high level services, which could be rapidly provisioned with
extremely less effort of management over the Internet connection (Rong, Nguyen and Jaatun
2013). This technology of cloud computing majorly relies on the resource sharing for the core
purpose of achieving coherence or economies of scales. The third party clouds eventually
enable the organizations for focusing on the major businesses and not on expending the
resources on the computer maintenance and infrastructure. This cloud computing also enables
the organizations for avoiding or minimizing the upfront costs of IT infrastructure (Almorsy,
Grundy and Müller 2016). The applications could be easily run with the help of this
technology and hence security and privacy are important. The following report outlines a
brief description of cloud privacy and security with relevant details.
Discussion
Cloud Computing Security
The cloud computing security is the specified set of several control based policies and
technologies that are eventually designed for adhering to the rules of regulatory compliance
and hence protecting the information, applications of data or infrastructure that is associated
with the utilization of cloud computing (Aljawarneh 2013). Since, the nature of the cloud is
of shared resources, the identity management, access controls and privacy controls are the
concerns faced by its users. Moreover, the organizations that are utilizing cloud computing as
well as the associated providers of cloud for the data operations, privacy and security are kept
on top priorities. These are often termed as extremely vulnerable in respect to other
technologies (Chou 2013). The major processes of cloud computing security is responsible
for addressing each and every security control, which is often incorporated by the cloud
Cloud Security and Privacy_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cloud Security and Privacy Name of the University Author's Note
|9
|1844
|410

Cloud Privacy and Security
|21
|6371
|142

Cloud Security and Risk
|19
|5365
|373

Security and Privacy Issues in Cloud and Fog Domain
|5
|823
|66

Migration of DTGOV to Cloud Computing
|12
|844
|56

Cloud Computing Issues Assignment
|10
|2234
|41