Assessment of Security Risks in Cloud Computing Environments

Verified

Added on  2025/04/30

|3
|283
|318
AI Summary
Desklib provides past papers and solved assignments for students. This report examines cloud computing security threats and preventive measures.
Document Page
ITC595 - Information Security
Assessment Item 3
Security threats in cloud computing and
preventive methods
Assessment title-
Assessment no.-
Student name-
Student ID-
Student email-
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Abstract
Cloud computing has reshaped government and business concurrently at an immense pace,
creating newer security issues. The development of these cloud services has enabled a faster
and an efficient delivery of services provided by organizations. The transition from server to
service-based thought process is reshaping the thinking, design, and delivery of computing
technology and software by departments of technology. However, these developments have
introduced new vulnerabilities in security as well as amplifying existing flaws, including
security issues that are finally realized to have full impact. The desire to bypass information
technology (IT) departments and data officers is one of the major security risks associated
with cloud computing. While moving entirely to cloud technologies can deliver cost and
efficiency profits, this requires consideration of security policies, methods, and best
methodologies at the business level. Businesses are susceptible to security breaches in the
absence of these standards, which can eliminate any profits from switching to cloud
technology. Around 70% of organizations are currently using the cloud technology and this is
the main reason this topic was selected as the risks associated with the cloud are a major
concern in every business. It is essential to understand the potential risks associated with
cloud technology if an organization is considering to move to it.
Document Page
References
Ren, K., Wang, C., & Wang, Q. (2012). Security challenges for the public cloud. IEEE
Internet Computing, 16(1), 69-73.
Yan, G., Wen, D., Olariu, S., & Weigle, M. C. (2013). Security challenges in vehicular cloud
computing. IEEE Transactions on Intelligent Transportation Systems, 14(1), 284-294.
chevron_up_icon
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]