Assessment of Security Risks in Cloud Computing Environments
VerifiedAdded on 2025/04/30
|3
|283
|318
AI Summary
Desklib provides past papers and solved assignments for students. This report examines cloud computing security threats and preventive measures.

ITC595 - Information Security
Assessment Item 3
Security threats in cloud computing and
preventive methods
Assessment title-
Assessment no.-
Student name-
Student ID-
Student email-
Assessment Item 3
Security threats in cloud computing and
preventive methods
Assessment title-
Assessment no.-
Student name-
Student ID-
Student email-
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Abstract
Cloud computing has reshaped government and business concurrently at an immense pace,
creating newer security issues. The development of these cloud services has enabled a faster
and an efficient delivery of services provided by organizations. The transition from server to
service-based thought process is reshaping the thinking, design, and delivery of computing
technology and software by departments of technology. However, these developments have
introduced new vulnerabilities in security as well as amplifying existing flaws, including
security issues that are finally realized to have full impact. The desire to bypass information
technology (IT) departments and data officers is one of the major security risks associated
with cloud computing. While moving entirely to cloud technologies can deliver cost and
efficiency profits, this requires consideration of security policies, methods, and best
methodologies at the business level. Businesses are susceptible to security breaches in the
absence of these standards, which can eliminate any profits from switching to cloud
technology. Around 70% of organizations are currently using the cloud technology and this is
the main reason this topic was selected as the risks associated with the cloud are a major
concern in every business. It is essential to understand the potential risks associated with
cloud technology if an organization is considering to move to it.
Cloud computing has reshaped government and business concurrently at an immense pace,
creating newer security issues. The development of these cloud services has enabled a faster
and an efficient delivery of services provided by organizations. The transition from server to
service-based thought process is reshaping the thinking, design, and delivery of computing
technology and software by departments of technology. However, these developments have
introduced new vulnerabilities in security as well as amplifying existing flaws, including
security issues that are finally realized to have full impact. The desire to bypass information
technology (IT) departments and data officers is one of the major security risks associated
with cloud computing. While moving entirely to cloud technologies can deliver cost and
efficiency profits, this requires consideration of security policies, methods, and best
methodologies at the business level. Businesses are susceptible to security breaches in the
absence of these standards, which can eliminate any profits from switching to cloud
technology. Around 70% of organizations are currently using the cloud technology and this is
the main reason this topic was selected as the risks associated with the cloud are a major
concern in every business. It is essential to understand the potential risks associated with
cloud technology if an organization is considering to move to it.

References
Ren, K., Wang, C., & Wang, Q. (2012). Security challenges for the public cloud. IEEE
Internet Computing, 16(1), 69-73.
Yan, G., Wen, D., Olariu, S., & Weigle, M. C. (2013). Security challenges in vehicular cloud
computing. IEEE Transactions on Intelligent Transportation Systems, 14(1), 284-294.
Ren, K., Wang, C., & Wang, Q. (2012). Security challenges for the public cloud. IEEE
Internet Computing, 16(1), 69-73.
Yan, G., Wen, D., Olariu, S., & Weigle, M. C. (2013). Security challenges in vehicular cloud
computing. IEEE Transactions on Intelligent Transportation Systems, 14(1), 284-294.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 3
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2026 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





