Cloud Services and Security

   

Added on  2023-06-08

7 Pages1539 Words269 Views
Running head: CLOUD SERVICES AND SECURITY
Cloud Services and Security
Name of the Student
Name of the University
Author note
Cloud Services and Security_1
1
CLOUD SERVICES AND SECURITY
Table of Contents
Introduction................................................................................................................................2
Recommended personal data protection strategy.......................................................................2
Strategy to prevent data breaches...........................................................................................2
Strategy to avoid cyber theft..................................................................................................3
Prevention from malicious attacks.........................................................................................3
Prevention from accidental exposure of personal data..........................................................4
Conclusion..................................................................................................................................4
References..................................................................................................................................6
Cloud Services and Security_2
2
CLOUD SERVICES AND SECURITY
Introduction:
The report highlights the data breach issue that may take place due to the
implementation of cloud services by the Charity. The Charity has decided to join a
community cloud that is provided by a Software as a service (SaaS) public cloud vendor to
provide various applications to the support staffs and administrative users. The Charity has
also decided to purchase a Human Resource (HR) and personnel management application
from a company that is based in the US and that provides a SaaS solution. The strategies to
protect the personal data of the Charity and of the clients that use the services of the Charity
are recommended in the report.
Recommended personal data protection strategy:
Strategy to prevent data breaches:
The Charity is planning to join a community cloud that is provided by a public cloud
vendor to provide several application to the staffs of the organisation. The community cloud
will be used to store 200 Terabyte data of the Charity that will be held in a SaaS database.
The SaaS will allow the Charity to store their data in the cloud and the public cloud vendor
would manage and update the software in which the data of the organisation will be saved.
Therefore, this can result in data breach as the confidential data of the clients of the Charity
would be accessed by the public cloud vendor and it will be stored in a public cloud (Rao &
Selvamani, 2015). The Charity is required to consider Application Program Interfaced (API)
based cloud access security brokers (CASBs) as it provides an efficient way to protect the
access to the public cloud data and prevents data breaches (Chou, 2013). The network traffic
is examined by the CASBs that can ensure the Charity that the confidential data of their
clients will remain protected. It prevents several security risks that include downloading of
files by any unauthorised network, sharing of files and other risk operations.
Cloud Services and Security_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cloud Privacy and Security
|18
|3664
|384

Cloud Privacy and Security
|18
|6014
|296

Cloud Privacy and Security: Threat and Risk Assessment, PII Privacy Strategies, Digital Identity and Controls, Governance Plan
|35
|1107
|202

Cloud Privacy and Security: Risks and Solutions for Employee Data Protection
|19
|5918
|457

Privacy and Security
|17
|4604
|375

Cloud Based Security Solution
|9
|2034
|436