Project Synopsis: Secure Implementation of Cloud Computing

Verified

Added on  2023/04/24

|2
|317
|368
Project
AI Summary
This project synopsis outlines the implementation of cloud computing within a business organization, emphasizing security considerations. The research employs qualitative methods to gather data and understand security issues for timely resolution, with implementation planned in phases. It identifies various security threats to cloud computing services, such as malware and denial-of-service attacks, and proposes automated security controls, including anti-malware tools, data encryption, and network-based security measures like firewalls and proxy servers. Administrative security checks and audits are also recommended. The synopsis concludes by stressing the importance of evaluating the pros and cons of cloud computing and assessing organizational needs before implementation.
Document Page
Implementation of Cloud Computing
Journal Synopsis
Title
Implementation of Cloud Computing
Aim of the Project
The aim of the project is to implement cloud computing in a business organization securely
and successfully.
Method
The research and analysis is done using qualitative methods of research to collect the data
sets and understand security issues for their timely resolution. The implementation will be
done in a phased manner.
Results
Cloud Computing services and applications are exposed to numerous security threats and
risks, such as malware attacks, denial of service attacks, eavesdropping attacks etc. There are
automated security controls that shall be used to treat such issues (Achara & Rathi, 2014).
Discussion
The security controls that shall be used to treat the risks shall comprise of anti-malware and
anti-denial tools. The data sets shall always be encrypted and backed up. Network security
shall be enhanced with the incorporation of network-based security controls. The use of
firewalls, proxy servers, and advanced authentication & access controls shall also be done
(Aruna, 2017). Administrative security checks, reviews, and audits shall also be included as a
practice to avoid and prevent the security risks and threats.
Conclusion
The pros and cons of Cloud Computing and the needs assessment of the organization shall be
evaluated before making the decision to implement the same.
References
Achara, S., & Rathi, R. (2014). Security Related Risks and their Monitoring in Cloud
Computing. International Journal Of Computer Applications, 86(13), 42-47. doi:
10.5120/15049-3417
1
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Implementation of Cloud Computing
Aruna, D. (2017). Cloud Computing Security Challenges and Risks. International Journal
For Research In Applied Science And Engineering Technology, V(XI), 1635-1641.
doi: 10.22214/ijraset.2017.11234
2
chevron_up_icon
1 out of 2
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]