logo

Information Security Assignment | Security and Privacy

9 Pages2067 Words44 Views
   

Added on  2020-04-07

Information Security Assignment | Security and Privacy

   Added on 2020-04-07

ShareRelated Documents
2017Information SecurityInformation Security
Information Security Assignment | Security and Privacy_1
Security and privacy issues in cloud computingContentsIntroduction:..........................................................................................................................................2Research questions:...............................................................................................................................2Discussion:............................................................................................................................................2Privacy and Security concerns:..............................................................................................................3Mitigation action plan............................................................................................................................5Application of the cloud computing technologies:................................................................................6Vague Areas:.........................................................................................................................................6Challenges and problem area.................................................................................................................6Recommendations:................................................................................................................................6Conclusion:............................................................................................................................................7References:............................................................................................................................................71
Information Security Assignment | Security and Privacy_2
Security and privacy issues in cloud computingIntroduction:The digital innovation in the information technology is equipped with security risks and challenges. The data services associated with the business operation can be efficiently performed with the use of cloud computing environment. The cloud computing paradigm is adopted by every small and large organization for enhancing their business operations. The capabilities of the existing system can be completely changed with the implementation of cloud computing platform. The cloud computing platforms are of three types which are classified as platform as a service, software as a service, and an infrastructure as a service. The cloud computing is an effective technique for managing resources among the participating units to resolve the issues of conflicts. This new technology is equipped with some security challenges which should be taken under consideration to resolve the security challenges which results in the effective working of the enterprise. The computer programs, data, and information can be outsourced with the use of this newer technology (Rosado, 2013). The complexity of the business operations can be resolved with the implementation of cloud platform for easy availability of resources on demand. The adaptable programs of the cloud computing helps the user to customise with the data and information of their own choice (Liu, 2009). Research questions:What are the security concerns in cloud computing technology? What are the privacy concerns in cloud computing technology?What is the risks mitigation plans associated with the cloud computing technology?Discussion:The discussion forum is on the topic named as security and privacy issues in cloud computing. In this paper, we are going to highlights the security and privacy issues which are incorporated with the implementation of cloud computing technology. The privacy of the data is the crucial concern for the enterprise. The privacy legislation laws should be followed for storing the confidential information of the user on the cloud. The data leakages take place during the sending and retrieving data on request of the user. The confidentiality of the information can be lost during data transfer. It is recommended that the legislation policies 2
Information Security Assignment | Security and Privacy_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assignment on Cyber Security PDF
|14
|3121
|81

Data Security in Cloud Computing
|14
|2815
|29

Framework Modeling for User Privacy in Cloud Computing
|8
|5479
|500

Cloud Computing and Information Security
|10
|2376
|32

Cloud Computing Security Challenges
|15
|4893
|403

Cloud Computing Security Aspects
|16
|3985
|85