logo

Critical Review of Cloud Security: Importance, Technical Background, Issues, and Solutions

   

Added on  2023-04-21

14 Pages3746 Words251 Views
Running head: INFORMATION SECURITY
Information security
Name of the student:
Name of the university:
Author note:

1INFORMATION SECURITY
Abstract
The report is prepared to present an acritical analysis of the information security system.
Based on it, the chosen cloud security system is reviewed critically in the story. The critical
review thus presented discuses about the different types of cloud security features and what
they offer to the customers using a cloud-based solution. The last part of the critical review
reflects the threats and issues that are related to the cloud security solution infrastructure and
based on it the different types of solution methods that the cloud security officials provide are
hence discussed.

2INFORMATION SECURITY
Table of Contents
Introduction:...............................................................................................................................3
Summary:...................................................................................................................................4
Understanding cloud security.................................................................................................4
Critical review:...........................................................................................................................5
The importance of cloud security:..........................................................................................5
Technical background of cloud security:...............................................................................6
Arguments and issues with cloud security:............................................................................8
Methods to solve cloud security issues:.................................................................................9
Conclusion:..............................................................................................................................10
References:...............................................................................................................................11

3INFORMATION SECURITY
Introduction:
Information security is defined as the collection of different strategies that are
required to manage the processes, policies and tools that are essential to detect and document
the threats countering towards digital as well as non-digital information (Safa, Von Solms
and Furnell 2016). The responsibilities of information security include the establishment of
business process systems to protect the assets of information security with proper format and
storage procedure. Ensuring the availability, integrity and confidentiality are considered as
the basic standards for an information security system. While these characteristics remain as
the central importance in safeguarding information, then there is rapid development in the era
of information technology sector (Soomro, Shah and Ahmed 2016). Information and
communication technology can be argued as the primary subcomponents of information
security as it includes the protection of the underlying resources. Both in terms of pace and
sophistication, new invented cyber attacks are hitting the information systems with a rapid
speed around the world. Information threats are taking up the world causing significant loss
of data of the public as well as of some major organisations. Some of the risks that are faced
include disruption of commerce, fraud or stealing credit information and internal threats
(Laszka, Felegyhazi and Buttyan 2015). Thus, for preventing all these threats, it is crucial that
organisations implement proper information security inside their systems. Information
security is of various types like cloud security, cryptography, application security and many
more. This report deals with the critical review of the cloud security type of information
security reviewing its technical background and issues related to it.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
(Solved) Assignment on Cloud Computing
|13
|2925
|208

Security Management and Migration Report
|11
|2567
|372

Challenges to Maintain Information Security at Remote Recovery Locations
|4
|612
|107

Assignment | Threats Affecting Cloud Computing.
|4
|889
|12

Cloud Privacy and Security: Risks and Mitigation Strategies
|14
|4006
|102

IT Risk Management: Cloud Security
|16
|3858
|422