Mitigating Risks in Cloud Computing
VerifiedAdded on 2020/03/28
|20
|4952
|94
AI Summary
This assignment focuses on the risks inherent in cloud computing environments. It delves into various aspects like security vulnerabilities, data privacy concerns, compliance issues, and potential disruptions to business continuity. The goal is to analyze these risks and propose effective mitigation strategies that organizations can implement to ensure a secure and reliable cloud computing experience.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
[IT Risks Management]
2017
2017
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Executive summary:
The Aztec organization wants to transform their working tactics with new and advanced
features which helps in enhancing their turnover of the company. We as a project consultant
recommended the Aztec organization to change their business functionality with the
migration of business operation to the external cloud hosting solution. It has been seen that
the ethical code of conduct should be deprived in the curriculum of the Aztec organization to
improve the financial services by managing good and clear relationship with the banking
sector. The legislations which are used for providing financial insurance services to the Aztec
organization are categorised as consumer and competition act 2010, law implied for
Australian consumers, act passed for corporation 2001, amendment act 2012 for corporations,
financial act 2006 passed for counter terrorism and anti-money laundering schemes, and
protection act 2010 passed for national consumer. The operational policies of the Aztec
organization should focuses on deploying insurance service architecture. The budget of the
enterprise can be reduced by managing resources availability according to the demand of the
user. The InfoSec security model is used for securing the traditional processes and application
of the Aztec organization. Now it is recommended that with the changing digital technology,
the company has to transform their working to the cloud environment. The adoption of cloud
computing environment helps in dealing with network management, deployment of the
operating system and the databases, inclusion of resource scheduling plan, management of
the transactional processing, management of the concurrency control, and planning of
memory management. The management of risks is the basic criteria for managing the cloud
computing activities. The analysis of the security should be done with the help of qualitative
and quantitative research methodology. The migration towards the adoption of cloud is
equipped with some major threats which are classified as insecurity associated with the
application programming interfaces, inclusion of malicious and virus attacks, vulnerabilities
associated with the shared technologies, data leakages, hijacking of user account, and
inclusion of risk profile. The Aztec organization is recommended to consider some of the
major potential risks which are assimilated with the inclusion of cloud architecture in the
working curriculum of the enterprise.
1
The Aztec organization wants to transform their working tactics with new and advanced
features which helps in enhancing their turnover of the company. We as a project consultant
recommended the Aztec organization to change their business functionality with the
migration of business operation to the external cloud hosting solution. It has been seen that
the ethical code of conduct should be deprived in the curriculum of the Aztec organization to
improve the financial services by managing good and clear relationship with the banking
sector. The legislations which are used for providing financial insurance services to the Aztec
organization are categorised as consumer and competition act 2010, law implied for
Australian consumers, act passed for corporation 2001, amendment act 2012 for corporations,
financial act 2006 passed for counter terrorism and anti-money laundering schemes, and
protection act 2010 passed for national consumer. The operational policies of the Aztec
organization should focuses on deploying insurance service architecture. The budget of the
enterprise can be reduced by managing resources availability according to the demand of the
user. The InfoSec security model is used for securing the traditional processes and application
of the Aztec organization. Now it is recommended that with the changing digital technology,
the company has to transform their working to the cloud environment. The adoption of cloud
computing environment helps in dealing with network management, deployment of the
operating system and the databases, inclusion of resource scheduling plan, management of
the transactional processing, management of the concurrency control, and planning of
memory management. The management of risks is the basic criteria for managing the cloud
computing activities. The analysis of the security should be done with the help of qualitative
and quantitative research methodology. The migration towards the adoption of cloud is
equipped with some major threats which are classified as insecurity associated with the
application programming interfaces, inclusion of malicious and virus attacks, vulnerabilities
associated with the shared technologies, data leakages, hijacking of user account, and
inclusion of risk profile. The Aztec organization is recommended to consider some of the
major potential risks which are assimilated with the inclusion of cloud architecture in the
working curriculum of the enterprise.
1
Contents
Executive summary:..............................................................................................................................1
Introduction:..........................................................................................................................................3
Financial Services Review:....................................................................................................................3
Security posture Review:.......................................................................................................................5
Threats vulnerabilities and consequences assessment:..........................................................................9
Risks identification and assessment matrix:....................................................................................10
Data security:.......................................................................................................................................15
Recommendation:................................................................................................................................17
Conclusion:..........................................................................................................................................19
References:..........................................................................................................................................19
2
Executive summary:..............................................................................................................................1
Introduction:..........................................................................................................................................3
Financial Services Review:....................................................................................................................3
Security posture Review:.......................................................................................................................5
Threats vulnerabilities and consequences assessment:..........................................................................9
Risks identification and assessment matrix:....................................................................................10
Data security:.......................................................................................................................................15
Recommendation:................................................................................................................................17
Conclusion:..........................................................................................................................................19
References:..........................................................................................................................................19
2
Introduction:
The Aztec organization wants to transform their working tactics with new and advanced
features which helps in enhancing their turnover of the company. The senior executives of the
enterprise has decided to transform their working curriculum with the deployment of any one
of the recent technology into their enterprise such s bring your own device, migration to
cloud computing, changing techniques with IPv6, and other. We as a project consultant
recommended the Aztec organization to change their business functionality with the
migration of business operation to the external cloud hosting solution.
The changing of the traditional working style with the new innovative concepts is complied
with many risks and challenges. The adoption of cloud computing platform increases the
risks associated with the traditional physical infrastructure (Hogmen, 2012). The renovation
of the existing devices can be easily done with the inclusion of cloud environment with
minimum cost.
Financial Services Review:
The follow up of the standard are used for data security to manage the financial security
procedures. The analysis of the financial data is measured in terms of government norms. It
has been seen that the ethical code of conduct should be deprived in the curriculum of the
Aztec organization to improve the financial services by managing good and clear relationship
with the banking sector. The customers are provided with the unique banking codes for
carrying out effective transaction. The planning of the financial services helps in developing
cost effective plan (Chauhan, 2014). The operational policies of the Aztec organization
should focuses on deploying insurance service architecture. The budget of the enterprise can
be reduced by managing resources availability according to the demand of the user. The
capability of the financial sector can be improved with the deployment of cloud software as a
service model for effectively managing functions with suppliers, dealers, and customers, and
etc. (Dhammeratchi, 2012). The electronic trading services are used for managing the
financial services of the Aztec enterprise. The legislation plays an important role in
captivating insurance services provided to the financial department with regard to safety,
security, integrity, and reliability of the financial processes. It is significantly important for
managing rules and regulations associated with the implication of financial market. The
legislations which are used for providing financial insurance services to the Aztec
3
The Aztec organization wants to transform their working tactics with new and advanced
features which helps in enhancing their turnover of the company. The senior executives of the
enterprise has decided to transform their working curriculum with the deployment of any one
of the recent technology into their enterprise such s bring your own device, migration to
cloud computing, changing techniques with IPv6, and other. We as a project consultant
recommended the Aztec organization to change their business functionality with the
migration of business operation to the external cloud hosting solution.
The changing of the traditional working style with the new innovative concepts is complied
with many risks and challenges. The adoption of cloud computing platform increases the
risks associated with the traditional physical infrastructure (Hogmen, 2012). The renovation
of the existing devices can be easily done with the inclusion of cloud environment with
minimum cost.
Financial Services Review:
The follow up of the standard are used for data security to manage the financial security
procedures. The analysis of the financial data is measured in terms of government norms. It
has been seen that the ethical code of conduct should be deprived in the curriculum of the
Aztec organization to improve the financial services by managing good and clear relationship
with the banking sector. The customers are provided with the unique banking codes for
carrying out effective transaction. The planning of the financial services helps in developing
cost effective plan (Chauhan, 2014). The operational policies of the Aztec organization
should focuses on deploying insurance service architecture. The budget of the enterprise can
be reduced by managing resources availability according to the demand of the user. The
capability of the financial sector can be improved with the deployment of cloud software as a
service model for effectively managing functions with suppliers, dealers, and customers, and
etc. (Dhammeratchi, 2012). The electronic trading services are used for managing the
financial services of the Aztec enterprise. The legislation plays an important role in
captivating insurance services provided to the financial department with regard to safety,
security, integrity, and reliability of the financial processes. It is significantly important for
managing rules and regulations associated with the implication of financial market. The
legislations which are used for providing financial insurance services to the Aztec
3
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
organization are categorised as consumer and competition act 2010, law implied for
Australian consumers, act passed for corporation 2001, amendment act 2012 for corporations,
financial act 2006 passed for counter terrorism and anti-money laundering schemes, and
protection act 2010 passed for national consumer. The key legislation which are used for
providing efficient financial services for taking authorised decision for business activity, for
providing general legislation, legislation used for superannuation policies and standards, and
society life insurance. The licence and permits are used for providing insurance to the
financial services in the discipline of general ledger, provision developed for providing credit
schemes, services related with deposits and custody, and products affiliated to the financial
sector of the Aztec organization. The enterprise is moving towards the new and advanced
technology for enhancing the advice related to the financial productivity. The financial
products can be efficiently taken under consideration with the implication of legislation law
in using cloud environment. The market policies of the underlying product changed with the
cloud technology for increasing the market ability of the enterprise. It helps in remaining
ahead of the competitors in the financial sector by reducing the cost incurred on the resources
and other operational functions. The skills of the working employees can be enhanced with
the effective management of training and development program for fulfilling the requirement
of global demand due to the changing trends of new technology. The owner of the company
is working on reducing financial risks associated with the deployment of cloud environment
in the traditional working of the company. The financial risks can be reduced by the
following procedures:
Implication of Goods and service tax: The good and service tax associated with the
productivity should be taken under consideration for achieving the accuracy in the
optimization of the product. The GST credits can be claimed by the Aztec
organization in the later cases.
Policies related with reinsurance pool corporation: These policies help in
administrating and monitoring of the cyber-terrorism activities which focuses on
providing facilities to the primary insurers for resolving the issues related with the
insurance policies implied on commercial properties harmed by the cyber-terrorism.
The insurance packages used for providing supports to the practitioners of medical
market for achieving sustainability of the enterprise. The policies should be developed
for financial claims because the decision making capability of the owner can be
enhanced by focusing on the potential losses associated with failure of the business
4
Australian consumers, act passed for corporation 2001, amendment act 2012 for corporations,
financial act 2006 passed for counter terrorism and anti-money laundering schemes, and
protection act 2010 passed for national consumer. The key legislation which are used for
providing efficient financial services for taking authorised decision for business activity, for
providing general legislation, legislation used for superannuation policies and standards, and
society life insurance. The licence and permits are used for providing insurance to the
financial services in the discipline of general ledger, provision developed for providing credit
schemes, services related with deposits and custody, and products affiliated to the financial
sector of the Aztec organization. The enterprise is moving towards the new and advanced
technology for enhancing the advice related to the financial productivity. The financial
products can be efficiently taken under consideration with the implication of legislation law
in using cloud environment. The market policies of the underlying product changed with the
cloud technology for increasing the market ability of the enterprise. It helps in remaining
ahead of the competitors in the financial sector by reducing the cost incurred on the resources
and other operational functions. The skills of the working employees can be enhanced with
the effective management of training and development program for fulfilling the requirement
of global demand due to the changing trends of new technology. The owner of the company
is working on reducing financial risks associated with the deployment of cloud environment
in the traditional working of the company. The financial risks can be reduced by the
following procedures:
Implication of Goods and service tax: The good and service tax associated with the
productivity should be taken under consideration for achieving the accuracy in the
optimization of the product. The GST credits can be claimed by the Aztec
organization in the later cases.
Policies related with reinsurance pool corporation: These policies help in
administrating and monitoring of the cyber-terrorism activities which focuses on
providing facilities to the primary insurers for resolving the issues related with the
insurance policies implied on commercial properties harmed by the cyber-terrorism.
The insurance packages used for providing supports to the practitioners of medical
market for achieving sustainability of the enterprise. The policies should be developed
for financial claims because the decision making capability of the owner can be
enhanced by focusing on the potential losses associated with failure of the business
4
operations. The funding activities associated with enterprise helps in levying the
charges associated with financial activities.
The capability of the financial services helps in improving the productivity of the
organization which creates the environment of innovation by providing open platform for
exchanging of vision, thoughts, and business advice. The skills and knowledge of the
employees should be improved according to the requirement of management policies for
cloud environment. The business strategies should be focused on the health and safety
requirement for improving the working standards of the employees. The transformation of
traditional working structure with the cloud computing infrastructure can affect the legal
compliance with government policies. The working employees should be provided with the
standard equipment. The insurance is required for providing general liability to provide
financial services to the employees at the time of personal injuries. The superannuation
liability helps in developing laws for overcoming the breaches. The financial insurance
policies are used for providing financial covers for theft, resource utilization, and others. The
operational policies of the Aztec organization should focuses on deploying insurance service
architecture. The budget of the enterprise can be reduced by managing resources availability
according to the demand of the user.
Security posture Review:
It has been seen that the traditional working of the enterprise have older version devices
which are placed with the help of wires and cables. USB and CD drives are used for storing
the data of the organization. The IT department is working on legacy system with the
incorporation of adequate security policies. The InfoSec security model is used for securing
the traditional processes and application of the Aztec organization. Now it is recommended
that with the changing digital technology, the company has to transform their working to the
cloud environment. The cloud environment is capable of resolving all the issues of the
company which exist with the continuation of the business application. The renovation of the
existing devices can be easily done with the inclusion of cloud environment with minimum
cost. The data storage capability of the organization can be improved with the management of
data on the cloud using Hadoop file system. The Hadoop file system can efficiently maintains
the big data of the enterprise for easy retrieval of information. The most important step is to
develop a security architecture for the Aztec organization to overcome the problem of risks
and challenges. The services provided to the end user can be made secure by organizing a
5
charges associated with financial activities.
The capability of the financial services helps in improving the productivity of the
organization which creates the environment of innovation by providing open platform for
exchanging of vision, thoughts, and business advice. The skills and knowledge of the
employees should be improved according to the requirement of management policies for
cloud environment. The business strategies should be focused on the health and safety
requirement for improving the working standards of the employees. The transformation of
traditional working structure with the cloud computing infrastructure can affect the legal
compliance with government policies. The working employees should be provided with the
standard equipment. The insurance is required for providing general liability to provide
financial services to the employees at the time of personal injuries. The superannuation
liability helps in developing laws for overcoming the breaches. The financial insurance
policies are used for providing financial covers for theft, resource utilization, and others. The
operational policies of the Aztec organization should focuses on deploying insurance service
architecture. The budget of the enterprise can be reduced by managing resources availability
according to the demand of the user.
Security posture Review:
It has been seen that the traditional working of the enterprise have older version devices
which are placed with the help of wires and cables. USB and CD drives are used for storing
the data of the organization. The IT department is working on legacy system with the
incorporation of adequate security policies. The InfoSec security model is used for securing
the traditional processes and application of the Aztec organization. Now it is recommended
that with the changing digital technology, the company has to transform their working to the
cloud environment. The cloud environment is capable of resolving all the issues of the
company which exist with the continuation of the business application. The renovation of the
existing devices can be easily done with the inclusion of cloud environment with minimum
cost. The data storage capability of the organization can be improved with the management of
data on the cloud using Hadoop file system. The Hadoop file system can efficiently maintains
the big data of the enterprise for easy retrieval of information. The most important step is to
develop a security architecture for the Aztec organization to overcome the problem of risks
and challenges. The services provided to the end user can be made secure by organizing a
5
token system. The implementation of the virtual private network helps in managing services
of the cloud environment. The framework of the security model depends on the
implementation of the following components:
Accumulation of client
Secured portal provided to the end user
Sign on single level security
Configuration of the service management
Gateways used for providing secured services
Controlling procedure for security model
Security management policies and standard
Monitoring of cloud services
Trust management
The following diagram shows the proposed security framework for the Aztec organization
6
of the cloud environment. The framework of the security model depends on the
implementation of the following components:
Accumulation of client
Secured portal provided to the end user
Sign on single level security
Configuration of the service management
Gateways used for providing secured services
Controlling procedure for security model
Security management policies and standard
Monitoring of cloud services
Trust management
The following diagram shows the proposed security framework for the Aztec organization
6
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
The adoption of cloud computing environment helps in dealing with network management,
deployment of the operating system and the databases, inclusion of resource scheduling plan,
management of the transactional processing, management of the concurrency control, and
planning of memory management. The changing of the traditional working style with the new
innovative concepts is complied with many risks and challenges which are categorised as
security to the infrastructure, performance of the business activities, data availability on
demand, difficulty in the integration of in-house activities, customization support is not
applicable, more cost incurred than demand, difficulty in managing back up data which can
create a big scenario of complexity at the time of system failure, and others. The following
graph shows the statistical representation of risks and challenges associated with the
transformation of traditional working system with the cloud computing working system.
The impact of changing the traditional working with the cloud computing for carrying over
business activities are comprised of following security concern which are describe below:
Security concern 1: It has been reviewed that the implementation of cloud computing
model raises the security concern for physical security associate with the data and
information because the technology of cloud computing involves the sharing of
resources between different participating units.
Security concern 2:The violation of government laws can take place
Security concern 3:Incompatibility of the suppliers with the new technology
7
deployment of the operating system and the databases, inclusion of resource scheduling plan,
management of the transactional processing, management of the concurrency control, and
planning of memory management. The changing of the traditional working style with the new
innovative concepts is complied with many risks and challenges which are categorised as
security to the infrastructure, performance of the business activities, data availability on
demand, difficulty in the integration of in-house activities, customization support is not
applicable, more cost incurred than demand, difficulty in managing back up data which can
create a big scenario of complexity at the time of system failure, and others. The following
graph shows the statistical representation of risks and challenges associated with the
transformation of traditional working system with the cloud computing working system.
The impact of changing the traditional working with the cloud computing for carrying over
business activities are comprised of following security concern which are describe below:
Security concern 1: It has been reviewed that the implementation of cloud computing
model raises the security concern for physical security associate with the data and
information because the technology of cloud computing involves the sharing of
resources between different participating units.
Security concern 2:The violation of government laws can take place
Security concern 3:Incompatibility of the suppliers with the new technology
7
Security concern 4: Focus should be given on the authorised person who is
responsible for performing the action of encryption and decryption associated with the
working capabilities of the organization (Zhao, 2015).
Security concern 5: The methodology responsible for performing actions related with
data integrity, data transfer, data retrieval, and data storage. The authorised
transaction should be ensured for managing the integrity of the data.
Security concern 6: The follow up of the standard used for data security to manage the
financial security procedures (Greenwood, 2014).
Security concern 7: The updated information should be provided for upgrading the
traditional applications according requirement of cloud computing environment.
Security concern 8: The analysis of the financial data to be measured in terms of
government norms.
Security concern 9: The fluidity of the virtual machine should be taken into
consideration for maintaining the security consistency (Garg, 2013).
Security concern 10: The violation of the private rights should be taken under
consideration for managing the services provided by the cloud.
The management of risks is the basic criteria for managing the cloud computing activities.
The analysis of the security should be done with the help of qualitative and quantitative
research methodology. The research methodology was designed to analyse the risks
associated with the migration to cloud computing environment.
Questionnaire: The arrangement of questionnaire with the top executives of the
enterprise helps in generating ideas, opinions, thoughts, and vision in adopting new
technology for increasing the efficiency of the business operation. We analysed that
the top executives are satisfied with the services provided by the cloud computing
environment than the traditional way of working. The questions are organized to
analyse the benefits of cloud computing environment and the security concern
associated with the migration of traditional platform.
Data collection techniques: The data are collected from different sources to evaluate
the measurement of strategic decision to transform their working tactics. It has been
analysed that the cloud computing environment play a vital role in overcoming the
flaws of the traditional system.
8
responsible for performing the action of encryption and decryption associated with the
working capabilities of the organization (Zhao, 2015).
Security concern 5: The methodology responsible for performing actions related with
data integrity, data transfer, data retrieval, and data storage. The authorised
transaction should be ensured for managing the integrity of the data.
Security concern 6: The follow up of the standard used for data security to manage the
financial security procedures (Greenwood, 2014).
Security concern 7: The updated information should be provided for upgrading the
traditional applications according requirement of cloud computing environment.
Security concern 8: The analysis of the financial data to be measured in terms of
government norms.
Security concern 9: The fluidity of the virtual machine should be taken into
consideration for maintaining the security consistency (Garg, 2013).
Security concern 10: The violation of the private rights should be taken under
consideration for managing the services provided by the cloud.
The management of risks is the basic criteria for managing the cloud computing activities.
The analysis of the security should be done with the help of qualitative and quantitative
research methodology. The research methodology was designed to analyse the risks
associated with the migration to cloud computing environment.
Questionnaire: The arrangement of questionnaire with the top executives of the
enterprise helps in generating ideas, opinions, thoughts, and vision in adopting new
technology for increasing the efficiency of the business operation. We analysed that
the top executives are satisfied with the services provided by the cloud computing
environment than the traditional way of working. The questions are organized to
analyse the benefits of cloud computing environment and the security concern
associated with the migration of traditional platform.
Data collection techniques: The data are collected from different sources to evaluate
the measurement of strategic decision to transform their working tactics. It has been
analysed that the cloud computing environment play a vital role in overcoming the
flaws of the traditional system.
8
Literature review: The documentation of the organization which are enrolling on the
principles of cloud computing should be reviewed to analyse the actual situation and
benefits and risks associated with this working platform.
Threats vulnerabilities and consequences assessment:
The migration process is equipped with threats and vulnerabilities because the
implementation of the new architecture involves the change management program of the
traditional working architecture (Samad, 2014). The migration towards the adoption of cloud
is equipped with some major threats which are classified as insecurity associated with the
application programming interfaces, inclusion of malicious and virus attacks, vulnerabilities
associated with the shared technologies, data leakages, hijacking of user account, and
inclusion of risk profile. The Aztec organization is recommended to consider some of the
major potential risks which are assimilated with the inclusion of cloud architecture in the
working curriculum of the enterprise.
The implementation of the interoperable operation issues related with the deployment
of the communication network between participating units. The compatibility of
managing the cloud devices is the major concern area in the deployment of cloud
architecture.
It is difficult to port all the application on the cloud environment. The portability of
the application should be taken into consideration (Bhopale, 2013).
Migration to the cloud environment involves changes in the new environment
required the setting of goal, funding sources, required skilled staff, and others.
The financial management of required resources involves the estimation of cost
required to purchase resources. The failure of estimation can affect the budget of the
organization.
Organization of service level agreement involves clear specification of goals, mission,
and services provided by the cloud providers. It helps in specifying the distribution of
roles and responsibilities between the customers and stakeholders. It is difficult to
prepare the metric for the deliverables of the project in the initial phases of the
migration of activities to the cloud environment. The failure of service level
agreement can affect the working operation of the enterprise.
9
principles of cloud computing should be reviewed to analyse the actual situation and
benefits and risks associated with this working platform.
Threats vulnerabilities and consequences assessment:
The migration process is equipped with threats and vulnerabilities because the
implementation of the new architecture involves the change management program of the
traditional working architecture (Samad, 2014). The migration towards the adoption of cloud
is equipped with some major threats which are classified as insecurity associated with the
application programming interfaces, inclusion of malicious and virus attacks, vulnerabilities
associated with the shared technologies, data leakages, hijacking of user account, and
inclusion of risk profile. The Aztec organization is recommended to consider some of the
major potential risks which are assimilated with the inclusion of cloud architecture in the
working curriculum of the enterprise.
The implementation of the interoperable operation issues related with the deployment
of the communication network between participating units. The compatibility of
managing the cloud devices is the major concern area in the deployment of cloud
architecture.
It is difficult to port all the application on the cloud environment. The portability of
the application should be taken into consideration (Bhopale, 2013).
Migration to the cloud environment involves changes in the new environment
required the setting of goal, funding sources, required skilled staff, and others.
The financial management of required resources involves the estimation of cost
required to purchase resources. The failure of estimation can affect the budget of the
organization.
Organization of service level agreement involves clear specification of goals, mission,
and services provided by the cloud providers. It helps in specifying the distribution of
roles and responsibilities between the customers and stakeholders. It is difficult to
prepare the metric for the deliverables of the project in the initial phases of the
migration of activities to the cloud environment. The failure of service level
agreement can affect the working operation of the enterprise.
9
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
The encryption and decryption of files can affect the confidentiality of the information
stored on the third party cloud environment.
Failure of managing backups can result into the development of big complex scenario
at the time of network failure.
The expectation of high skilled employees can be failure in determining right person
for the right job. It leads to inefficiency in the completion of business activities.
It is difficult in tracking of the potential risks associated with the projects because the
migration to the cloud environment changes the risks associated with the project.
Threats associated with the migration of business activities to the platform of cloud
computing architecture
It is difficult to estimate the cost associated with the flow of data transfer.
It is not guaranteed that the services level agreement determinants will be completely
fulfilled or not (Kushwah, 2013).
Risks identification and assessment matrix:
Identification of risks Categorise of attack Explanation Consequences
Theft of data
associated with cloud
services
The unauthenticated
person can access the
data from the internet
Physical security of
the cloud
infrastructure get
affected
Inclusion of DOS
attack
Distributed The supply and
demand of the
resources is not met
Adverse impact on
cloud network
Hypertext Scheduling the
history of resources
used
XML XML signatures are
used getting
unauthorised
accessing of data
from the cloud
etwork
Attack of viruses and
malware
Leaking of
confidential
The infrastructure of
the cloud is get
10
stored on the third party cloud environment.
Failure of managing backups can result into the development of big complex scenario
at the time of network failure.
The expectation of high skilled employees can be failure in determining right person
for the right job. It leads to inefficiency in the completion of business activities.
It is difficult in tracking of the potential risks associated with the projects because the
migration to the cloud environment changes the risks associated with the project.
Threats associated with the migration of business activities to the platform of cloud
computing architecture
It is difficult to estimate the cost associated with the flow of data transfer.
It is not guaranteed that the services level agreement determinants will be completely
fulfilled or not (Kushwah, 2013).
Risks identification and assessment matrix:
Identification of risks Categorise of attack Explanation Consequences
Theft of data
associated with cloud
services
The unauthenticated
person can access the
data from the internet
Physical security of
the cloud
infrastructure get
affected
Inclusion of DOS
attack
Distributed The supply and
demand of the
resources is not met
Adverse impact on
cloud network
Hypertext Scheduling the
history of resources
used
XML XML signatures are
used getting
unauthorised
accessing of data
from the cloud
etwork
Attack of viruses and
malware
Leaking of
confidential
The infrastructure of
the cloud is get
10
information of the
user login
Data leakages
The change in
behaviour of the
cloud services
affected
The implementation
of the virtual system
Time Data loss Cloud physical
infrastructureEnergy consumption Resources used
Process of memory
sharing
Resources are leaked
on the external
environment
Cloud physical
infrastructure
User credentials are
leaked
Direct attack of
malware and viruses
Adverse effect of
phishing process
Accessing of user
credentials
Cloud network and
cloud physical
infrastructureInstallation of the
malicious codes and
viruses
Change in the
behaviour of cloud
services
Unavailability of the
information to the
requested client
Installation of the
botnets
Unauthorised
accessing of the
cloud resource from
the external parties
Cloud network and
cloud physical
infrastructure
11
user login
Data leakages
The change in
behaviour of the
cloud services
affected
The implementation
of the virtual system
Time Data loss Cloud physical
infrastructureEnergy consumption Resources used
Process of memory
sharing
Resources are leaked
on the external
environment
Cloud physical
infrastructure
User credentials are
leaked
Direct attack of
malware and viruses
Adverse effect of
phishing process
Accessing of user
credentials
Cloud network and
cloud physical
infrastructureInstallation of the
malicious codes and
viruses
Change in the
behaviour of cloud
services
Unavailability of the
information to the
requested client
Installation of the
botnets
Unauthorised
accessing of the
cloud resource from
the external parties
Cloud network and
cloud physical
infrastructure
11
Changing behaviour
of the cloud services
Hacking of
confidential and
private data
Stenography Attack Unavailability of data
storage
Unauthorised
accessing of the
cloud resource from
the external parties
(Marston, 2011)
Changing behaviour
of the cloud services
The information
stored on the user
account get deleted
Data loss
Virtual System
Rollback
Inclusion of brute
force attack
Unauthorised
accessing of the
cloud resource from
the external parties
Cloud network and
cloud physical
infrastructure
Changes in security
policies
The risks associated
with the transfer of
security policies
associated with the
traditional
infrastructure
Interface used for
developing cloud
applications
Accessing of services
on demand
The resources are not
available for use at
the time of demand
placed
Inefficiency in the
planning processes
Technical risks The technical risks
are not available for
use at the time of
The technical risks
associated with the
free flow sharing of
12
of the cloud services
Hacking of
confidential and
private data
Stenography Attack Unavailability of data
storage
Unauthorised
accessing of the
cloud resource from
the external parties
(Marston, 2011)
Changing behaviour
of the cloud services
The information
stored on the user
account get deleted
Data loss
Virtual System
Rollback
Inclusion of brute
force attack
Unauthorised
accessing of the
cloud resource from
the external parties
Cloud network and
cloud physical
infrastructure
Changes in security
policies
The risks associated
with the transfer of
security policies
associated with the
traditional
infrastructure
Interface used for
developing cloud
applications
Accessing of services
on demand
The resources are not
available for use at
the time of demand
placed
Inefficiency in the
planning processes
Technical risks The technical risks
are not available for
use at the time of
The technical risks
associated with the
free flow sharing of
12
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
demand placed resources
Techniques used for
interpreting the data
Data interpretation
for decrypting the
associated data
Resource scalability
Distributed denial of
service attack
Inefficiency in
providing cloud
services
Physical
infrastructure of the
cloud
Risks associated with
the legal process
The transformation
of traditional
working structure
with the cloud
computing
infrastructure can
affect the legal
compliance with
government policies
Physical
infrastructure of the
cloud
Inefficiency of the
planning process
The transformation
of traditional
working structure
with the cloud
computing
infrastructure can
affect the legal
compliance with
government policies
(Kaisler, 2012)
Physical
infrastructure of the
cloud
Government security
policies are not
properly managed
The consideration is
not given to the
government policies
may result into
inefficiency in
government
compliance
Providers of the
cloud services
13
Techniques used for
interpreting the data
Data interpretation
for decrypting the
associated data
Resource scalability
Distributed denial of
service attack
Inefficiency in
providing cloud
services
Physical
infrastructure of the
cloud
Risks associated with
the legal process
The transformation
of traditional
working structure
with the cloud
computing
infrastructure can
affect the legal
compliance with
government policies
Physical
infrastructure of the
cloud
Inefficiency of the
planning process
The transformation
of traditional
working structure
with the cloud
computing
infrastructure can
affect the legal
compliance with
government policies
(Kaisler, 2012)
Physical
infrastructure of the
cloud
Government security
policies are not
properly managed
The consideration is
not given to the
government policies
may result into
inefficiency in
government
compliance
Providers of the
cloud services
13
Risks associated with
the lock in platforms
Data leakages due to
the sharing of
information
(Jayachandran, 2013)
Confidentiality,
accuracy, and
integrity of the
information get lost
No isolation in the
multi-tenancy
platform
Mismanagement in
the isolation of multi-
tenancy platform
Cloud network
Data protection and
security
Data leakages due to
the sharing of
information
Confidentiality,
accuracy, and
integrity of the
information get lost
Internet connectivity
portfolio
Inefficiency in
managing many
devices on the same
cloud
Failure f connectivity
Estimating
occurrence of risks
It is difficult in
estimating the risks
before its occurrence
Cloud services are
unavailable
Inadequacy in
controlling of cloud
services
Cloud services
Inadequacy in the
management of
internal risks security
program
Inadequacy in the
internal processing
Inefficiency in the
authentication
protocols
Inefficiency in
controlling internal
processing
Internal cloud
infrastructure
Inadequacy in the
management of
External risks
security program
Inadequacy in the
external processing
Inefficiency in the
authentication
protocols
Inefficiency in
controlling external
processing
External cloud
infrastructure
14
the lock in platforms
Data leakages due to
the sharing of
information
(Jayachandran, 2013)
Confidentiality,
accuracy, and
integrity of the
information get lost
No isolation in the
multi-tenancy
platform
Mismanagement in
the isolation of multi-
tenancy platform
Cloud network
Data protection and
security
Data leakages due to
the sharing of
information
Confidentiality,
accuracy, and
integrity of the
information get lost
Internet connectivity
portfolio
Inefficiency in
managing many
devices on the same
cloud
Failure f connectivity
Estimating
occurrence of risks
It is difficult in
estimating the risks
before its occurrence
Cloud services are
unavailable
Inadequacy in
controlling of cloud
services
Cloud services
Inadequacy in the
management of
internal risks security
program
Inadequacy in the
internal processing
Inefficiency in the
authentication
protocols
Inefficiency in
controlling internal
processing
Internal cloud
infrastructure
Inadequacy in the
management of
External risks
security program
Inadequacy in the
external processing
Inefficiency in the
authentication
protocols
Inefficiency in
controlling external
processing
External cloud
infrastructure
14
Threats associated
with the differential
analysis
The arrival of the
new threats can
deform the security
code of the
traditional
environment
Repudiation attack It can affect the
validity of the
messages send by the
sender
Man in the middle
attack
It can affect the
communication
channel placed
between the
participating units.
Data security:
It has been seen that availability and reliability of the application can be increased with the
deployment of the application on the cloud. It is difficult to manage the availability of the
resources according to the rising demand of the different applications. The security and
privacy are the two major issues associated with the cloud computing environment due to the
open sharing of the resources and the information. It has been seen that the third party is
capable of performing critical operations. The data lock in problem associated with the
deployment of activities on the cloud platform. The government compliance procedures
should be used for managing the integrity of the legal document. It has been reviewed that the
implementation of cloud computing model raises the security concern for physical security
associate with the data and information because the technology of cloud computing involves
the sharing of resources between different participating units. The contractor should focus on
achieving all the activities and requirement mentioned in the service level agreement. The
traditional architecture should be integrated with the new system for managing component
level services deployed by the cloud supporting applications. The strategic decision should be
taken for managing the availability of the resources approved by the vendor (Murray, 2013).
15
with the differential
analysis
The arrival of the
new threats can
deform the security
code of the
traditional
environment
Repudiation attack It can affect the
validity of the
messages send by the
sender
Man in the middle
attack
It can affect the
communication
channel placed
between the
participating units.
Data security:
It has been seen that availability and reliability of the application can be increased with the
deployment of the application on the cloud. It is difficult to manage the availability of the
resources according to the rising demand of the different applications. The security and
privacy are the two major issues associated with the cloud computing environment due to the
open sharing of the resources and the information. It has been seen that the third party is
capable of performing critical operations. The data lock in problem associated with the
deployment of activities on the cloud platform. The government compliance procedures
should be used for managing the integrity of the legal document. It has been reviewed that the
implementation of cloud computing model raises the security concern for physical security
associate with the data and information because the technology of cloud computing involves
the sharing of resources between different participating units. The contractor should focus on
achieving all the activities and requirement mentioned in the service level agreement. The
traditional architecture should be integrated with the new system for managing component
level services deployed by the cloud supporting applications. The strategic decision should be
taken for managing the availability of the resources approved by the vendor (Murray, 2013).
15
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
The private cloud environment is used for deploying the business activities of the Aztec
enterprise. The inclusion of processes is used for providing privacy and security to the data. It
is comprised of four phases which are categorised as pre-virtualization, virtualization,
standardization, and automation phase. The pre-virtualization phase is used for developing
strategies to increase the efficiency for the effective utilization of the resources. The phase of
virtualization is working on managing virtual machine pool on the server. The public key
infrastructure is used for managing cryptographic procedures for securing the confidentiality,
integrity, and accuracy of the information. The optimization of the resources can helps in
developing the cost effective techniques for the enterprise. The availability of the cloud
environment helps in developing the resilience network to simplify the operational activities
to enhance the cloud infrastructure. The phase of standardization is used for leveraging the
diversification of information and application which are deployed on the cloud environment.
The phase of automation is used for providing resources to the end user on their demand
which helps in improving the working capability of business activities. The following
diagram shows the implementation of the four processes to deploy the private cloud
environment:
The traditional platform of security infrastructure deployed in the Aztec enterprise required to
enhance security the following areas which are classified as:
16
enterprise. The inclusion of processes is used for providing privacy and security to the data. It
is comprised of four phases which are categorised as pre-virtualization, virtualization,
standardization, and automation phase. The pre-virtualization phase is used for developing
strategies to increase the efficiency for the effective utilization of the resources. The phase of
virtualization is working on managing virtual machine pool on the server. The public key
infrastructure is used for managing cryptographic procedures for securing the confidentiality,
integrity, and accuracy of the information. The optimization of the resources can helps in
developing the cost effective techniques for the enterprise. The availability of the cloud
environment helps in developing the resilience network to simplify the operational activities
to enhance the cloud infrastructure. The phase of standardization is used for leveraging the
diversification of information and application which are deployed on the cloud environment.
The phase of automation is used for providing resources to the end user on their demand
which helps in improving the working capability of business activities. The following
diagram shows the implementation of the four processes to deploy the private cloud
environment:
The traditional platform of security infrastructure deployed in the Aztec enterprise required to
enhance security the following areas which are classified as:
16
Data storage security: The security architecture of the Aztec enterprise can be
enhanced with the use of verification code. The proposed security architecture helps
in providing security to the dynamic interchange of the data.
Validity to the user credential: The authentication and authorisation should be given
to the user by validating the credentials of the user by using the verification
procedures.
Interoperability: The security procedures should be used for managing the data loss
occurred due to the occurrence of interoperable operations between the participating
units.
Recommendation:
It is recommended that the Aztec organization should migrate their business processes to
cloud computing environment. It is required for the enterprise to develop risk quantification
for securing the project from the occurrence of project vulnerabilities. The security of the
Aztec organization depends upon resources security for the efficient working of the business
processes. The access control mechanism should be used for managing the procedures of
resources to be utilized in the effective manner. The provision should be used for deploying
the application on the cloud environment (Betcher, 2010). The governance compliance
procedures should be used for auditing the vulnerabilities and threats associated with the
deployment of procedures and activities. The verification and validation procedures are used
for testing the cloud activities which are performed on the cloud environment. It is required
for the organization to deploy the security architecture which is given below:
17
enhanced with the use of verification code. The proposed security architecture helps
in providing security to the dynamic interchange of the data.
Validity to the user credential: The authentication and authorisation should be given
to the user by validating the credentials of the user by using the verification
procedures.
Interoperability: The security procedures should be used for managing the data loss
occurred due to the occurrence of interoperable operations between the participating
units.
Recommendation:
It is recommended that the Aztec organization should migrate their business processes to
cloud computing environment. It is required for the enterprise to develop risk quantification
for securing the project from the occurrence of project vulnerabilities. The security of the
Aztec organization depends upon resources security for the efficient working of the business
processes. The access control mechanism should be used for managing the procedures of
resources to be utilized in the effective manner. The provision should be used for deploying
the application on the cloud environment (Betcher, 2010). The governance compliance
procedures should be used for auditing the vulnerabilities and threats associated with the
deployment of procedures and activities. The verification and validation procedures are used
for testing the cloud activities which are performed on the cloud environment. It is required
for the organization to deploy the security architecture which is given below:
17
It is recommended for the Aztec organization to deploy the risks mitigation plan in the
working curriculum of the enterprise to improve the performance and enhance the business
operation. The security procedure plan should be deployed according to the requirement of
cloud computing environment. The risks mitigation plan is used for controlling the security
architecture of the enterprise (Murray, 2013). The functional unit of the business should be
verified and validated at each phase of the business plan. The two based authentication is the
recommended protocol which should be used for providing authentication for accessing of
the required information from the cloud. The public key infrastructure is used for managing
cryptographic procedures for securing the confidentiality, integrity, and accuracy of the
information. The processes are effectively managed with the help of auditing procedures and
authenticated policies (Oredo, 2014).
18
working curriculum of the enterprise to improve the performance and enhance the business
operation. The security procedure plan should be deployed according to the requirement of
cloud computing environment. The risks mitigation plan is used for controlling the security
architecture of the enterprise (Murray, 2013). The functional unit of the business should be
verified and validated at each phase of the business plan. The two based authentication is the
recommended protocol which should be used for providing authentication for accessing of
the required information from the cloud. The public key infrastructure is used for managing
cryptographic procedures for securing the confidentiality, integrity, and accuracy of the
information. The processes are effectively managed with the help of auditing procedures and
authenticated policies (Oredo, 2014).
18
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Conclusion:
It is concluded that the private cloud environment is used for deploying the business activities
of the Aztec enterprise. The adoption of cloud computing platform increases the risks
associated with the traditional physical infrastructure. The security of the Aztec organization
depends upon resources security for the efficient working of the business processes. The
access control mechanism should be used for managing the procedures of resources to be
utilized in the effective manner. The security procedures should be used for managing the
data loss occurred due to the occurrence of interoperable operations between the participating
units.
References:
Betcher, T. (2010). Cloud computing: IT related risks. Retrieved from
https://scholarsbank.uoregon.edu/xmlui/bitstream/handle/1794/10207/Betcher-
2010.pdf
Bhopale, S. (2013). Cloud Migration Benefits and its challenges issues. Retrieved from
http://www.iosrjournals.org/iosr-jce/papers/sicete-volume1/8.pdf
Samad, S. (2014). Mitigating risks in the cloud. Retrieved from
http://webobjects.cdw.com/webobjects/media/pdf/Solutions/Cloud-Computing/
151383-Mitigating-Risk-in-the-Cloud.pdf
Chauhan, M. (2014). Towards process support for migrating application to cloud computing.
Retrieved from https://pure.itu.dk/ws/files/78453849/PID2535147.pdf
Dhammeratchi, D. (2012). Reinventing business with cloud computing. Retrieved from
https://www-01.ibm.com/events/wwe/grp/grp033.nsf/vLookupPDFs/CWHK_Cloud_
User_Guide_IBM_May_2012/$file/
CWHK_Cloud_User_Guide_IBM_May_2012.pdf
Garg, A. (2013). Cloud computing for the financial services industry. Retrieved from
http://www.sapient.com/content/dam/sapient/sapientglobalmarkets/pdf/thought-
leadership/GM_Cloud_Computing.pdf
Greenwood, D. (2014). Cloud migration: A case study of migrating an enterprise IT system
to IAAS. Retrieved from http://www.aspiresys.com/WhitePapers/Cloud-Migration-
Methodology.pdf
19
It is concluded that the private cloud environment is used for deploying the business activities
of the Aztec enterprise. The adoption of cloud computing platform increases the risks
associated with the traditional physical infrastructure. The security of the Aztec organization
depends upon resources security for the efficient working of the business processes. The
access control mechanism should be used for managing the procedures of resources to be
utilized in the effective manner. The security procedures should be used for managing the
data loss occurred due to the occurrence of interoperable operations between the participating
units.
References:
Betcher, T. (2010). Cloud computing: IT related risks. Retrieved from
https://scholarsbank.uoregon.edu/xmlui/bitstream/handle/1794/10207/Betcher-
2010.pdf
Bhopale, S. (2013). Cloud Migration Benefits and its challenges issues. Retrieved from
http://www.iosrjournals.org/iosr-jce/papers/sicete-volume1/8.pdf
Samad, S. (2014). Mitigating risks in the cloud. Retrieved from
http://webobjects.cdw.com/webobjects/media/pdf/Solutions/Cloud-Computing/
151383-Mitigating-Risk-in-the-Cloud.pdf
Chauhan, M. (2014). Towards process support for migrating application to cloud computing.
Retrieved from https://pure.itu.dk/ws/files/78453849/PID2535147.pdf
Dhammeratchi, D. (2012). Reinventing business with cloud computing. Retrieved from
https://www-01.ibm.com/events/wwe/grp/grp033.nsf/vLookupPDFs/CWHK_Cloud_
User_Guide_IBM_May_2012/$file/
CWHK_Cloud_User_Guide_IBM_May_2012.pdf
Garg, A. (2013). Cloud computing for the financial services industry. Retrieved from
http://www.sapient.com/content/dam/sapient/sapientglobalmarkets/pdf/thought-
leadership/GM_Cloud_Computing.pdf
Greenwood, D. (2014). Cloud migration: A case study of migrating an enterprise IT system
to IAAS. Retrieved from http://www.aspiresys.com/WhitePapers/Cloud-Migration-
Methodology.pdf
19
1 out of 20
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.