logo

Cloud Services in Risk Assessment 2022

   

Added on  2022-10-18

5 Pages1151 Words26 Views
 | 
 | 
 | 
Running head: RISK ASSESSMENT IN CLOUD SERVICES
Risk Assessment in Cloud Services
Name of the Student:
Name of the University:
Author Note:
Cloud Services in Risk Assessment 2022_1

1RISK ASSESSMENT IN CLOUD SERVICES
2. Risk Assessment in implementation of the Cloud in VideoDev:
VideoDev Company has planned for the implementation of the Cloud services to the
company in order to expand their business. As we all know that Cloud Computing services are a
technology which is broadly accepted by the organizations all over the world. Implementation of
any new system in the business requires thorough analysis of possible risk due to that system
(Chatfield et al., 2017). The analysis of the risk helps in finding the solutions required to mitigate
them. The possible risk in implementation of Cloud services is described below.
Risk of unauthorized access in the system: The business databases are often stored in the
clouds in order to make them accessible and available for the authorities and the people in
charge. This makes the data vulnerable to the hackers who are seeking access to the system as
well. These hackers may not always be privateers; they can be hired by the government of the
country too. Hence the data is subjected to government intrusion as well.
Network dependency: Cloud Computing is totally dependent on the internet. Therefore
whenever the data is stored in the cloud it is totally dependent on the availability of the network.
Any sort of interruption in the internet can lead to failure in transaction or delayed actions which
are not healthy for the business.
Data Security and Integrity: Unauthorized access to the system can cause the data
integrity loss in the system. The data present in the in-house of the organization are not
considered to be safe now a days, hence it can be said that the data is not quite safe in the cloud
as well (Rittinghouse, & Ransome, 2017). The data present in the cloud are vulnerable to the
hackers who can intercept them and make modification to the data or may be removing the part
of the data. Hence, the data security is at stake. However, there is a huge improvement in the
Cloud Services in Risk Assessment 2022_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Understanding SQL Injection, Insider Attacks, and Malware Threats for Enhanced Cybersecurity
|7
|2711
|157

Securing the Enterprise Infrastructure Report 2022
|4
|772
|15

Network Security: Protecting the Integrity and Usability of Networking Services and Data
|25
|1420
|50

iT Security
|17
|5127
|60

Ensuring Data Security in Cloud Computing Environments
|9
|2109
|168

JP Morgan Case Study
|5
|508
|100