Detailed Analysis of Cloud Computing Aspects for Data Security
VerifiedAdded on 2022/09/28
|17
|4970
|49
Report
AI Summary
This report delves into the crucial aspects of cloud computing, particularly concerning data privacy and security within the context of the Australian Government's Department of Administrative Services (DAS). It examines the strategic approaches necessary for managing cloud services, emphasizing the protection of sensitive personal data. The report details a comprehensive privacy strategy, including upper management assurance, the appointment of a Data Protection Officer, and risk management frameworks. It also recommends specific privacy controls, such as data restriction, user license agreements, strong password policies, and encryption techniques. Furthermore, the report highlights the importance of data privacy policies, employee training, and compliance monitoring to ensure the secure and effective implementation of cloud computing methodologies within the DAS. These measures aim to safeguard data integrity and provide enhanced services to various government departments.

Running head: ASPECTS OF CLOUD COMPUTING
Aspects of Cloud Computing
Name of Student
Name of University
Author Note
Aspects of Cloud Computing
Name of Student
Name of University
Author Note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1ASPECTS OF CLOUD COMPUTING
Table of Contents
1.0. Introduction.............................................................................................................2
2.0 Privacy strategy for personal data............................................................................2
3.0 Recommended privacy controls...............................................................................6
4.0 Personal data protection strategy.............................................................................8
5.0 Recommended data protection controls.................................................................10
6.0. Conclusion.............................................................................................................12
7.0 References..............................................................................................................13
Table of Contents
1.0. Introduction.............................................................................................................2
2.0 Privacy strategy for personal data............................................................................2
3.0 Recommended privacy controls...............................................................................6
4.0 Personal data protection strategy.............................................................................8
5.0 Recommended data protection controls.................................................................10
6.0. Conclusion.............................................................................................................12
7.0 References..............................................................................................................13

2ASPECTS OF CLOUD COMPUTING
1.0. Introduction
The significant purpose of the report is to deal with the potential implication of the
cloud computing technology in respect to the overall aspects of the cloud computing
methodology that will significantly help the selected domain of the Australian Government.
The Department of the Administrative Services (DAS) are significantly related with the
overall services that enhances the other departments within the Government. The DAS is set
to implement the shared systems approach in respect to the implication of the cloud
computing methodology. The purpose of the report depends on the fact of the strategic
approaches that will be adhered in respect to the overall management of the cloud services
thus enhancing the services in respect to the related departments (Rao & Selvamani, 2015).
The next sections of the report will primarily focus on the overall management of the cloud
computing approach by the organization of DAS.
2.0 Privacy strategy for personal data
The first adherence in respect to the implementation of the cloud computing
technology within the environment of DAS is depicted as the security as well as the privacy
of the data associated with the organization. It is potentially identified that the organization
supports or endures different departments within the Government of Australia. The
significant approach in respect to the centralization of the data within the different
departments will be a noteworthy implementation in respect to the services provided by the
Government.
This implementation thus needs to store the data of the overall users that are
facilitated by the various services that are provided by DAS. The organization also tends to
merge the HR management system of themselves within this approach (Shaikh & Sasikumar,
2015). Thus it can be identified that there will a significant huge amount of data that is to be
1.0. Introduction
The significant purpose of the report is to deal with the potential implication of the
cloud computing technology in respect to the overall aspects of the cloud computing
methodology that will significantly help the selected domain of the Australian Government.
The Department of the Administrative Services (DAS) are significantly related with the
overall services that enhances the other departments within the Government. The DAS is set
to implement the shared systems approach in respect to the implication of the cloud
computing methodology. The purpose of the report depends on the fact of the strategic
approaches that will be adhered in respect to the overall management of the cloud services
thus enhancing the services in respect to the related departments (Rao & Selvamani, 2015).
The next sections of the report will primarily focus on the overall management of the cloud
computing approach by the organization of DAS.
2.0 Privacy strategy for personal data
The first adherence in respect to the implementation of the cloud computing
technology within the environment of DAS is depicted as the security as well as the privacy
of the data associated with the organization. It is potentially identified that the organization
supports or endures different departments within the Government of Australia. The
significant approach in respect to the centralization of the data within the different
departments will be a noteworthy implementation in respect to the services provided by the
Government.
This implementation thus needs to store the data of the overall users that are
facilitated by the various services that are provided by DAS. The organization also tends to
merge the HR management system of themselves within this approach (Shaikh & Sasikumar,
2015). Thus it can be identified that there will a significant huge amount of data that is to be
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3ASPECTS OF CLOUD COMPUTING
stored within the shared resources section. The HR portal will also possess the facility of the
Performance evaluation as well as management of the employees associated within the
organization. Thus it will also be adhered that the data of the employees will also be stored by
the help of this approach (Latif et al. 2014). Most importantly it can also be signified that
these data will comprise of important personal details which are to be provided with potential
security.
The organization must tend to ensure that the data provide or stored within the cloud
approach of the organization is kept with effective security as well as data privacy methods.
There are various methodology or strategies which are analysed to be significant in respect to
the protection of the data (Kalaiprasath, Elankavi & Udayakumar, 2017). The protection in
respect to the private data is associated to maintain a level of security in respect to the overall
management of the data within the environment of DAS. The significant strategies that are
identified to be adhered in respect to the overall management of the data thus providing
significant security as well as privacy in respect to the organizational premises are analysed
within this section.
The first potential approach is identified as the assurance from the upper management
of the organization regarding the implications of the security policies as well as conditions
related to data privacy (Jouini & Rabai, 2019). The development of a data privacy strategy is
a noteworthy approach in respect to the overall management of the data within the cloud
computing approach.
The second strategy is identified as the recruitment of a Data Protection Officer who
will be in the overall authority regarding the maintenance of the overall data stored within the
organization (Ahmed & Hossain, 2014). The person will be responsible for maintaining a
stored within the shared resources section. The HR portal will also possess the facility of the
Performance evaluation as well as management of the employees associated within the
organization. Thus it will also be adhered that the data of the employees will also be stored by
the help of this approach (Latif et al. 2014). Most importantly it can also be signified that
these data will comprise of important personal details which are to be provided with potential
security.
The organization must tend to ensure that the data provide or stored within the cloud
approach of the organization is kept with effective security as well as data privacy methods.
There are various methodology or strategies which are analysed to be significant in respect to
the protection of the data (Kalaiprasath, Elankavi & Udayakumar, 2017). The protection in
respect to the private data is associated to maintain a level of security in respect to the overall
management of the data within the environment of DAS. The significant strategies that are
identified to be adhered in respect to the overall management of the data thus providing
significant security as well as privacy in respect to the organizational premises are analysed
within this section.
The first potential approach is identified as the assurance from the upper management
of the organization regarding the implications of the security policies as well as conditions
related to data privacy (Jouini & Rabai, 2019). The development of a data privacy strategy is
a noteworthy approach in respect to the overall management of the data within the cloud
computing approach.
The second strategy is identified as the recruitment of a Data Protection Officer who
will be in the overall authority regarding the maintenance of the overall data stored within the
organization (Ahmed & Hossain, 2014). The person will be responsible for maintaining a
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4ASPECTS OF CLOUD COMPUTING
significant environment where data privacy will be provided in respect to the adhered terms
and conditions provided by the DPO.
The next strategy will be dealing with the significant knowledge of the data type that
are being stored within the organization, to which the requirements of the level related to data
privacy and security will be set up. The requirement of the security levels will also depend on
the regulations that are provided by the Government of Australia. This will provide an
enhanced level of security in respect to the overall data that are being stored within the
organization.
The next strategy significantly deals with the overall analysis as well as management
of the risks that may arise within the environment of the data security in DAS. The inventory
related with the implementation procedure, the requirements related with the data privacy and
the relevant risk management framework will be depicted to be significant in respect to the
overall management of the data security of DAS (Sun et al., 2014). The vulnerability as well
as the threats related with the maintenance of the data within the organization is to be
significantly identified in respect to the overall management of the data within the cloud
computing technology that are to be implemented by DAS.
The noteworthy strategy associated with the effective management of the data
associated within the premises of DAS is relevant with the development of the data privacy
policy in respect to both the users as well as the employees associated with the organization.
This policy will intend to amplify the overall management as well as the safe storage of the
data that will be stored within the organization (Narula & Jain, 2015). This will help the
potential users to restrict and limit their access associated with the data in respect to the
different departments that are serviceable by the organization of DAS.
significant environment where data privacy will be provided in respect to the adhered terms
and conditions provided by the DPO.
The next strategy will be dealing with the significant knowledge of the data type that
are being stored within the organization, to which the requirements of the level related to data
privacy and security will be set up. The requirement of the security levels will also depend on
the regulations that are provided by the Government of Australia. This will provide an
enhanced level of security in respect to the overall data that are being stored within the
organization.
The next strategy significantly deals with the overall analysis as well as management
of the risks that may arise within the environment of the data security in DAS. The inventory
related with the implementation procedure, the requirements related with the data privacy and
the relevant risk management framework will be depicted to be significant in respect to the
overall management of the data security of DAS (Sun et al., 2014). The vulnerability as well
as the threats related with the maintenance of the data within the organization is to be
significantly identified in respect to the overall management of the data within the cloud
computing technology that are to be implemented by DAS.
The noteworthy strategy associated with the effective management of the data
associated within the premises of DAS is relevant with the development of the data privacy
policy in respect to both the users as well as the employees associated with the organization.
This policy will intend to amplify the overall management as well as the safe storage of the
data that will be stored within the organization (Narula & Jain, 2015). This will help the
potential users to restrict and limit their access associated with the data in respect to the
different departments that are serviceable by the organization of DAS.

5ASPECTS OF CLOUD COMPUTING
The implementation of the significant data privacy controls in respect to the overall
data associated with DAS is depicted to be significant in respect to the maintenance of the
data security thus adhering the privacy of data (Saravanakumar & Arun, 2014). This will also
comprise of the fact that the organization must tend to imply a potential Risk Treatment Plan
which will adhere the emergence of the sudden risks associated within the organizational
premises. This plan will be effectively developed in respect to the associated management of
the Australian Government as well as significantly develop the standards that will help in the
identification, mitigation as well as acceptance of the related risks.
The most significant part associated with the control of the data privacy as well as
security is identified to be the training as well as the awareness programs related with the
effective management of the risks (Krishna et al., 2016). This will potentially adhere the staff
related in the IT department, the associated security team, the auditors, the legal advisors as
well as the DPO may also be provided with the training modules thus enhancing the security
of the data (Rasheed, 2014). This will enhance the overall management of the risks associated
with the data which are stored within the cloud computing methodology of DAS.
The last important strategy that is to be developed with respect to the implementation
of the cloud computing methodology is depicted to be the fact of compliance as well as
monitoring the overall development and implementation procedure (Choo, 2014). This will
significantly help the organization to be effective in respect to the implementation as well as
storage of the user’s personal data in respect to the organization of DAS. This will potentially
help the organization to deal with the effective management of the cloud services thus
providing an enhanced support to the organization related with the data privacy as well as
security methods (Kumar, Lakshmi & Balamurugan, 2015). Thus the overall implementation
of the cloud computing methodology in respect to the stated organization will help DAS to
The implementation of the significant data privacy controls in respect to the overall
data associated with DAS is depicted to be significant in respect to the maintenance of the
data security thus adhering the privacy of data (Saravanakumar & Arun, 2014). This will also
comprise of the fact that the organization must tend to imply a potential Risk Treatment Plan
which will adhere the emergence of the sudden risks associated within the organizational
premises. This plan will be effectively developed in respect to the associated management of
the Australian Government as well as significantly develop the standards that will help in the
identification, mitigation as well as acceptance of the related risks.
The most significant part associated with the control of the data privacy as well as
security is identified to be the training as well as the awareness programs related with the
effective management of the risks (Krishna et al., 2016). This will potentially adhere the staff
related in the IT department, the associated security team, the auditors, the legal advisors as
well as the DPO may also be provided with the training modules thus enhancing the security
of the data (Rasheed, 2014). This will enhance the overall management of the risks associated
with the data which are stored within the cloud computing methodology of DAS.
The last important strategy that is to be developed with respect to the implementation
of the cloud computing methodology is depicted to be the fact of compliance as well as
monitoring the overall development and implementation procedure (Choo, 2014). This will
significantly help the organization to be effective in respect to the implementation as well as
storage of the user’s personal data in respect to the organization of DAS. This will potentially
help the organization to deal with the effective management of the cloud services thus
providing an enhanced support to the organization related with the data privacy as well as
security methods (Kumar, Lakshmi & Balamurugan, 2015). Thus the overall implementation
of the cloud computing methodology in respect to the stated organization will help DAS to
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6ASPECTS OF CLOUD COMPUTING
safe keep the overall data of the users as well as the employees associated within the
organization.
3.0 Recommended privacy controls
The privacy controls in respect to the overall implementation of the cloud computing
is depicted to be an effective methodology in respect to the security of the data hat are
potentially stored within the system (Cayirci et al., 2014). This section will significantly
adhere the effective privacy controls that may be necessary for providing enhanced security
in respect to the data stored in the cloud system of DAS.
The primary recommendation may be stated as the restriction of the data to be stored
in the cloud systems. The sensitive information is depicted not to be stored within the cloud
systems so that there remains no significant challenges or issues in respect to the data stored
within the cloud systems (Hendre & Joshi, 2015). This necessary recommendation is depicted
to be effective, however there are limitations to the storage of the data.
The next recommendation that is analysed in respect to the effective privacy control
within the cloud systems of the organization is depicted as the user license agreement that
will help DAS to deal with the effective terms and conditions regarding the usage of the
security policies as well as security in respect to the data stored in the cloud.
The adherence of the password policy in respect to the overall management of the
data stored in the cloud is also depicted to be a useful recommendations in respect to the
security of the data (Rao, 2016). The acceptance of the strong password policy in respect to
the development of the password is depicted to be effective in respect to the overall
management of the data stored in the cloud systems of DAS. A strong password is
recommended to possess a small alphabet, a capital alphabet, special character and a number
thus identifying space as a non-accepted criteria.
safe keep the overall data of the users as well as the employees associated within the
organization.
3.0 Recommended privacy controls
The privacy controls in respect to the overall implementation of the cloud computing
is depicted to be an effective methodology in respect to the security of the data hat are
potentially stored within the system (Cayirci et al., 2014). This section will significantly
adhere the effective privacy controls that may be necessary for providing enhanced security
in respect to the data stored in the cloud system of DAS.
The primary recommendation may be stated as the restriction of the data to be stored
in the cloud systems. The sensitive information is depicted not to be stored within the cloud
systems so that there remains no significant challenges or issues in respect to the data stored
within the cloud systems (Hendre & Joshi, 2015). This necessary recommendation is depicted
to be effective, however there are limitations to the storage of the data.
The next recommendation that is analysed in respect to the effective privacy control
within the cloud systems of the organization is depicted as the user license agreement that
will help DAS to deal with the effective terms and conditions regarding the usage of the
security policies as well as security in respect to the data stored in the cloud.
The adherence of the password policy in respect to the overall management of the
data stored in the cloud is also depicted to be a useful recommendations in respect to the
security of the data (Rao, 2016). The acceptance of the strong password policy in respect to
the development of the password is depicted to be effective in respect to the overall
management of the data stored in the cloud systems of DAS. A strong password is
recommended to possess a small alphabet, a capital alphabet, special character and a number
thus identifying space as a non-accepted criteria.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7ASPECTS OF CLOUD COMPUTING
The significant usage of the encryption keys are depicted to be a useful strategy in
respect to the storage of the data within the cloud architecture of the Australian Government.
This will help the organization to develop a significant encryption module thus maintaining
an effective data privacy as well as security within the organization of DAS. The proper
maintenance of the security modules in respect to the encryption as well as decryption of the
passwords and the data are depicted as an important aspect related with the security module.
The effective usage of the different modules in respect to the data protection as well as
security of the volume of data associated with the DAS (Xiong et al. 2015). The encryption
related with the data security is depicted to be an enhanced methodology in respect to the
management of the data within the organizational department of DAS. The usage of the
significant encryption systems is analysed to be effective in respect to the management of the
data to be accessible in respect to the organization supported by the Australian Government.
The significant recommendation in respect to the usage of the cloud services to be
encrypted in respect to the usage of the encrypted cloud services that will enhance the storage
of the data within the implemented organization of DAS. This will help the organization to
deal with the effective management of the significant data associated with the different sets of
departments (Cuzzocrea, 2014). The effective usage of the overall encrypted services it can
be well determined that the organization of DAS will be effective in respect to provide
effective services to the other significant departments to whom, it intends to provide services.
Thus the overall state recommendations intends to help the users as well as the
employees with the significant usage of the different techniques which will help the
organization of DAS to safe keep the data which will be stored in the cloud systems of the
stated organization (Nepal & Pathan, 2014). Thus the overall aspects of the implementation
of cloud computing will help the organization to be effective in regards to the associated data
within the organization.
The significant usage of the encryption keys are depicted to be a useful strategy in
respect to the storage of the data within the cloud architecture of the Australian Government.
This will help the organization to develop a significant encryption module thus maintaining
an effective data privacy as well as security within the organization of DAS. The proper
maintenance of the security modules in respect to the encryption as well as decryption of the
passwords and the data are depicted as an important aspect related with the security module.
The effective usage of the different modules in respect to the data protection as well as
security of the volume of data associated with the DAS (Xiong et al. 2015). The encryption
related with the data security is depicted to be an enhanced methodology in respect to the
management of the data within the organizational department of DAS. The usage of the
significant encryption systems is analysed to be effective in respect to the management of the
data to be accessible in respect to the organization supported by the Australian Government.
The significant recommendation in respect to the usage of the cloud services to be
encrypted in respect to the usage of the encrypted cloud services that will enhance the storage
of the data within the implemented organization of DAS. This will help the organization to
deal with the effective management of the significant data associated with the different sets of
departments (Cuzzocrea, 2014). The effective usage of the overall encrypted services it can
be well determined that the organization of DAS will be effective in respect to provide
effective services to the other significant departments to whom, it intends to provide services.
Thus the overall state recommendations intends to help the users as well as the
employees with the significant usage of the different techniques which will help the
organization of DAS to safe keep the data which will be stored in the cloud systems of the
stated organization (Nepal & Pathan, 2014). Thus the overall aspects of the implementation
of cloud computing will help the organization to be effective in regards to the associated data
within the organization.

8ASPECTS OF CLOUD COMPUTING
4.0 Personal data protection strategy
The data protection strategy that is associated in respect to the protection of the data
that are stored within the cloud computing services are depicted within this section. The
overall management of the data within the data protection methodology will be analysed in
respect to the fact that the data protection is the main aspect related to the cloud computing
services. The significant strategies that must be adhered by the organization of DAS will be
discussed below.
The first noteworthy strategy related with the effective data protection within the
cloud services are identified as the recovery as well potential back up of data. The important
association in respect to the data recovery is analysed to be an effective strategy in respect to
the data protection within the cloud servers (Shaikh & Sasikumar, 2015). The significant
usage of the overall clod services will intend to help the organization to keep a safe track of
the data present within the cloud services (Gahi, Guennoun & Mouftah, 2016). The effective
usage of the data protection rules also enhances the overall protection of the data thus
enhancing the overall management of the data thus analysing the fact that the cloud services
will be effectively dealing with the significant collection of the data as well as helps the
organization to maintain the data in the long run. These rules intends to provide effective
knowledge in respect to the overall management of the data that is associated with the cloud
computing services that are used by the organization of DAS thus enhancing the overall
management of data (Sugumaran, Murugan & Kamalraj, 2014). This will be effective in
respect to the different data protection approaches associated with the effective knowledge of
the data protection methodologies.
Secondly the strategy that can be identified for the protection of personal data for
DAS include effective management of the personal information needs involves accurate
management of the data that is stored in the database (Gholami & Laure, 2016). One strategy
4.0 Personal data protection strategy
The data protection strategy that is associated in respect to the protection of the data
that are stored within the cloud computing services are depicted within this section. The
overall management of the data within the data protection methodology will be analysed in
respect to the fact that the data protection is the main aspect related to the cloud computing
services. The significant strategies that must be adhered by the organization of DAS will be
discussed below.
The first noteworthy strategy related with the effective data protection within the
cloud services are identified as the recovery as well potential back up of data. The important
association in respect to the data recovery is analysed to be an effective strategy in respect to
the data protection within the cloud servers (Shaikh & Sasikumar, 2015). The significant
usage of the overall clod services will intend to help the organization to keep a safe track of
the data present within the cloud services (Gahi, Guennoun & Mouftah, 2016). The effective
usage of the data protection rules also enhances the overall protection of the data thus
enhancing the overall management of the data thus analysing the fact that the cloud services
will be effectively dealing with the significant collection of the data as well as helps the
organization to maintain the data in the long run. These rules intends to provide effective
knowledge in respect to the overall management of the data that is associated with the cloud
computing services that are used by the organization of DAS thus enhancing the overall
management of data (Sugumaran, Murugan & Kamalraj, 2014). This will be effective in
respect to the different data protection approaches associated with the effective knowledge of
the data protection methodologies.
Secondly the strategy that can be identified for the protection of personal data for
DAS include effective management of the personal information needs involves accurate
management of the data that is stored in the database (Gholami & Laure, 2016). One strategy
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

9ASPECTS OF CLOUD COMPUTING
for managing and protection of the personal information involves understanding the process
in which data can be processed in a fair and lawful manner. Adequate information keeping is
necessary for managing the accurate information flow within the project. Accurate
information flow from the centralized database is needed to be ascertained as a part of
protecting the personal information that are stored in the database. Along with that,
authorized access and disclosure of the personal information is critical to ascertain complete
data protection (Yu et al., 2016). Use of personal digital identities while accessing the data
stored in the database is necessary to establish a complete control on the personal information
that is associated with DAS.
The personal data stored over the centralized database becomes increasingly valuable
and protection of the same falls under the responsibility of the organization. The data
protection strategy that is proposed further involves processing of the data in a secure manner
so that any unauthorized access can be easily prevented. The organization should be obliged
to collect data after taking permission of the individual (Li et al. 2016). The personal data
protection strategy involves use of the collected data after taking permission from the
individual whose data is being used. Along with that the permission for data protection
further involves providing data access to the individuals who are trusted enough to access the
confidential information that is stored over the database.
The unique personal digital identity that is provided to each of the individuals is a
crucial step towards safeguarding the data that is being stored. The unique digital ID will
restrict the illegal or unauthorized data usage (Worku et al., 2014). This is a crucial need for
ascertaining that the data is not accessed by any unauthorized individual. The use of personal
digital identity can be defined as a process oriented strategy that will help DAS in
establishing the major organizational aspects of handling the personal data and information.
Along with development of an effective data protection strategy, it is quite needed to enforce
for managing and protection of the personal information involves understanding the process
in which data can be processed in a fair and lawful manner. Adequate information keeping is
necessary for managing the accurate information flow within the project. Accurate
information flow from the centralized database is needed to be ascertained as a part of
protecting the personal information that are stored in the database. Along with that,
authorized access and disclosure of the personal information is critical to ascertain complete
data protection (Yu et al., 2016). Use of personal digital identities while accessing the data
stored in the database is necessary to establish a complete control on the personal information
that is associated with DAS.
The personal data stored over the centralized database becomes increasingly valuable
and protection of the same falls under the responsibility of the organization. The data
protection strategy that is proposed further involves processing of the data in a secure manner
so that any unauthorized access can be easily prevented. The organization should be obliged
to collect data after taking permission of the individual (Li et al. 2016). The personal data
protection strategy involves use of the collected data after taking permission from the
individual whose data is being used. Along with that the permission for data protection
further involves providing data access to the individuals who are trusted enough to access the
confidential information that is stored over the database.
The unique personal digital identity that is provided to each of the individuals is a
crucial step towards safeguarding the data that is being stored. The unique digital ID will
restrict the illegal or unauthorized data usage (Worku et al., 2014). This is a crucial need for
ascertaining that the data is not accessed by any unauthorized individual. The use of personal
digital identity can be defined as a process oriented strategy that will help DAS in
establishing the major organizational aspects of handling the personal data and information.
Along with development of an effective data protection strategy, it is quite needed to enforce
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

10ASPECTS OF CLOUD COMPUTING
premium control on the data security risks that have been identified so that the changes that
have been brought into the organization does not risks the privacy and the confidentiality of
the existing data that is stored. The various recommendations for mitigation of the identified
security risks that might risk the information possessing of DAS is elaborately discussed in
the following section.
5.0 Recommended data protection controls
The cloud usage establishes various data security risks that are needed to be addressed
so that the risk of unauthorized or illegal data access can be mitigated. The mitigation of the
identified data security risk is linked with identification of the controls that can help in
protection of the privacy of the data that is stored.
The malware infection on the network and the database is a critical data security risk
linked with the usage of cloud. Therefore, identification of proper control measures for
mitigation of this risk is of foremost importance. The recommended control for protection of
the network, data and the server against the risk of malware infection involves use of up to
date security system and proper antivirus so that risk of malware infection is completely
eliminated.
The loss of control over the users’ action can subsequently increase the data security
risk linked with migration to cloud. DAS needs to have a control on the individuals who are
provided with the rights of data access (Ab Rahman, Cahyani & Choo, 2017). Loss of control
on the same might increase the data security risk. This can be linked to the insider threats that
are quite common in cloud computing. For example, an ex-employee of an organization
having an access to the data stored might be a threat to the organization. Thus DAS needs to
have a control on the process employees who are given an access to the information stored.
premium control on the data security risks that have been identified so that the changes that
have been brought into the organization does not risks the privacy and the confidentiality of
the existing data that is stored. The various recommendations for mitigation of the identified
security risks that might risk the information possessing of DAS is elaborately discussed in
the following section.
5.0 Recommended data protection controls
The cloud usage establishes various data security risks that are needed to be addressed
so that the risk of unauthorized or illegal data access can be mitigated. The mitigation of the
identified data security risk is linked with identification of the controls that can help in
protection of the privacy of the data that is stored.
The malware infection on the network and the database is a critical data security risk
linked with the usage of cloud. Therefore, identification of proper control measures for
mitigation of this risk is of foremost importance. The recommended control for protection of
the network, data and the server against the risk of malware infection involves use of up to
date security system and proper antivirus so that risk of malware infection is completely
eliminated.
The loss of control over the users’ action can subsequently increase the data security
risk linked with migration to cloud. DAS needs to have a control on the individuals who are
provided with the rights of data access (Ab Rahman, Cahyani & Choo, 2017). Loss of control
on the same might increase the data security risk. This can be linked to the insider threats that
are quite common in cloud computing. For example, an ex-employee of an organization
having an access to the data stored might be a threat to the organization. Thus DAS needs to
have a control on the process employees who are given an access to the information stored.

11ASPECTS OF CLOUD COMPUTING
The data security risk that has been identified further include threats linked with
phishing. Phishing is a common technique that is used for retrieval of the information stored
in an organization. The control measure that is recommended against this risk involves
providing proper training to the staffs regarding the concept of phishing scams and the
method of safeguarding the data against the phishing scams. The protection of the privacy
and confidentiality of the stored data is quite essential to address majority of the data security
risks that can be faced.
Along with the mitigation of the identified data security risk, it is necessary to
implement an effective personal data protection strategy so that the confidentiality of the
stored data can be maintained. The implementation of the strategy for personal data
protection is subjected to understanding the major data security risk that can arise with the
storage of data over cloud (Wei et al., 2014). All the individual users of the organization are
needed to be trained about the various issues and the security threats that might be faced
while accessing the data in the cloud. The process of implementation of personal data
protection strategy in DAS are indicated as follows-
1. The individuals who have an access to the unique digital identity should ensure
proper security of the same. The unique digital ID by no means should be leaked to any
individual who is not supposed to access that data.
2. The individuals need to have a correct idea of the personal data protection strategy
that is being proposed so that they can act accordingly. Various strategies are made for
protection of the personal data and the employees are needed to have an idea of the same so
that the risks and issues can be mitigated.
3. Data breach in cloud have increased in the recent years and therefore, appropriate
protection against the same are needed to be taken. It is recommended that every individual
The data security risk that has been identified further include threats linked with
phishing. Phishing is a common technique that is used for retrieval of the information stored
in an organization. The control measure that is recommended against this risk involves
providing proper training to the staffs regarding the concept of phishing scams and the
method of safeguarding the data against the phishing scams. The protection of the privacy
and confidentiality of the stored data is quite essential to address majority of the data security
risks that can be faced.
Along with the mitigation of the identified data security risk, it is necessary to
implement an effective personal data protection strategy so that the confidentiality of the
stored data can be maintained. The implementation of the strategy for personal data
protection is subjected to understanding the major data security risk that can arise with the
storage of data over cloud (Wei et al., 2014). All the individual users of the organization are
needed to be trained about the various issues and the security threats that might be faced
while accessing the data in the cloud. The process of implementation of personal data
protection strategy in DAS are indicated as follows-
1. The individuals who have an access to the unique digital identity should ensure
proper security of the same. The unique digital ID by no means should be leaked to any
individual who is not supposed to access that data.
2. The individuals need to have a correct idea of the personal data protection strategy
that is being proposed so that they can act accordingly. Various strategies are made for
protection of the personal data and the employees are needed to have an idea of the same so
that the risks and issues can be mitigated.
3. Data breach in cloud have increased in the recent years and therefore, appropriate
protection against the same are needed to be taken. It is recommended that every individual
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 17
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2026 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





