Cloud Computing Security Technologies: Executive Summary and Analysis
VerifiedAdded on 2020/03/16
|17
|4055
|97
Report
AI Summary
This report provides a comprehensive overview of cloud computing security technologies. It begins with an executive summary highlighting the importance of data security in the cloud environment, followed by a detailed description of cloud computing security controls, including deterrent, detective, and preventive measures. The report then delves into technological solutions such as cloud firewalls and cloud application security, explaining their impact on data security. It also addresses the crucial aspect of organizational change assessment, discussing how organizations can adopt changes to enhance their security posture, particularly in the context of BYOD policies. The report further explores the significance of mobile technologies and their implications for cloud computing security. Finally, the report provides recommendations for maintaining data security in the cloud and concludes with a discussion on the importance of encryption and other security measures to protect sensitive information.

SURNAME 1
Student Name:
Course Title:
Tutor:
Date:
Cloud computing security technologies
Executive summary
With advancements in the field of technology, most firms distribute data to a third party for
storage. The use of computers in organizations has taken over, and there is so much information
which needs to be saved with the increased business activities. Nevertheless, organizations prefer
to store data in the third party as a backup in case of damages or uncertainties in their systems.
Cloud computing has brought a great change to the world of technology. Despite its enormous
positive impacts, the data security issue is a major concern by several organizations.
This report looks into the security concerns of cloud computing as well as the cloud computing
technologies which have been put in place to ensure that data is secure for the parties involved.
The research report also covers the technological solutions offered by the cloud computing
security technologies. Some of these cloud security controls include preventive controls,
detective controls, deterrent controls, and corrective controls. This paper also covers safety and
privacy of the networks used in cloud computing. They include the privacy controls and
personnel security.
The report also focuses on the organizational changes that need to be put in place for the security
measures to be effective. Nevertheless, the paper will also cover the mobile technologies and
Student Name:
Course Title:
Tutor:
Date:
Cloud computing security technologies
Executive summary
With advancements in the field of technology, most firms distribute data to a third party for
storage. The use of computers in organizations has taken over, and there is so much information
which needs to be saved with the increased business activities. Nevertheless, organizations prefer
to store data in the third party as a backup in case of damages or uncertainties in their systems.
Cloud computing has brought a great change to the world of technology. Despite its enormous
positive impacts, the data security issue is a major concern by several organizations.
This report looks into the security concerns of cloud computing as well as the cloud computing
technologies which have been put in place to ensure that data is secure for the parties involved.
The research report also covers the technological solutions offered by the cloud computing
security technologies. Some of these cloud security controls include preventive controls,
detective controls, deterrent controls, and corrective controls. This paper also covers safety and
privacy of the networks used in cloud computing. They include the privacy controls and
personnel security.
The report also focuses on the organizational changes that need to be put in place for the security
measures to be effective. Nevertheless, the paper will also cover the mobile technologies and
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

SURNAME 2
cloud computing. This is because most people in the world are currently using mobile devices in
their workplaces, at home, and in several locations. Given that these devices pose a great danger
to the data security of organizations due to their low-security levels, there is a need to focus on
them.
Table of contents
cloud computing. This is because most people in the world are currently using mobile devices in
their workplaces, at home, and in several locations. Given that these devices pose a great danger
to the data security of organizations due to their low-security levels, there is a need to focus on
them.
Table of contents

SURNAME 3
Executive summary.....................................................................................................................................1
Technology description.............................................................................................................................4
Cloud computing security controls.......................................................................................................4
Deterrent controls........................................................................................................................4
Detective controls........................................................................................................................4
Preventive controls......................................................................................................................4
Technology solution...................................................................................................................................5
Cloud Firewall.......................................................................................................................................9
Cloud Application Security...............................................................................................................9
Organizational change assessment.........................................................................................................10
How the organization can adopt the changes....................................................................................13
Works Cited...............................................................................................................................................15
Executive summary.....................................................................................................................................1
Technology description.............................................................................................................................4
Cloud computing security controls.......................................................................................................4
Deterrent controls........................................................................................................................4
Detective controls........................................................................................................................4
Preventive controls......................................................................................................................4
Technology solution...................................................................................................................................5
Cloud Firewall.......................................................................................................................................9
Cloud Application Security...............................................................................................................9
Organizational change assessment.........................................................................................................10
How the organization can adopt the changes....................................................................................13
Works Cited...............................................................................................................................................15

SURNAME 4
Technology description
Cloud computing security controls
Cloud computing security controls refer to the technologies that are used to monitor the data
which is stored in the cloud. There is an increased insecurity level on the internet as a result of
networking. Cybercrimes are growing, and breaches on the data are increasing on the website of
organizations. Bringing these technologies into use will help in minimizing these risks thus
creating a reliable cloud computing activities. Cloud computing refers to the process which
involves the use of remote network servers which are hosted on the internet for data storage,
management, and processing. This reduces the dependency of a personal computer to store data
for firms.
The cloud security controls technology has the ability to safeguard weaknesses which are likely
to be used as a way of attack. Nevertheless, they have the potential to reduce the attack’s effects.
There are several categories of these security measures, and they can be divided into the
following:
Deterrent controls: they are meant to lower the levels of attacks on the cloud system.
Detective controls: these identify the incidents of risk that take place hence providing one
Preventive controls: these are intended to prevent activities such as hacking into the
system.
Cloud security controls technologies came into place due to increased complaints of people
invading the private information of some firms with different intentions. Some steal information
with the aim of bringing the company down by stealing its financial resources, creative labor
forces among several other things. To ensure the efficiency of cloud computing in firms, these
technologies are a necessity.
Technology description
Cloud computing security controls
Cloud computing security controls refer to the technologies that are used to monitor the data
which is stored in the cloud. There is an increased insecurity level on the internet as a result of
networking. Cybercrimes are growing, and breaches on the data are increasing on the website of
organizations. Bringing these technologies into use will help in minimizing these risks thus
creating a reliable cloud computing activities. Cloud computing refers to the process which
involves the use of remote network servers which are hosted on the internet for data storage,
management, and processing. This reduces the dependency of a personal computer to store data
for firms.
The cloud security controls technology has the ability to safeguard weaknesses which are likely
to be used as a way of attack. Nevertheless, they have the potential to reduce the attack’s effects.
There are several categories of these security measures, and they can be divided into the
following:
Deterrent controls: they are meant to lower the levels of attacks on the cloud system.
Detective controls: these identify the incidents of risk that take place hence providing one
Preventive controls: these are intended to prevent activities such as hacking into the
system.
Cloud security controls technologies came into place due to increased complaints of people
invading the private information of some firms with different intentions. Some steal information
with the aim of bringing the company down by stealing its financial resources, creative labor
forces among several other things. To ensure the efficiency of cloud computing in firms, these
technologies are a necessity.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

SURNAME 5
Technology solution
How will this technology impact the security of the data? The cloud has several complex security
challenges which need to be protected at all costs. For instance, if a financial organization, like
let’s say a bank has some of its data stored using cloud computing, what will happen if such
information leaks to the people? Most cyber-attacks do aim at getting financial benefits. If such
sites are not protected, there are high chances that hackers will get access to the information. The
cloud computing security technology has a positive impact on the data. It ensures the following:
Data is safely transferred from devices to the cloud via networks.
Security threats and vulnerabilities are detected before they cause damage to the
information. Once identified, the necessary approaches can be taken to control the risks.
The maximum amount of data is encrypted in a language that others cannot understand.
This is increasing the security level during the transfer of data. Even if someone
intercepts it on the way, he/she will not be in a position to understand what it means. For
the person, the data is meaningless; it only makes sense for the one who encrypted it.
Why is this technology needed? There is a number of reasons as to why the cloud security
technologies are of great essence to a firm. Some of them include:
(i) There is a great need to protect confidential government data, business information as
well as regulatory data. Imagine leaking out the Australian army information to the
public. There are high chances that it will get into the hands of the nation’s enemies
such as terrorist groups who will use it to attack. Having the documents will inform
them of the weaknesses in the government, and they will use this to their advantage.
With the aid of the preventive technologies, detective, and deterrent controls, the
government is able to manage data security effectively.
Technology solution
How will this technology impact the security of the data? The cloud has several complex security
challenges which need to be protected at all costs. For instance, if a financial organization, like
let’s say a bank has some of its data stored using cloud computing, what will happen if such
information leaks to the people? Most cyber-attacks do aim at getting financial benefits. If such
sites are not protected, there are high chances that hackers will get access to the information. The
cloud computing security technology has a positive impact on the data. It ensures the following:
Data is safely transferred from devices to the cloud via networks.
Security threats and vulnerabilities are detected before they cause damage to the
information. Once identified, the necessary approaches can be taken to control the risks.
The maximum amount of data is encrypted in a language that others cannot understand.
This is increasing the security level during the transfer of data. Even if someone
intercepts it on the way, he/she will not be in a position to understand what it means. For
the person, the data is meaningless; it only makes sense for the one who encrypted it.
Why is this technology needed? There is a number of reasons as to why the cloud security
technologies are of great essence to a firm. Some of them include:
(i) There is a great need to protect confidential government data, business information as
well as regulatory data. Imagine leaking out the Australian army information to the
public. There are high chances that it will get into the hands of the nation’s enemies
such as terrorist groups who will use it to attack. Having the documents will inform
them of the weaknesses in the government, and they will use this to their advantage.
With the aid of the preventive technologies, detective, and deterrent controls, the
government is able to manage data security effectively.

SURNAME 6
(ii) Auditing of data in the cloud needs to be regulated. If people just have access, they
can manipulate the information of the company and lead to losses. Any logging
activities get detected by the cloud security control technologies, and they are
reported to the primary server where more safety measures can be taken to prevent
more attacks.
The main objective of the cloud computing security technologies is to ensure that applications,
data, and any associated infrastructure to cloud computing is well protected. These technologies
are used by the service providers to make sure that most of the time, the kind of infrastructure
they are providing to their clients is safe for data storage, processing, and analysis. Without a
safe infrastructure, customers are exposed to the dangers of the web which include piracy, cyber
crimes like hacking among others.
With this technologies, data is often encrypted to ensure that it is private. There are several
applications such as Oracle and ServiceNow which are helpful in encrypting data. The good
thing with these products/software is that they have the ability to intercept data and replace it
with random encryption for security purposes. The diagram below shows cloud data protection
and security solution.
(ii) Auditing of data in the cloud needs to be regulated. If people just have access, they
can manipulate the information of the company and lead to losses. Any logging
activities get detected by the cloud security control technologies, and they are
reported to the primary server where more safety measures can be taken to prevent
more attacks.
The main objective of the cloud computing security technologies is to ensure that applications,
data, and any associated infrastructure to cloud computing is well protected. These technologies
are used by the service providers to make sure that most of the time, the kind of infrastructure
they are providing to their clients is safe for data storage, processing, and analysis. Without a
safe infrastructure, customers are exposed to the dangers of the web which include piracy, cyber
crimes like hacking among others.
With this technologies, data is often encrypted to ensure that it is private. There are several
applications such as Oracle and ServiceNow which are helpful in encrypting data. The good
thing with these products/software is that they have the ability to intercept data and replace it
with random encryption for security purposes. The diagram below shows cloud data protection
and security solution.

SURNAME 7
The following are the Cloud data security capabilities:
(1) The cloud data security is able to propagate across several enterprise clouds easily while
protecting data.
(2) It can support multiple models hence minimizing expenditures.
With this kind of protection, the cloud computing security technologies will add several values to
the data privacy of the company. This is more especially with companies which intend to allow
their employees to bring with them their mobile devices to work as a way of improving the work
rate. When companies allow employees to work with their mobile devices, there are increased
chances of information leakage. One thing with cell phones is that they can get lost at any time
due to their portability. If they get into the wrong hands, information which is supposed to
remain private might spread to many people creating a significant threat to the company or
concerned clients.
The following are the Cloud data security capabilities:
(1) The cloud data security is able to propagate across several enterprise clouds easily while
protecting data.
(2) It can support multiple models hence minimizing expenditures.
With this kind of protection, the cloud computing security technologies will add several values to
the data privacy of the company. This is more especially with companies which intend to allow
their employees to bring with them their mobile devices to work as a way of improving the work
rate. When companies allow employees to work with their mobile devices, there are increased
chances of information leakage. One thing with cell phones is that they can get lost at any time
due to their portability. If they get into the wrong hands, information which is supposed to
remain private might spread to many people creating a significant threat to the company or
concerned clients.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

SURNAME 8
To minimize the effects of the mobile devices in the work environment, most firms have adopted
cloud computing as a way to keep their data safe. This is because:
Cloud computing provides enough space for data keeping. When working with personal
electronic gadgets in the firm, it is advisable that the data should remain within the
organization. However, some people might be tempted to move out with the information
which might be accessed by others intentionally or unintentionally. With networking in
place, now all the devices get networked to the cloud where all the information gets
stored. To ensure that it is safe, the cloud computing security technologies are employed.
They help to regulate data to and from the server. Only people with passwords are able
to access the site. These technologies have improved a lot in ensuring data is kept safe.
Nowadays, only a few individuals hold information on their mobile devices.
By providing backup information, much security is assured. Losing information due to
machine breakdown is a kind of insecurity in a firm. When information is lost, there are
high chances that your clients will feel insecure with the services provided. As a result,
they will shift their attention to other organization. Losing such people is a loss to a
business firm with the aim of increasing the sales hence high returns inwards.
By providing encrypt data, most people will not be able to understand the message in it until it is
processed. This increases the security level of the data in the cloud. In case anybody tries to
access it, the detective controls send messages, and the activity can be monitored. Increased
security systems in business are what lead to the attainment of organizational goals. It is the
priority of every firm to keep the employee's data safe. Customers are obligated to know:
That their data is secure. This is what will create a long-term relationship with them.
To minimize the effects of the mobile devices in the work environment, most firms have adopted
cloud computing as a way to keep their data safe. This is because:
Cloud computing provides enough space for data keeping. When working with personal
electronic gadgets in the firm, it is advisable that the data should remain within the
organization. However, some people might be tempted to move out with the information
which might be accessed by others intentionally or unintentionally. With networking in
place, now all the devices get networked to the cloud where all the information gets
stored. To ensure that it is safe, the cloud computing security technologies are employed.
They help to regulate data to and from the server. Only people with passwords are able
to access the site. These technologies have improved a lot in ensuring data is kept safe.
Nowadays, only a few individuals hold information on their mobile devices.
By providing backup information, much security is assured. Losing information due to
machine breakdown is a kind of insecurity in a firm. When information is lost, there are
high chances that your clients will feel insecure with the services provided. As a result,
they will shift their attention to other organization. Losing such people is a loss to a
business firm with the aim of increasing the sales hence high returns inwards.
By providing encrypt data, most people will not be able to understand the message in it until it is
processed. This increases the security level of the data in the cloud. In case anybody tries to
access it, the detective controls send messages, and the activity can be monitored. Increased
security systems in business are what lead to the attainment of organizational goals. It is the
priority of every firm to keep the employee's data safe. Customers are obligated to know:
That their data is secure. This is what will create a long-term relationship with them.

SURNAME 9
Privacy. Consumers should be able to trust that the privacy of the data they store on the
cloud is high and it is only visible to them whenever they need it.
Other cloud security technologies that will impact data security positively include:
Cloud Firewall
It has the ability to support a distributed environments. Different users are able to operate from
different locations, yet the data remains secure. Some of the ways it helps to protect data include
preventing data loss through the transfer of files and prevents malware attacks. Through the use
of a securely hosted getaway, the cloud firewall assures clients the security of their data. The
impact of this kind of protection is that it encourages more people to invest in cloud computing
since their data is transferred safely.
Cloud Application Security
This kind of security technology protects the cloud applications. This is vital to the service
providers as well as the customers. Protecting the software should be the priority of the
organization. If you cannot provide security to your application, how can you protect the data?
Maximum security of information is only available once one is able to protect the software that
handles the information. It will not be wrong to say that the one who owns the software is the
one who owns the information. He/she can be able to manipulate the data.
Without the cloud application security, there will be an adverse impact on the data stored since
one might be denied an opportunity to access the software. With no access to the software, no
changes can be made. Hence, all the information is lost. It is thereby recommended to keep up to
date with the changes in the technology industry.
Privacy. Consumers should be able to trust that the privacy of the data they store on the
cloud is high and it is only visible to them whenever they need it.
Other cloud security technologies that will impact data security positively include:
Cloud Firewall
It has the ability to support a distributed environments. Different users are able to operate from
different locations, yet the data remains secure. Some of the ways it helps to protect data include
preventing data loss through the transfer of files and prevents malware attacks. Through the use
of a securely hosted getaway, the cloud firewall assures clients the security of their data. The
impact of this kind of protection is that it encourages more people to invest in cloud computing
since their data is transferred safely.
Cloud Application Security
This kind of security technology protects the cloud applications. This is vital to the service
providers as well as the customers. Protecting the software should be the priority of the
organization. If you cannot provide security to your application, how can you protect the data?
Maximum security of information is only available once one is able to protect the software that
handles the information. It will not be wrong to say that the one who owns the software is the
one who owns the information. He/she can be able to manipulate the data.
Without the cloud application security, there will be an adverse impact on the data stored since
one might be denied an opportunity to access the software. With no access to the software, no
changes can be made. Hence, all the information is lost. It is thereby recommended to keep up to
date with the changes in the technology industry.

SURNAME 10
Organizational change assessment
There are several ways through which the cloud security technology can change an
organization’s activities and processes. This in most cases will affect the IT department first,
then the entire organization. Some of the big changes which can be experienced in the
institutions include the “Bring Your Own Device” (BYOD) to the workplace concept. Several
companies fear to allow individuals to come with their own devices such as mobile phones,
IPads, tablets, and laptops to the work environment to use in accomplishing their tasks. This is
due to the issue of internet security.
With knowledge of the cloud security technologies and software, these processes will change.
The BYOD strategy has several advantages which will ensure the success of any organization
that values IT. Such benefits include:
Increased work rate. In the case a starting company, IT technologies might be limited.
This means that the amount of workload will be minimal. Allowing the employees to
come with their technologies to work might help solve the problem before bringing in
enough resources to the company. Now, with the availability of these technologies, there
assured security for cloud computing which provides them with data storage platform
(Alani, p.16).
Employees like working with the technologies they understand better. For instance, in a
scenario where an organization upgrades all their computers to Windows 10 most
employees will be faced with challenges. Some people do not adjust fast to changes;
some are only well informed of windows 7. Windows 10 will just be stressing them. One
Organizational change assessment
There are several ways through which the cloud security technology can change an
organization’s activities and processes. This in most cases will affect the IT department first,
then the entire organization. Some of the big changes which can be experienced in the
institutions include the “Bring Your Own Device” (BYOD) to the workplace concept. Several
companies fear to allow individuals to come with their own devices such as mobile phones,
IPads, tablets, and laptops to the work environment to use in accomplishing their tasks. This is
due to the issue of internet security.
With knowledge of the cloud security technologies and software, these processes will change.
The BYOD strategy has several advantages which will ensure the success of any organization
that values IT. Such benefits include:
Increased work rate. In the case a starting company, IT technologies might be limited.
This means that the amount of workload will be minimal. Allowing the employees to
come with their technologies to work might help solve the problem before bringing in
enough resources to the company. Now, with the availability of these technologies, there
assured security for cloud computing which provides them with data storage platform
(Alani, p.16).
Employees like working with the technologies they understand better. For instance, in a
scenario where an organization upgrades all their computers to Windows 10 most
employees will be faced with challenges. Some people do not adjust fast to changes;
some are only well informed of windows 7. Windows 10 will just be stressing them. One
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

SURNAME 11
thing for sure about change is that there is no way some sections of the institution will be
left without change. The best way to go about it is to educate these people how to adjust.
But before then, it will be wise to let them bring what they are familiar with to the office.
This will facilitate work output despite change.
Most companies fear cloud computing due to the recent mobile insecurities. Several systems and
websites have been hacked and brought down, while others infected with viruses (Belussi et al.,
p.33). This has forced the organizations to look for huge storage facilities to keep their data in.
These storages occupy a lot of space in offices thus leading to congestion. Nevertheless, hard
drives are prone to tear and wear. After some time, they might lose the data if the drives get
spoiled or the premises get invaded. Cloud computing security technologies have changed the
way this is done (Messier, n.d). With the assurance of high-security levels, firms have moved to
storing their data online. There is no need to keep moving with bulky drives around which can
get lost and bring great damage to many.
The need to change how to store data comes with the desire to keep track of information
permanently. When people store documents, for example, others may come in and misplace
them. A misplaced document is as good as a lost document since it cannot help when needed.
Technology is moving very fast, and so should businesses do. Documents stored in the cloud do
not get lost easily. Nevertheless, they can be tracked easily. With information online, CEOs can
access the company’s data from their homesteads, assign duties and manage other important
things while on seminars outside the country.
Internet threats and vulnerabilities bring great harm to the data. For instance, viruses might delete
data while it is being transferred to the cloud storage. In fact, most data get lost during transfer.
thing for sure about change is that there is no way some sections of the institution will be
left without change. The best way to go about it is to educate these people how to adjust.
But before then, it will be wise to let them bring what they are familiar with to the office.
This will facilitate work output despite change.
Most companies fear cloud computing due to the recent mobile insecurities. Several systems and
websites have been hacked and brought down, while others infected with viruses (Belussi et al.,
p.33). This has forced the organizations to look for huge storage facilities to keep their data in.
These storages occupy a lot of space in offices thus leading to congestion. Nevertheless, hard
drives are prone to tear and wear. After some time, they might lose the data if the drives get
spoiled or the premises get invaded. Cloud computing security technologies have changed the
way this is done (Messier, n.d). With the assurance of high-security levels, firms have moved to
storing their data online. There is no need to keep moving with bulky drives around which can
get lost and bring great damage to many.
The need to change how to store data comes with the desire to keep track of information
permanently. When people store documents, for example, others may come in and misplace
them. A misplaced document is as good as a lost document since it cannot help when needed.
Technology is moving very fast, and so should businesses do. Documents stored in the cloud do
not get lost easily. Nevertheless, they can be tracked easily. With information online, CEOs can
access the company’s data from their homesteads, assign duties and manage other important
things while on seminars outside the country.
Internet threats and vulnerabilities bring great harm to the data. For instance, viruses might delete
data while it is being transferred to the cloud storage. In fact, most data get lost during transfer.

SURNAME 12
With the help of the cloud firewall, such activities are minimized. The threats get detected before
they cause more data loss and are eliminated from the way.
Now that IT experts have learned the benefits of the cloud computing security technologies, then
it is their responsibility to implement it to the entire organizational processes which involve
online activities and transactions. There are reasons as to why implementing these cloud security
software will serve best (Cloud Computing Security, P.40). Among them include:
Client trust
Clients need to trust the safety of the information they provide you with.
Secure the firm's privacy
Every firm has secrets behind their success which should not be made public. Such
include organizational culture and practices.
Increase work output
Work output will be increased in a number of ways. The first one is that these cloud
security technologies will help to reduce virus infection into the system which leads to
slow work rates. And secondly, it will allow BYOD model in the organizations.
Increase the efficiency and speed of the process.
With the ability to support multiple clients, the cloud computing technology facilitates
the speed at which an organization produces. Relying on the same server also leads to
uniformity (Bhowmik, P.66).
Create a source of backup
Cloud computing provides a reliable backup platform. With a large capacity to hold
information, the entire data of the organization can be backed up. Even if the premises
With the help of the cloud firewall, such activities are minimized. The threats get detected before
they cause more data loss and are eliminated from the way.
Now that IT experts have learned the benefits of the cloud computing security technologies, then
it is their responsibility to implement it to the entire organizational processes which involve
online activities and transactions. There are reasons as to why implementing these cloud security
software will serve best (Cloud Computing Security, P.40). Among them include:
Client trust
Clients need to trust the safety of the information they provide you with.
Secure the firm's privacy
Every firm has secrets behind their success which should not be made public. Such
include organizational culture and practices.
Increase work output
Work output will be increased in a number of ways. The first one is that these cloud
security technologies will help to reduce virus infection into the system which leads to
slow work rates. And secondly, it will allow BYOD model in the organizations.
Increase the efficiency and speed of the process.
With the ability to support multiple clients, the cloud computing technology facilitates
the speed at which an organization produces. Relying on the same server also leads to
uniformity (Bhowmik, P.66).
Create a source of backup
Cloud computing provides a reliable backup platform. With a large capacity to hold
information, the entire data of the organization can be backed up. Even if the premises

SURNAME 13
burn down, for instance, only the hardware and infrastructure get destroyed. The data of
running it will remain intact for a long time with the security measures in place.
How the organization can adopt the changes
Change is something which most people fear since it comes with a cost (Barnett, William, &
Glenn, p.11). However, this should not be a thing to prevent the organizations from switching to
cloud computing. The first step is to identify the IT resources of the company and the kind of
data which should be given priority. Not all information must be kept in the cloud. For instance,
if a company has allowed the use of BYOD technologies, then it is the responsibility of every
employee to ensure that the security measures are well-employed in their devices.
Employing skilled IT experts will help the organization to install the cloud security software
appropriately and ensure a continuous update (Floyd, P.8) There are several models which can be
used to ensure that the implementations are made successful.
Perimeter security model
burn down, for instance, only the hardware and infrastructure get destroyed. The data of
running it will remain intact for a long time with the security measures in place.
How the organization can adopt the changes
Change is something which most people fear since it comes with a cost (Barnett, William, &
Glenn, p.11). However, this should not be a thing to prevent the organizations from switching to
cloud computing. The first step is to identify the IT resources of the company and the kind of
data which should be given priority. Not all information must be kept in the cloud. For instance,
if a company has allowed the use of BYOD technologies, then it is the responsibility of every
employee to ensure that the security measures are well-employed in their devices.
Employing skilled IT experts will help the organization to install the cloud security software
appropriately and ensure a continuous update (Floyd, P.8) There are several models which can be
used to ensure that the implementations are made successful.
Perimeter security model
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

SURNAME 14
Using strong passwords is also another way of preventing unauthorized entry into data that is
stored in the cloud. Some people use simple passwords like for instance, ‘1234.’ This kind of
passwords can be easily cracked. In other cases, untrusted employees in the organization just
decide to leak out the passwords to their friends. Despite the security measures put in place, they
will still get access to the server and destroy the data they intend to. To prevent such from
happening with an objective of ensuring that the security measures put in place is effective,
organizations should provide passwords to specific people. In any organization, there are often
different communication channels. They include upward, horizontal, and vertical
communication. The few individuals with access to information will share it with the rest of the
team. This is to minimize information leakage.
Information is the driving force of a company. Every little piece of detail found in the data stored
in the cloud is vital. If taken away, the building block is affected (Information Security, P.51).
Therefore, maximum caution must be taken into account when online data storage is considered
as an option to back up your information. Especially if dealing with financial statements, keeping
watch at all times will serve as the best security (Bishop, P.47). But how will this be possible?
Cloud security controls technologies are in place. Make use of the preventive controls to ensure
that harm does not come into your data. Use the detective controls to know and counter the risks
which might come into your information systems (Rhodes, n.d). And finally, there are deterrent
controls and cloud firewall. The deterrent controls will aid in the reduction of the attacks. The
cloud firewall will enable a wide area coverage from different users while at the same time
ensuring that data transfer is secure (Jeanes, P.10).
Using strong passwords is also another way of preventing unauthorized entry into data that is
stored in the cloud. Some people use simple passwords like for instance, ‘1234.’ This kind of
passwords can be easily cracked. In other cases, untrusted employees in the organization just
decide to leak out the passwords to their friends. Despite the security measures put in place, they
will still get access to the server and destroy the data they intend to. To prevent such from
happening with an objective of ensuring that the security measures put in place is effective,
organizations should provide passwords to specific people. In any organization, there are often
different communication channels. They include upward, horizontal, and vertical
communication. The few individuals with access to information will share it with the rest of the
team. This is to minimize information leakage.
Information is the driving force of a company. Every little piece of detail found in the data stored
in the cloud is vital. If taken away, the building block is affected (Information Security, P.51).
Therefore, maximum caution must be taken into account when online data storage is considered
as an option to back up your information. Especially if dealing with financial statements, keeping
watch at all times will serve as the best security (Bishop, P.47). But how will this be possible?
Cloud security controls technologies are in place. Make use of the preventive controls to ensure
that harm does not come into your data. Use the detective controls to know and counter the risks
which might come into your information systems (Rhodes, n.d). And finally, there are deterrent
controls and cloud firewall. The deterrent controls will aid in the reduction of the attacks. The
cloud firewall will enable a wide area coverage from different users while at the same time
ensuring that data transfer is secure (Jeanes, P.10).

SURNAME 15
Works Cited.
Alani, Mohammed M. Elements of Cloud Computing Security: A Survey of Key Practicalities.
Cham: Springer International Publishing, 2016. Print
Barnett, William P, and Glenn Carroll. Organizational Change. Berkeley, CA: University of
California at Berkeley, Center for Research in Management, Consortium on Competitiveness &
Cooperation, 2013. Print.
Belussi, Alberto, Barbara Catania, Eliseo Clementini, and Elena Ferrari. Spatial Data on the
Web: Modeling and Management. Berlin: Springer, 2017. Print.
Bishop, Matt. Information Security. Place of publication not identified: Springer International
Pu, 2016. Print
Bhowmik, Sandeep. Cloud Computing. Cambridge: Cambridge University Press, 2017. Internet
resource
Information Security. London: DISC, 2013. Print
Cloud Computing Security. Cisco Systems, 2012. Print.
Data Storage. New York, NY, USA: Engineering Information, 2014. Print.
Endrijonas, Janet. Data Security. Rocklin, Calif: Prima Pub, 2015. Print
Floyd, Peter. Organizational Change. Oxford [England: Capstone Pub, 2012. Print.
Jackson, Kevin, Egle Sigler, and Cody Bunch. Openstack Cloud Computing Cookbook: Over
110 Effective Recipes to Help You Build and Operate Openstack Cloud Computing, Storage,
Networking, and Automation. , 2015. Internet resource
Works Cited.
Alani, Mohammed M. Elements of Cloud Computing Security: A Survey of Key Practicalities.
Cham: Springer International Publishing, 2016. Print
Barnett, William P, and Glenn Carroll. Organizational Change. Berkeley, CA: University of
California at Berkeley, Center for Research in Management, Consortium on Competitiveness &
Cooperation, 2013. Print.
Belussi, Alberto, Barbara Catania, Eliseo Clementini, and Elena Ferrari. Spatial Data on the
Web: Modeling and Management. Berlin: Springer, 2017. Print.
Bishop, Matt. Information Security. Place of publication not identified: Springer International
Pu, 2016. Print
Bhowmik, Sandeep. Cloud Computing. Cambridge: Cambridge University Press, 2017. Internet
resource
Information Security. London: DISC, 2013. Print
Cloud Computing Security. Cisco Systems, 2012. Print.
Data Storage. New York, NY, USA: Engineering Information, 2014. Print.
Endrijonas, Janet. Data Security. Rocklin, Calif: Prima Pub, 2015. Print
Floyd, Peter. Organizational Change. Oxford [England: Capstone Pub, 2012. Print.
Jackson, Kevin, Egle Sigler, and Cody Bunch. Openstack Cloud Computing Cookbook: Over
110 Effective Recipes to Help You Build and Operate Openstack Cloud Computing, Storage,
Networking, and Automation. , 2015. Internet resource

SURNAME 16
Jeanes, David L. Data Security. , 2014. Print.
Messier, Ric. Collaboration with Cloud Computing: Security, Social Media, and Unified
Communications. , 2014. Internet resource
Poole, Marshall S, and de V. A. H. Van. Handbook of Organizational Change and Innovation.
Oxford, UK: Oxford University Press, 2014. Print
Rhodes-Ousley, Mark. Information Security: The Complete Reference. New York: McGraw Hill
Education, 2013. Internet resource
Rountree, Derrick, and Ileana Castrillo. The Basics of Cloud Computing: Understanding the
Fundamentals of Cloud Computing in Theory and Practice. San Diego, CA: Elsevier Science &
Technology Books, 2014. Internet resource
Senior, Barbara, and Stephen Swailes. Organizational Change. , 2016. Print.
Srinivasan, S. Cloud Computing Basics. , 2014. Print
Stuckenschmidt, Heiner, and Harmelen F. Van. Information Sharing on the Semantic Web.
Berlin: Springer, 2005. Internet resource.
Tajts, Tiberiu. Cloud Computing Security. Lexington, KY: CreateSpace, 2012. Print
Tipton, Harold F, and Micki K. Nozaki. Information Security Management Handbook: Volume
7. , 2014. Print
Vacca, John R. Cloud Computing Security: Foundations and Challenges. , 2017. Internet
resource
Jeanes, David L. Data Security. , 2014. Print.
Messier, Ric. Collaboration with Cloud Computing: Security, Social Media, and Unified
Communications. , 2014. Internet resource
Poole, Marshall S, and de V. A. H. Van. Handbook of Organizational Change and Innovation.
Oxford, UK: Oxford University Press, 2014. Print
Rhodes-Ousley, Mark. Information Security: The Complete Reference. New York: McGraw Hill
Education, 2013. Internet resource
Rountree, Derrick, and Ileana Castrillo. The Basics of Cloud Computing: Understanding the
Fundamentals of Cloud Computing in Theory and Practice. San Diego, CA: Elsevier Science &
Technology Books, 2014. Internet resource
Senior, Barbara, and Stephen Swailes. Organizational Change. , 2016. Print.
Srinivasan, S. Cloud Computing Basics. , 2014. Print
Stuckenschmidt, Heiner, and Harmelen F. Van. Information Sharing on the Semantic Web.
Berlin: Springer, 2005. Internet resource.
Tajts, Tiberiu. Cloud Computing Security. Lexington, KY: CreateSpace, 2012. Print
Tipton, Harold F, and Micki K. Nozaki. Information Security Management Handbook: Volume
7. , 2014. Print
Vacca, John R. Cloud Computing Security: Foundations and Challenges. , 2017. Internet
resource
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

SURNAME 17
Williams, Mark I. A Quick Start Guide to Cloud Computing: Moving Your Business into the
Cloud. London: Kogan Page, 2010. Internet resource
Zelkowitz, Marvin V. Information Security. Amsterdam: Elsevier Academic Press, 2004.
Internet resource
Williams, Mark I. A Quick Start Guide to Cloud Computing: Moving Your Business into the
Cloud. London: Kogan Page, 2010. Internet resource
Zelkowitz, Marvin V. Information Security. Amsterdam: Elsevier Academic Press, 2004.
Internet resource
1 out of 17
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.