Critical Analysis of Cloud Security in Information Security Report

Verified

Added on  2023/04/21

|14
|3746
|251
Report
AI Summary
This report provides a comprehensive critical analysis of cloud security within the broader context of information security. It begins with an abstract and introduction, defining information security and its importance in safeguarding digital and non-digital information. The report then delves into the specifics of cloud security, exploring its definition, features, and the importance of securing data within cloud environments. It examines the technical background of cloud security, including public, private, and hybrid cloud infrastructures, and discusses the role of security incident response teams and advanced security technologies. Furthermore, the report addresses the arguments and issues associated with cloud security, particularly those related to virtualization and service models like SaaS, PaaS, and IaaS. Finally, it outlines methods and solutions for addressing cloud security challenges, concluding with a summary of the key findings and references.
Document Page
Running head: INFORMATION SECURITY
Information security
Name of the student:
Name of the university:
Author note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1INFORMATION SECURITY
Abstract
The report is prepared to present an acritical analysis of the information security system.
Based on it, the chosen cloud security system is reviewed critically in the story. The critical
review thus presented discuses about the different types of cloud security features and what
they offer to the customers using a cloud-based solution. The last part of the critical review
reflects the threats and issues that are related to the cloud security solution infrastructure and
based on it the different types of solution methods that the cloud security officials provide are
hence discussed.
Document Page
2INFORMATION SECURITY
Table of Contents
Introduction:...............................................................................................................................3
Summary:...................................................................................................................................4
Understanding cloud security.................................................................................................4
Critical review:...........................................................................................................................5
The importance of cloud security:..........................................................................................5
Technical background of cloud security:...............................................................................6
Arguments and issues with cloud security:............................................................................8
Methods to solve cloud security issues:.................................................................................9
Conclusion:..............................................................................................................................10
References:...............................................................................................................................11
Document Page
3INFORMATION SECURITY
Introduction:
Information security is defined as the collection of different strategies that are
required to manage the processes, policies and tools that are essential to detect and document
the threats countering towards digital as well as non-digital information (Safa, Von Solms
and Furnell 2016). The responsibilities of information security include the establishment of
business process systems to protect the assets of information security with proper format and
storage procedure. Ensuring the availability, integrity and confidentiality are considered as
the basic standards for an information security system. While these characteristics remain as
the central importance in safeguarding information, then there is rapid development in the era
of information technology sector (Soomro, Shah and Ahmed 2016). Information and
communication technology can be argued as the primary subcomponents of information
security as it includes the protection of the underlying resources. Both in terms of pace and
sophistication, new invented cyber attacks are hitting the information systems with a rapid
speed around the world. Information threats are taking up the world causing significant loss
of data of the public as well as of some major organisations. Some of the risks that are faced
include disruption of commerce, fraud or stealing credit information and internal threats
(Laszka, Felegyhazi and Buttyan 2015). Thus, for preventing all these threats, it is crucial that
organisations implement proper information security inside their systems. Information
security is of various types like cloud security, cryptography, application security and many
more. This report deals with the critical review of the cloud security type of information
security reviewing its technical background and issues related to it.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4INFORMATION SECURITY
Summary:
Understanding cloud security
According to Jouini, Rabai and Aissa (2014), different types of information security
helps in safeguarding the critical data stored in a system. Among them, the most vital
information security is cloud security. Cloud security is defined as a means to protect the
applications, data and infrastructures that are involved in the cloud computing environment.
Cloud computing environment is comprised of private, public and hybrid cloud
infrastructures that remain secured with the help of the security services that are provided in
cloud security. While many organisations use the cloud computing environment for
processing their business, they are also daunted by some of the modern security threats. As
the whole cloud environment is dynamic hence the risks related to it is also changing day by
day. Cloud security provides a variety of features by which personals or business
organisations using cloud-based solution platforms can secure their data. When evaluating the
safety of cloud providers, it is very important to comprehend the difference between the
safety actions that the cloud facility provider gears and works which is known as the safety of
the cloud and the security events that the client implements and works related to the
protection of customer gratified and applications that make usage of the cloud service
provider services and this is what known as the security in the cloud. The users itself decide
the safety of the applications that are running in the cloud. Computing in the cloud
atmosphere refers to the scaling of applications in the cloud including the storage systems and
the platforms used in the cloud computing services. While the business of all kinds increases
the efficiency of their business with the help of a cloud environment, there are significant
worries about the sanctuary of the cloud computing environment. For some considerable
security breaches that are reported recently, originalities and individuals are disinclined to
deploy their data and tenders in the cloud situation. However, it is to be kept in mind that
Document Page
5INFORMATION SECURITY
cloud computing environment is not uncertain, but it just needs to be accomplished and
retrieved correctly.
Critical review:
The importance of cloud security:
Cloud security is a vital aspect of information security in terms of securing data while
they are stored in the cloud environment. Though many of the reports suggest that storing
data in cloud ecosystem is not secured at all but with the advanced security features that the
cloud environment offers, storing data in a cloud environment is much safer to use. In cloud
computing security is the dominant feature that is given the highest priority as all the
resources that are used in the cloud is of shared in nature (Nanavati et al. 2014). The storage
services that are provided in a cloud environment, data are regularly backed up rather than
getting stored in the onsite climate of the cloud. There are still some business organisations
that are storing their data information’s in systems like tapes or backing up their data on on-
site locations. This can lead to higher security risks where if they face any local disaster, then
both their backed-up data as well as the on-site stored data will be lost. Any issues occurring
in the cloud environment may lead to severe consequences.
According to Kazim and Zhu (2015), the threats that can cause as a result of lack of
cloud security may lead to the failure of the regulatory, salutary or the legal requirements in
the cloud. The main feature of cloud computing is to consolidate software and data resources.
It is being reported that significant of the manufacturing organisations are losing their control
over maintain these resources. Thus moving towards a cloud environment and opting for
cloud security measures will help them in overcoming these situations with smooth
transitions. Cloud computing enables services that are met on demand. It has features such as
self-service, system access and independent assembling of resources. To make cloud
Document Page
6INFORMATION SECURITY
computing adoptable to every user and organisations, cloud environment offers advanced
security features to win the confidence of the customers reducing the risk factor that is
associated with it. Thus, herein lies the importance of cloud security n preventing data from
loss or significant cyber threats.
Technical background of cloud security:
With the advancement of cloud security features, it allows users to choose between
the platforms in which they want to operate that is whether the particular application or
software will be based on the public or private or the hybrid cloud environment. In cases
when the application consists of highly confidential files, then it is secured to use a private
cloud infrastructure where the data will be confined to only a particular separate cloud
environment (Aljawarneh, Alawneh and Jaradat 2017). There are two ways of thinking of a
private infrastructure where users can opt for either a private server or private support on
their premises or in another hand; they might opt for servers that are dedicated by their cloud
providers. In case of choosing a public cloud infrastructure, websites are usually accepted
that has some public facing. So here the data stored are not that much confidential and are
meant for the public use. The third infrastructure is the hybrid infrastructure which is the
setup that most companies go for. In case of having a use case where the private files of high
confidentiality and websites meant for public use are in one application then there comes the
use of the hybrid infrastructure.
From the article of Chang, Kuo and Ramachandran (2016), we see that Cloud
computing is changing the way we do commercial making Information technology more
effectual and lucrative, but it is also starting up companies to new types of cyber pressures.
Cloud computing environment consists of a security incident response team that can quickly
take the necessary steps that are needed to thwart attacks and restore system health. Cloud
security infrastructures are armed with latest security technology so that they can tackle the
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7INFORMATION SECURITY
threats. Cloud security includes three steps of working including monitoring data, gaining
visibility in the cloud and managing access. The data monitoring system helps the users to get
notified if some thefts are being carried on their system application. But the system does not
just flag a set of lists of threats; it can also detect the new kind of possible security threats.
Cloud security tools use forward-thinking machine learning methods to built detailed models
of usual system behaviour and flags any eccentricity these models assessing the risk in each
variation. This combined with made in insights around known hacking methods enables the
system to rapidly detect unusual user and database activity. Cloud security officials use a
variety of urbane software or virtualised software applications. With the help of cloud
security infrastructure, various multiple suspicious, suspicious events or offences can be
detected. All this activity is composed and analysed within the cloud to operate out not only
the present occurring but also figuring out the main culprit behind the offence.
According to Zhao, Li and Liu (2014), the cloud security system looks for patterns
which it then correlates with thousands of events while searching for suspicious patterns.
Patterns that diverge meaningfully from standard system behaviours. Cloud security
infrastructure provides the perceptibility to pinpoint and recognize the hacker’s
authorizations. The privileged identity management access or PIM included in the cloud
security system controls admittance to the serious cloud possessions that store private and
sensitive information. The PIM uses a technique of checking green permits in and out each
time the system is accessed. This altogether adds an extra layer of safekeeping for users who
have a high level of admittance to personal information. Security is a journey, not a
destination. Security intelligence monitors data to gain visibility and manages access to
evolve and respond to the ever-changing world of the cloud.
Document Page
8INFORMATION SECURITY
Arguments and issues with cloud security:
According to Kalaiprasath, Elankavi and Udayakumar (2017), though cloud security
provides varieties of features in safeguarding user’s information, still some issues and
challenges are related to it. Organisations make use of cloud in variety of models in oreder to
provide services. The service models include SaaS, PaaS, IaaS(Almorsy, Grundy and Müller
2016). The facilities could be positioned using numerous disposition models such as private,
public and hybrid. Some security issues and concerns are linked with cloud computing. The
problems fall into two extensive groups that are- one is the security issues faced by cloud
providers, and the other is the security issues that are met by the patrons.Organisations using
cloud infrastructure makes use of the software platform in order to provide services in the
infrastructure by means of cloud.. In most cases, it is the responsibility of the service
providers to guarantee that the support is secured and that the client’s data and requests are
endangered while the customers must confirm that the providers have taken the proper
security actions to defend their information.
The widespread use of virtualisation in applying cloud substructure brings sole
security anxieties for clienteles or occupants of a public cloud service. According to Ali,
Khan and Vasilakos (2015), virtualisation changes the association between the Operating
system and fundamental hardware. According to various studies that have been done on cloud
infrastructure virtualization, it is reflected that the hardware components of the cloud include
calculating, networking and storage facility.. The sheet of virtualisation must be appropriately
arranged, accomplished and secured. However, the specific anxieties of the virtualisation
include the possibility to compromise the software computing or hypervisor. These fears
though they are mainly hypothetical, but they do exist.
According to Fernandes et al. (2014), it is imperative that the console management
system is safeguarded as any data break in the manager workplace of the virtualisation
Document Page
9INFORMATION SECURITY
software can cause the entire center of data to go down or reconfigured to an attacker liking
(Samarati et al. 2016). As a vast quantity of data is deposited on cloud attendants, it is a
possibility that the cloud service providers might become an attractive target by the potential
hackers. Reports and studies on the security issues of the cloud have claimed some problems
that can take place in a cloud environment. In the cloud situation, an unknown insider can
abolish the whole infrastructure or can even manipulate the data stored in the cloud
environment storage system. According to Ahmed and Hossain (2014), systems that subject
to solely on the cloud service provider for sanctuary such as encryption are reported to be at
higher risk. Account hijacking is another excellent treatment that may occur in a cloud
environment. Attackers can snoop on happenings, operate transactions, and adjust data.
Invaders may also be able to use the cloud submission to launch other bouts. As a result of all
these issues related to the cloud security, these may lead to financial loss where companies
need to invest huge amount of money in restructuring or may lead to reputational loss which
includes the loss of capability, loss of clients and even loss of employee’s trust and finally the
legal loss where companies can be issued for not shielding the data of customer while
organizing it over the cloud.
Methods to solve cloud security issues:
Thus, from the critical review of the cloud security infrastructure and the problems
related to it, it is now essential to formulate some preventive measures that can protect the
data from the hands of black hat people (Tari et al. 2015). There are many methods which are
recommended for using cloud computing services and resolving the issues related to cloud
computing (Coppolino et al. 2015). The security that is provided in the cloud needs to include
the multifactor authentication and encryption feature, logging and auditing of access to cloud
and organisations need to forbid the distribution of account identifications between users and
facilities.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
10INFORMATION SECURITY
According to Wei et al. (2014), though most of the cloud security providers provide
baseline security measures which are not sophisticated enough to deal with the types of
security issues company now face in the cloud it is the sole responsibility of the user or the
organization deploying its applications over the cloud to take care of security capabilities
while moving to cloud (Hussein and Khalid 2016). For example, IBM’s cloud security
portfolio helps to achieve a comprehensive cloud security posture by protecting cloud assets
including four key areas- first by safeguarding people applications and devices that interact
with the cloud.
Conclusion:
Thus, from the above critical review, it can be concluded that among the various
information security methods cloud based security allows many businesses as well as
individuals to ensure the safety management of the data including analysis and control of the
data access from anywhere. Cloud based security solutions present in the cloud environment
has a set of rules that are strictly followed to ensure database safety. All the cloud-based
security solutions are governed by laws and regulations which in turn maintain a high
standard of protection and privacy of the information of the client. The primary purpose of
the cloud-based security solutions is to ensure that the knowledge of the customers is safe and
secure which they are being deployed in the cloud environment. Cloud based security
solutions provide a variety of security features such as advanced firewall, intrusion system
detection using event logging, tier IV data centres with highly advanced security features and
many more. With the advancement of technology, hackers are also inventing new ways to
process with their hacking methods and so deploying applications or software on the cloud
environment is much safer than using them in onsite networks where the vulnerability of data
breach is much more prevalent and may cause significant disruption.
Document Page
11INFORMATION SECURITY
References:
Ahmed, M. and Hossain, M.A., 2014. Cloud computing and security issues in the
cloud. International Journal of Network Security & Its Applications, 6(1), p.25.
Ali, M., Khan, S.U. and Vasilakos, A.V., 2015. Security in cloud computing: Opportunities
and challenges. Information sciences, 305, pp.357-383.
Aljawarneh, S.A., Alawneh, A. and Jaradat, R., 2017. Cloud security engineering: Early
stages of SDLC. Future Generation Computer Systems, 74, pp.385-392.
Almorsy, M., Grundy, J. and Müller, I., 2016. An analysis of the cloud computing security
problem. arXiv preprint arXiv:1609.01107.
Chang, V., Kuo, Y.H. and Ramachandran, M., 2016. Cloud computing adoption framework:
A security framework for business clouds. Future Generation Computer Systems, 57, pp.24-
41.
Coppolino, L., D’Antonio, S., Mazzeo, G. and Romano, L., 2017. Cloud security: Emerging
threats and current solutions. Computers & Electrical Engineering, 59, pp.126-140.
Fernandes, D.A., Soares, L.F., Gomes, J.V., Freire, M.M. and Inácio, P.R., 2014. Security
issues in cloud environments: a survey. International Journal of Information Security, 13(2),
pp.113-170.
Fernandes, D.A., Soares, L.F., Gomes, J.V., Freire, M.M. and Inácio, P.R., 2014. Security
issues in cloud environments: a survey. International Journal of Information Security, 13(2),
pp.113-170.
Hussein, N.H. and Khalid, A., 2016. A survey of cloud computing security challenges and
solutions. International Journal of Computer Science and Information Security, 14(1), p.52.
Document Page
12INFORMATION SECURITY
Jouini, M., Rabai, L.B.A. and Aissa, A.B., 2014. Classification of security threats in
information systems. Procedia Computer Science, 32, pp.489-496.
Kalaiprasath, R., Elankavi, R. and Udayakumar, D.R., 2017. Cloud. Security and
Compliance-A Semantic Approach in End to End Security. International Journal Of
Mechanical Engineering And Technology (I met), 8(5), pp.987-994.
Kazim, M. and Zhu, S.Y., 2015. A survey on top security threats in cloud
computing. International Journal of Advanced Computer Science and Applications (IJACSA).
Laszka, A., Felegyhazi, M. and Buttyan, L., 2015. A survey of interdependent information
security games. ACM Computing Surveys (CSUR), 47(2), p.23.
Nanavati, M., Colp, P., Aiello, B. and Warfield, A., 2014. Cloud security: A gathering
storm. Communications of the ACM, 57(5), pp.70-79.
Safa, N.S., Von Solms, R. and Furnell, S., 2016. Information security policy compliance
model in organisations. Computers & Security, 56, pp.70-82.
Samarati, P., di Vimercati, S.D.C., Murugesan, S. and Bojanova, I., 2016. Cloud security:
Issues and concerns. Encyclopedia on cloud computing, pp.1-14.
Soomro, Z.A., Shah, M.H. and Ahmed, J., 2016. Information security management needs a
more holistic approach: A literature review International Journal of Information
Management, 36(2), pp.215-225.
Tari, Z., Yi, X., Premarathne, U.S., Bertok, P. and Khalil, I., 2015. Security and privacy in
cloud computing: vision, trends, and challenges. IEEE Cloud Computing, 2(2), pp.30-38.
Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y. and Vasilakos, A.V., 2014. Security
and privacy for storage and computation in cloud computing. Information Sciences, 258,
pp.371-386.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
13INFORMATION SECURITY
Zhao, F., Li, C. and Liu, C.F., 2014, February. A cloud computing security solution based on
fully homomorphic encryption. In 16th International Conference on Advanced
Communication Technology (pp. 485-488). IEEE.
chevron_up_icon
1 out of 14
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]