How secure is the cloud PDF

Title How secure is the cloud
Author Thushara Damian
Course Business Information Systems I
Institution Ryerson University
Pages 1
File Size 63.4 KB
File Type PDF
Total Downloads 68
Total Views 146

Summary

case study 8...


Description

How secure is the cloud? Case 8 ITM102 Business Information Systems 1. What kinds of security problems does cloud computing pose? How serious are they? Explain your answer. ○ Cloud computing poses a variety of security problems including security breaches due to misconfiguration, unauthorized access, hijacking of accounts, and external sharing of data. These problems are very serious as they will lead to the company losing precious information and sensitive data. They can also create a gateway for intruders to change important information and create chaos for the company’s future. 2. What management, organization, and technology factors are responsible for cloud security problems? To what extent is cloud security a management issue? ○ The cloud services customer is typically responsible for its operating system, applications, and corporate data placed into the cloud computing environment. This means that most of the responsibility for securing the applications and the corporate data falls on the customers. Many organizations have been breached because they neglected to apply software patches to newly identified security vulnerabilities when they became available or waited too long to do so. Companies have also experienced security breaches because they did not configure aspects of cloud security that were their responsibility. Through this, it can be understood that most cloud security problems occur due to the irresponsibleness of customers rather than cloud computing itself. Hence the security management is only really an issue if customers do not follow up on the next steps of securing the cloud. 3. What steps can organizations take to make their cloud-based systems more secure? ○ Organizations can ensure that they have done everything that was their responsibility and follow up by keeping their cloud software configured and up to date. Cloud service customers should carefully review their cloud services agreement with their cloud services provider to make sure their applications and data hosted in cloud services are secured in accordance with their security and compliance policy. It is also essential to update security requirements developed for enterprise data centers to produce requirements suitable for the use of cloud service. 4. Should companies use the public cloud to run their mission-critical systems? Why or why not? ○ Using public cloud disrupts traditional cybersecurity models that many companies have built up over years. As a result, as companies make use of the public cloud, they need to revise their cybersecurity practices in order to consume public cloud services in a way that enables them both to protect critical data and to fully exploit the speed and agility that these services provide. For this reason, I think that companies should not use the public cloud to run their mission-critical systems as there are too many security threats imposed by using the public cloud....


Similar Free PDFs