Grin logo
de en es fr
Shop
GRIN Website
Publicación mundial de textos académicos
Go to shop › Informática - Informatica de negocios

Cloud Computing

Título: Cloud Computing

Trabajo de Investigación , 2011 , 19 Páginas , Calificación: A

Autor:in: Natasha Maingi (Autor)

Informática - Informatica de negocios
Extracto de texto & Detalles   Leer eBook
Resumen Extracto de texto Detalles

Computers have increasingly become the central tool for information management for governments, corporations, non-profit organizations and individuals around the globe. The emergence of the internet has only solidified this fact even more. As computers have acquired this significant and dominant role in the affairs of mankind, a plethora and wide-array of advancements in computer technology has naturally occurred. Relatively recent hardware innovations have brought the world tablet PCs, transformer pads, smartphones with extraordinary computing capabilities, and desktop PCs with unprecedented storage and processing speeds. The realm of software development has produced countless pieces of software which cover an exceedingly wide range of functions. Even so, neither software, nor hardware alone stands as the most cutting edge computing tool. Interestingly enough, it is a marriage between the two that has become the single most ground-breaking revolution in current computing. It is known as cloud computing. Although cloud computing has various security-based disadvantages which must be addressed by cloud providers as well as consumers, the solution to these disadvantages, as well as the benefits of employing cloud computing in general, greatly outweigh the disadvantages. While the notion of cloud computing has arguably been around as long as the idea of the internet itself, cloud computing as it is understood today got its kick start with companies such as Salesforce.com and Amazon Web Service which both offered online applications (Hempel, 2009; Tonellato, 2001). Witnessing the success of these two endeavors and seeing an opportunity for expansion in this realm, Google launched its own cloud computing service, Google Docs, in 2006 (Langley, 2008). Since then, countless other companies have entered the marketplace, each offering different kinds of cloud computing services. The benefits harvested from cloud computing has kept customers flocking and promises to keep them running towards the technology.

Extracto


Table of Contents

1. Introduction

2. Security Risks in Data Transfer in Cloud Computing

2.1 Solution to Security Risks in Data Transfer in Cloud Computing

3. Security Risks in Software Interfaces in Cloud Computing

3.1 Solutions to Security Risks in Software Interfaces in Cloud Computing

4. Security Risks in Data Storage in Cloud Computing

4.1 Insider Attacks

4.2 External Hacker Attacks

4.3 Glitches in the System

4.4 Solutions to Security Risks in Data Storage in Cloud Computing

4.4.1 Insider Attacks

4.4.2 External Hacker Attacks

4.4.3 Glitches in the System

5. Conclusion

Objectives and Topics

This work examines the critical security landscape of cloud computing, aiming to identify primary vulnerabilities and define effective mitigation strategies for both service providers and consumers to ensure safe information management.

  • Fundamental security risks in cloud-based data transfer and software interfaces.
  • Categorization of storage threats: malicious insider attacks, external hacking, and system glitches.
  • Assessment of organizational responsibilities and workforce transparency in cloud security.
  • Analysis of real-world security breaches and their impact on industry confidence.
  • Best practices for implementing rigorous hiring standards and robust technical security controls.

Excerpt from the Book

Security Risks in Data Storage in Cloud Computing

Once a system has been established to transfer information from local networks or devices securely, and interfaces are also made secure, it is then necessary for the information on the cloud to remain secure. Data storage is certainly the number one area of cloud computing security that seems to have many potential users concerned. No doubt this is the number one factor about cloud computing that makes CIOs, CTOs and individual users afraid of the cloud. When an organization or an individual has sensitive information stored in a local network or on a single device, the organization or individual not only has the luxury of monitoring very closely the different people that may access the information, they also have a much better opportunity to protect the information physically as well as through cyber efforts. In such a case, the organization or individual may employ physical monitoring systems such as cameras, physical security systems such as alarms, and computer-based monitoring and security systems as well. In short, the organization or individual has full control over the data.

Summary of Chapters

Introduction: Provides an overview of the rise of cloud computing, highlighting its operational benefits while acknowledging the critical security concerns that lead to organizational hesitancy.

Security Risks in Data Transfer in Cloud Computing: Explores the inherent vulnerabilities of transferring data over the internet and proposes encryption and secure protocols as primary solutions.

Security Risks in Software Interfaces in Cloud Computing: Discusses how application programming interfaces serve as potential entry points for security breaches and emphasizes the need for planned, secure interface management.

Security Risks in Data Storage in Cloud Computing: Analyzes the three major threat vectors to stored cloud data—insider threats, external hackers, and accidental system glitches—and outlines preventative strategies for each.

Conclusion: Synthesizes the core argument that while cloud computing carries distinct security risks, these can be mitigated through diligence, vigilance, and collaborative responsibility between providers and customers.

Keywords

Cloud Computing, Data Security, Cybercrime, Information Management, Encryption, Insider Attacks, Hacker Threats, Data Breaches, Infrastructure Security, IT Governance, Risk Mitigation, Software Interfaces, Data Storage, Network Security, Workforce Discipline

Frequently Asked Questions

What is the primary focus of this work?

The paper primarily explores the security landscape of cloud computing, specifically addressing why organizations are hesitant to migrate to the cloud and how they can address the associated risks.

What are the central themes discussed?

The central themes are the three primary vectors for security threats: data transfer, software interface interaction, and long-term data storage.

What is the overarching goal of the research?

The goal is to determine how the benefits of cloud computing can be maximized while ensuring that security vulnerabilities are adequately addressed by both providers and end-users.

Which methodology is employed in this study?

The study relies on a comprehensive literature review and an analysis of recent real-world data breaches, such as those involving Sony, Google, and Dropbox, to illustrate security failures and successful mitigation strategies.

What topics are covered in the main body?

The main body treats the specific risks of data transfer, the vulnerabilities inherent in software interfaces, and the critical categories of data storage threats: insider attacks, external hacking, and inadvertent glitches.

Which keywords best characterize this publication?

Key terms include Cloud Computing, Data Security, Risk Mitigation, Insider Attacks, Data Breaches, and Infrastructure Security.

Why are insider threats considered particularly dangerous in the cloud?

Insider threats are significant because they involve authorized individuals who may bypass conventional security controls, and they are facilitated by lax hiring standards and poor organizational transparency at the service provider level.

How can providers mitigate the risk of accidental system glitches?

Providers can mitigate these risks by maintaining high levels of attentiveness, learning from past operational failures, and continuously reviewing their infrastructure to ensure that human error is minimized.

Final del extracto de 19 páginas  - subir

Detalles

Título
Cloud Computing
Universidad
University of Kent
Calificación
A
Autor
Natasha Maingi (Autor)
Año de publicación
2011
Páginas
19
No. de catálogo
V269109
ISBN (Ebook)
9783656599821
ISBN (Libro)
9783656599814
Idioma
Inglés
Etiqueta
cloud computing
Seguridad del producto
GRIN Publishing Ltd.
Citar trabajo
Natasha Maingi (Autor), 2011, Cloud Computing, Múnich, GRIN Verlag, https://www.grin.com/document/269109
Leer eBook
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
Extracto de  19  Páginas
Grin logo
  • Grin.com
  • Envío
  • Contacto
  • Privacidad
  • Aviso legal
  • Imprint