Strategies IT Security Managers use to Host Sensitive Information in the Commercial Cloud

 

Value For Money

Key To Success

Key To Success

Strategies IT Security Managers use to Host Sensitive Information in the Commercial Cloud

Order 100% Plagiarism Free Essay Now

This qualitative study aimed to investigate strategies IT security managers use to host sensitive information in the commercial cloud. Therefore, this section focuses on the application to professional and implication for change;  overview of the study; presentation of findings; application of professional practice, the implication for social change; recommendation for action; recommendations for further study; reflections; and summary and study conclusion.

Overview of Study

The study set out to demonstrate how security management in cloud computing remains a menace. Through this study, the scholar affirms just how necessary it is to ensure information is secured from all fronts to ensure organizational data does not find its way into the hands of rogue elements. The security nightmare evident in the cloud can be exploited through Wi-Fi hotspots and password cracks.  Nonetheless, service providers seem to offer poor encryption, an issue that subjects corporate to great risk. The study also highlights how information breaches, exploited vulnerabilities, account hacking, and denial of service authentication have enhanced the security narrative in cloud computing.  However, the study established that through formal and informal strategies, organizations could manage data breaches and recognize prospective sources of attacks and security holes. Moreover, the study determined that information exfiltration by insiders in most organizations enhances access to external cloud providers.  Insiders’ access to these platforms leads to vulnerabilities that external hackers exploit. Whether the attack is internal or external, it is the basis on which most organizations spend hefty budgets to manage security. It also takes the enactment of concrete policies to be able to safeguard sensitive data. On the contrary, the missing policy framework in the cloud environment can make suppliers institute low measures for safeguarding information.

Strategies IT Security Managers use to Host Sensitive Information in the Commercial Cloud

Order 100% Plagiarism Free Essay Now

References

 

Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and             challenges. Information Sciences,305, 357–383. doi:10.1016/j.ins.2015.01.025

Bacon, J., Eyers, D., Pasquier, T. F. J.-M., Singh, J., Papagiannis, I., & Pietzuch, P. (2014).           Information flow control for secure cloud computing. IEEE Transactions on Network and     Service Management, 11, 76–89. doi:10.1109/tnsm.2013.122313.130423

Barclay-Platenburg, L. (2013). Mitigating unethical behavior in public entities through an ethical risk management framework (Order No. 3602932). Available from ABI/INFORM Collection. (1468964267). Retrieved from http://search.proquest.com/docview/1468964267?accountid=45049

Chander, M., Jain, S. K., & Shankar, R. (2013). Modeling of information security management     parameters in indian organizations using ISM and MICMAC approach. Journal of    Modelling in Management, 8(2), 171-189. doi: http://dx.doi.org/10.1108/JM2-10-2011-     0054

Clarke, R. (2013). Data risks in the cloud. Journal of Theoretical and Applied Electronic    Commerce Research, 8(3), 59-73. Retrieved from     http://search.proquest.com/docview/1493991593?accountid=45049

Claycomb, W., & Nicholl, A. (2012). Insider threats to cloud computing: Directions for new         research challenges. IEEE 36th Annual Computer Software and Applications Conference,    2012. doi:10.1109/compsac.2012.113

Etro, F. (2011). The economics of cloud computing dagger]. IUP Journal of Managerial   Economics, 9(2), 7-22. Retrieved from    http://search.proquest.com/docview/869506400?accountid=45049

Fernandes, D., Soares, L., Gomes, J., Freire, M., & Inacio, P. (2014). Security issues in cloud                    environments: A survey. International Journal Of Information Security,13, 113–170.          doi:10.1007/s10207-013-0208-7

Lecy, J. D., & Beatty, K. E. (2012). Representative literature reviews using constrained snowball             sampling and citation network analysis. Available at SSRN 1992601.

Mallaiah, K., & Ramachandram, S. (2014). Applicability of homomorphic encryption and             CryptDB in social and business applications: Securing data stored on the third party    servers while processing through applications. International Journal of Computer     Applications, 100, 5–19. doi:10.5120/17487-7999

Mergel, I., & Bretschneider, S. I. (2013). A three-stage adoption process for social media use in    government. Public Administration Review, 73, 390–400. doi:10.1111/puar.12021

Mukwasi, C., & Seymour, L. (2012). Enterprise Resource Planning Business Case Considerations: A Review for Small and Medium-Sized Enterprises. Journal of      Innovation Management in Small & Medium Enterprises, 1–15.             doi:10.5171/2012.752328

Rafeeq, M. D., & Kumar, C. S. (2015). Reliable secure data storage in the cloud environments      and de duplication. International Journal of Computer Science and Engineering, 3,        1086–1091.

Ross, R. (2007). MANAGING ENTERPRISE RISK IN TODAY’S WORLD OF            SOPHISTICATED THREATS: A FRAMEWORK FOR DEVELOPING BROAD          BASED, COST-EFFECTIVE INFORMATION SECURITY PROGRAMS. Edpacs,             35(2), 1-10. Retrieved from     http://search.proquest.com/docview/234908030?accountid=45049

Ryan, J. E. (2006). A comparison of information security trends between formal and informal        environments (Order No. 3225287). Available from ABI/INFORM Collection.         (305356535). Retrieved from     http://search.proquest.com/docview/305356535?accountid=45049

Suo, S. (2013). Cloud implementation in organizations: Critical success factors, challenges, and    impacts on the it function (Order No. 3576584). Available from ABI/INFORM  Collection. (1467505085). Retrieved from     http://search.proquest.com/docview/1467505085?accountid=45049

Tang, C., & Liu, J. (2015). Selecting a trusted cloud service provider for your SaaS program.        Computers & Security,50, 60–73. doi:10.1016/j.cose.2015.02.001

Waleed, M. A., Chunlin, L., & Naji, H. A. (2014). The faults of data security and privacy in the   cloud computing. Journal Of Networks, 9.3313-3320 doi:10.4304/jnw.9.12.3313-3320

Weber, V., & Carblanc, A. (2014). Cloud computing: The concept, impacts and the role of government policy. (). Paris: Organisation for Economic Cooperation and Development (OECD). Retrieved from http://search.proquest.com/docview/1558355157?accountid=45049

Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., & Vasilakos, A. V. (2014). Security and   privacy for storage and computation in cloud computing. Information Sciences, 258, 371–        386. doi:10.1016/j.ins.2013.04.028

Whitley, E. A., Willcocks, L. P., & Venters, W. (2013). Privacy and security in the cloud: A         review of guidance and responses. Journal of International Technology and Information                        Management, 22, 77.

Yusop, Z. M., & Abawajy, J. (2014). Analysis of insiders attack mitigation strategies. Procedia – Social and Behavioral Sciences, 129, 581–591. doi:10.1016/j.sbspro.2014.03.716

Share this

Tags: , , , , , , , , , , , , , , , , , , , , , , , ,

Order Dissert Now

Order Dissert Now

We Guarantee

We Guarantee
 
error: Content is protected !!