Strategies IT Security Managers use to Host Sensitive Information in the Commercial Cloud
Strategies IT Security Managers use to Host Sensitive Information in the Commercial Cloud
Order 100% Plagiarism Free Essay Now
This qualitative study aimed to investigate strategies IT security managers use to host sensitive information in the commercial cloud. Therefore, this section focuses on the application to professional and implication for change; overview of the study; presentation of findings; application of professional practice, the implication for social change; recommendation for action; recommendations for further study; reflections; and summary and study conclusion.
Overview of Study
The study set out to demonstrate how security management in cloud computing remains a menace. Through this study, the scholar affirms just how necessary it is to ensure information is secured from all fronts to ensure organizational data does not find its way into the hands of rogue elements. The security nightmare evident in the cloud can be exploited through Wi-Fi hotspots and password cracks. Nonetheless, service providers seem to offer poor encryption, an issue that subjects corporate to great risk. The study also highlights how information breaches, exploited vulnerabilities, account hacking, and denial of service authentication have enhanced the security narrative in cloud computing. However, the study established that through formal and informal strategies, organizations could manage data breaches and recognize prospective sources of attacks and security holes. Moreover, the study determined that information exfiltration by insiders in most organizations enhances access to external cloud providers. Insiders’ access to these platforms leads to vulnerabilities that external hackers exploit. Whether the attack is internal or external, it is the basis on which most organizations spend hefty budgets to manage security. It also takes the enactment of concrete policies to be able to safeguard sensitive data. On the contrary, the missing policy framework in the cloud environment can make suppliers institute low measures for safeguarding information.
Strategies IT Security Managers use to Host Sensitive Information in the Commercial Cloud
Order 100% Plagiarism Free Essay Now
References
Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and challenges. Information Sciences,305, 357–383. doi:10.1016/j.ins.2015.01.025
Bacon, J., Eyers, D., Pasquier, T. F. J.-M., Singh, J., Papagiannis, I., & Pietzuch, P. (2014). Information flow control for secure cloud computing. IEEE Transactions on Network and Service Management, 11, 76–89. doi:10.1109/tnsm.2013.122313.130423
Barclay-Platenburg, L. (2013). Mitigating unethical behavior in public entities through an ethical risk management framework (Order No. 3602932). Available from ABI/INFORM Collection. (1468964267). Retrieved from http://search.proquest.com/docview/1468964267?accountid=45049
Chander, M., Jain, S. K., & Shankar, R. (2013). Modeling of information security management parameters in indian organizations using ISM and MICMAC approach. Journal of Modelling in Management, 8(2), 171-189. doi: http://dx.doi.org/10.1108/JM2-10-2011- 0054
Clarke, R. (2013). Data risks in the cloud. Journal of Theoretical and Applied Electronic Commerce Research, 8(3), 59-73. Retrieved from http://search.proquest.com/docview/1493991593?accountid=45049
Claycomb, W., & Nicholl, A. (2012). Insider threats to cloud computing: Directions for new research challenges. IEEE 36th Annual Computer Software and Applications Conference, 2012. doi:10.1109/compsac.2012.113
Etro, F. (2011). The economics of cloud computing dagger]. IUP Journal of Managerial Economics, 9(2), 7-22. Retrieved from http://search.proquest.com/docview/869506400?accountid=45049
Fernandes, D., Soares, L., Gomes, J., Freire, M., & Inacio, P. (2014). Security issues in cloud environments: A survey. International Journal Of Information Security,13, 113–170. doi:10.1007/s10207-013-0208-7
Lecy, J. D., & Beatty, K. E. (2012). Representative literature reviews using constrained snowball sampling and citation network analysis. Available at SSRN 1992601.
Mallaiah, K., & Ramachandram, S. (2014). Applicability of homomorphic encryption and CryptDB in social and business applications: Securing data stored on the third party servers while processing through applications. International Journal of Computer Applications, 100, 5–19. doi:10.5120/17487-7999
Mergel, I., & Bretschneider, S. I. (2013). A three-stage adoption process for social media use in government. Public Administration Review, 73, 390–400. doi:10.1111/puar.12021
Mukwasi, C., & Seymour, L. (2012). Enterprise Resource Planning Business Case Considerations: A Review for Small and Medium-Sized Enterprises. Journal of Innovation Management in Small & Medium Enterprises, 1–15. doi:10.5171/2012.752328
Rafeeq, M. D., & Kumar, C. S. (2015). Reliable secure data storage in the cloud environments and de duplication. International Journal of Computer Science and Engineering, 3, 1086–1091.
Ross, R. (2007). MANAGING ENTERPRISE RISK IN TODAY’S WORLD OF SOPHISTICATED THREATS: A FRAMEWORK FOR DEVELOPING BROAD BASED, COST-EFFECTIVE INFORMATION SECURITY PROGRAMS. Edpacs, 35(2), 1-10. Retrieved from http://search.proquest.com/docview/234908030?accountid=45049
Ryan, J. E. (2006). A comparison of information security trends between formal and informal environments (Order No. 3225287). Available from ABI/INFORM Collection. (305356535). Retrieved from http://search.proquest.com/docview/305356535?accountid=45049
Suo, S. (2013). Cloud implementation in organizations: Critical success factors, challenges, and impacts on the it function (Order No. 3576584). Available from ABI/INFORM Collection. (1467505085). Retrieved from http://search.proquest.com/docview/1467505085?accountid=45049
Tang, C., & Liu, J. (2015). Selecting a trusted cloud service provider for your SaaS program. Computers & Security,50, 60–73. doi:10.1016/j.cose.2015.02.001
Waleed, M. A., Chunlin, L., & Naji, H. A. (2014). The faults of data security and privacy in the cloud computing. Journal Of Networks, 9.3313-3320 doi:10.4304/jnw.9.12.3313-3320
Weber, V., & Carblanc, A. (2014). Cloud computing: The concept, impacts and the role of government policy. (). Paris: Organisation for Economic Cooperation and Development (OECD). Retrieved from http://search.proquest.com/docview/1558355157?accountid=45049
Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., & Vasilakos, A. V. (2014). Security and privacy for storage and computation in cloud computing. Information Sciences, 258, 371– 386. doi:10.1016/j.ins.2013.04.028
Whitley, E. A., Willcocks, L. P., & Venters, W. (2013). Privacy and security in the cloud: A review of guidance and responses. Journal of International Technology and Information Management, 22, 77.
Yusop, Z. M., & Abawajy, J. (2014). Analysis of insiders attack mitigation strategies. Procedia – Social and Behavioral Sciences, 129, 581–591. doi:10.1016/j.sbspro.2014.03.716