University of Phoenix – CMGT 441
Ryan Monaghan
Cloud computing is a fast growing information technology trend that many companies including Google, Microsoft, and IBM are currently looking to get a stake in as demand for the service grows. Cloud computing is the concept of allowing both individuals and businesses to store data and applications on remote servers (owned and operated by a third party company), rather than on their own hard drives and data centers. The service boasts the ability to securely access data and applications from just about any device with an internet connection, allowing for such services as streaming music from a personal collection from multiple devices, and even to business development and storage of applications on remote servers. For the past few years, cloud computing has quickly grown in popularity, and as such, has come with its own set of risks and security concerns. As use of this service grows by both consumers and businesses, it will no doubt continue to attract the attention of hackers and cyber criminals, as it offers a central repository of data that can contain everything from financial statements, to company intellectual property. On 7/11/2011, eweek.com posted an article called “Cloud Computing Security: 10 Ways to Enforce It”, which attempts to give several suggestions on the best way to ensure that cloud computing is as safe as it is convenient. The articles goes through 10 steps that it claims are sure fire ways to ensure that security in cloud computing is effective. While I think that the suggestions given seem valid and thought out, I found that the lack of details and information left much to be desired. I think that the importance of such a topic, especially as cloud computing continues to grow in popularity and use, cannot be taken lightly, and thus these articles are crucial. The article gives the following 10 steps:
1. Identify the Foundational Controls – These are the
References: Preimesberger, Chris (2011). Cloud Computing: 10 Ways to Enforce it. Retrieved from http://www.eweek.com/c/a/Cloud-Computing/Cloud-Computing-Security-10-Ways-to-Enforce-It-292589/