CSQ1: Although cloud computing have the potential to deliver powerful benefits, they pose new challenges to system security and reliability. Cloud computing is indeed cloudy, and due to lack of transparency it creates so many problems. One of the major security issue is cloud computing is highly distributed. Cloud applications and application mash-ups reside in virtual libraries in large remote data centers and server mainly supplies business services and data management for multiple corporate and organizations clients. To save money and keep costs low, cloud computing providers often distribute work to data centers around the globe where work can be accomplished most efficiently. When we are using the cloud, we don’t know where our data is hosted and might not even know the country where they are being stored. The dispersed nature of cloud computing makes it difficult to track unauthorized activity. Virtually all cloud providers use encryption, such as Secure Sockets Layer, to secure the data they handle while the data are being transmitted. But if the data are stored on devices that also store other companies’ data, it’s important to ensure these stored data are encrypted as well. It is essential to understand if and how data can move in and out of the cloud. Having a high-level understanding of the security risks involved also enables businesses to understand which security and risk controls are appropriate to be executed, and to act proactively. CSQ2: The factors that contribute to these problems are as follows:
One way to deal with this is to use a cloud vendor that is a public company, which is managed by law to keep a eye on it how it manages information. Another way is to use a cloud provider that give subscribers the option to choose where their cloud computing work takes place.
Even if your data are
References: * Management and Information Systems-Managing the Digital Firm-12th edition. * http://cloudcomputingtopics.com/2010/09/understand-the-security-risks-in-cloud-computing/. * http://www.xerox.com/downloads/usa/en/gdo/whitepapers/GDO_whitepaper_cloud_computing_120611_HR.pdf. * http://blog.microstrategy.com/2012/07/how-secure-is-cloud-computing-part-4/. * http://www.infosecisland.com/blogview/17690-Is-Cloud-Computing-Secure.html. * http://www.sans.org/reading_room/analysts_program/McAfee_Data_Protection_Cl_Jul09.pdf. CASE STUDY