Cloud Computing Risk Securities Essay
Enhance my paper from 22 pages to 45 pages in total
1. Introduction currently 8 pages, enhance it to 14 pages
2. Literature review currently 14 pages, enhance it to 31 pages
3. Currently 38 references, enhance it to 70 references in total
Topic: “The effects of Cloud Computing Risk, on the security and future directions on Data Migration to deliver a service over a network.”
Chapter 1 – Outline
Chapter 2 – Literature Review. Cloud Computing Risk Securities Essay
Chapter 1 – Outline
Abstract
Cloud computing is simply an on-demand service that makes it possible for users and enterprises to access computer system resources more so data storage and computing capabilities without the direct active administration by the users or institutions. Cloud computing has been identified to offer several benefits. Some of the benefits are helping organizations and users cut on their costs, acceleration innovation through data and information sharing, improving marketing speeds, and increasing operation capabilities by scaling applications that are on demand. As much as cloud computing has numerous benefits to users, its structure and mode of operation have been found to place data and networks at risk and in general expose organizations to numerous security risks.
To understand the risks associated with cloud computing it is advisable to study the features of cloud computing, the benefits of cloud computing as well as the migration process. By conducting such a study, security experts can formulate the best way to implement a cloud solution without compromising their data and operations. There are six main security risks associated with cloud computing.
Data migration is an essential component of cloud computing. The effectiveness of cloud computing is highly dependent on data migration and system integrations. Organizations that safely migrate their data to cloud platforms are better placed to leverage the benefits of cloud computing in comparison to those that do not safely migrate their data. For organizations to ensure that they leverage the benefits of cloud computing they must deal with the security issues associated with cloud computing more so the migration challenges. organizations or users must have in place measures to prevent or counter shadow IT and insider dealings. Also, organizations and users must also have in place measures to ensure that security when using cloud services is guaranteed. Cloud Computing Risk Securities Essay
Introduction
Cloud computing is simply an on-demand service that makes it possible for users and enterprises to access computer system resources more so data storage and computing capabilities without the direct active administration by the users or institutions. Cloud computing is only possible through internet connections. Due to the nature of cloud computing, the technology has been found to place data and networks at risk. To understand the risks associated with cloud computing it is advisable to study the features of cloud computing, the benefits of cloud computing as well as the migration process. By conducting such a study, security experts can formulate the best way to implement a cloud solution without compromising their data and operations.
Cloud computing is considered to transform how information technology tends to be managed as well as consumed. Cloud computing has been identified to offer several benefits. Some of the benefits are helping organizations and users cut on their costs, acceleration innovation through data and information sharing, improving marketing speeds, and increasing operation capabilities by scaling applications that are on-demand (Tchernykh et al., 2019). Nevertheless, as cloud computing shape is emerging as a reliable technology as well as developing drastically both within reality as well as conceptually, privacy in addition to security matters still poses challenges that are considered to be significant. Cloud Computing Risk Securities Essay
The security risks in cloud computing
For organizations and users to access cloud computing services, they employ the services of cloud service providers. There are several cloud service providers such as Amazon and Microsoft. For one to effectively use the services offered through cloud computing, they must reveal their data and even trade secrets to the service providers (De Carvalho et al., 2017). The providers then integrate the data provided and the systems provided to their cloud infrastructure. Through the integration, users can effectively carry out their functions and transactions online regardless of the location there are in. All that is needed is a secure and reliable internet connection. Majority of the security risks associated with cloud computing stem from the fact that users have to share their data with cloud service providers to access cloud computing capabilities (Rashid &Chaturvedi, 2019).
- Reduced visibility and control of data and other assets
There are six main security risks associated with cloud computing. The first risk is that users have reduced visibility and control of their data and specific assets. When institutions and users opt to employ the services of external cloud services, the responsibility for some infrastructure and policies inevitably move to the cloud service provider. Consequentially, there is a paradigm shift as regards security logging and monitoring.Cloud Computing Risk Securities Essay
The majority of the time, organizations adopt cloud computing they have to perform the monitoring as well as the analysis of information about data, services, applications, and users without the use of network-based monitoring which can only be done on on-premise IT resources. In most cases, organizations have to be content that their cloud service providers will implement security measures that will secure their data as well as other assets. In some cases, cloud service providers do not offer security that effectively secures the assets of their clients.
- The use of on-demand self-services supports shadow IT
Cloud service providers normally make it easy for personnel of an organization to provision new services without IT consent. Consequentially, software that is supported by an organization’s IT department is introduced to an organization’s operations leading to shadow IT. Shadow IT is known to expose organizations to many unwelcomed risks. According to Chaudhry (2017), shadow IT leads to the easy introduction of malware into an organization’s network. Malware can compromise operations through ransomware, Trojans, and related viruses. Also, the use of shadow IT is known to decrease an organization’s control of its data and network.
- There is a possibility of a compromise of internet-accessible management application programming interfaces (API)
Due to the excessive reliance on the internet in cloud computing, cloud service providers can expose application programming interfaces that organizations use to interact with cloud services. Organizations use application programming interfaces to manage and monitor their assets and users. Unlike application programming interface management in on-premise computing, cloud service providers application programming interfaces are accessible via the internet and for that reason are exposed to potential exploitation. The interfaces can be turned into successful attacks that can compromise an organization’s assets and operations.
- Data deletion is never guaranteed
Organizations share their data with their cloud service providers to support operations via cloud services. Once organizations and users terminate their contracts with cloud service providers regardless of the reasons they can never be sure that their cloud service providers do not abuse their data. Organizations might dictate cloud service providers to delete data concerning the organizations but malicious cloud service providers might not fully comply. The lack of full compliance has the potential to lead to the leaking of trade secrets. Also, the undeleted data can be used for ransom purposes as well as compromise the operations of organizations.Cloud Computing Risk Securities Essay
- Leaking or loss of credentials
In the majority of cases, cloud service providers offer their services to several clients and in some cases, the clients can be competitors. Due to access to many customers’ data, cloud service providers are highly targeted by cybercriminals (Alex & Kishore, 2017). Cybercriminals are aware that if they compromise the administrative function of a cloud service provider they will be better placed to access the data of the cloud service providers’ customers. By accessing, the administrative functions of cloud service providers, cybercriminals have access to also the provider’s network, data, systems, and applications. Consequentially, cybercriminals can hack cloud service providers to compromise the data and credentials of clients.
- High likelihood of insiders abusing authorized access
Insiders such as administrators and staff for both cloud service providers and organizations contracting cloud services who abuse their access to the networks, systems, and data are uniquely positioned to cause harm or exfiltration information. Due to there being many stakeholders, the probability of identifying insider culprits is difficult yet the damage caused by insiders can be too much. Insiders can use their authorized access to access and leak trade secrets as well as create backdoors for cybercriminals to access the networks in use. Through the backdoors created by insiders, cybercriminals can cause severe damages to the cloud service provides or to the organizations that have contracted cloud service providers. Cybercriminals can introduce ransomware as well as steal valuable data.
Data migration for cloud computing
There are several security risks involved in data migration for cloud computing. Top on the list is that a user might not be in a position to fully control their given data as well as control the performance of their applications once they are migrated to a cloud service provider for integration. Also, users may not have the capability of auditing or changing their data policies as well as the processes under which they are supposed to work. Furthermore, during migration, some segments of an application might be misarranged and this has the potential to harm a specific application’s performance (Patrignani, et.al, 2016).Cloud Computing Risk Securities Essay
The other main issue as regards security risks during data migration is meeting all data regulations. Trying to comply with regulations at times might be complicated more so if it concerns issues on cross-border. Organizations must consider all possible regulation restraints that may affect their data migration. For example, some countries do not support cloud computing as they consider cloud computing to be highly vulnerable. In such countries, data migration is prohibited. Some countries prohibit the migration or transfer of customers’ data without the consent of customers. Countries like the United States have many rules that cover the distribution of data as well as the transfer and share of personal data.
ORDER A PLAGIARISM- FREE PAPER NOW
The other main risk is the possibility of cloud consumers losing their general data by having the data locked into proprietary formats. Consequentially, organizations can lose control over their given data. The main reason for this is because the monitoring tools on the one using the data or who can view the data tend not to be offered to the consumers of cloud computing. As a result, the loss of data is considered to be a possible risk after data has been migrated (Sharma, et.al, 2017).
The fourth risk is that it might not be easy to have service level agreements that are tailor-made concerning the particular necessities of an enterprise. The compensation provided because of downtime might be inadequate. Also, the service level agreements have high probabilities of not covering the concomitant damages. It is considered to be making sense in balancing the expense of guaranteeing uptime which is internal against the benefits of choosing the cloud. There is also the risk of malware infections – this is mainly because of data that is in massive volumes being stored on the cloud. It also needs an internet connection in storing the data therefore anyone who is utilizing cloud services is at risk of encountering cyber-attacks (Tchernykh, et.al, 2019).Cloud Computing Risk Securities Essay
There is also the security issue of making sure that there is the availability of data integrity which involves its storage, transfer as well as retrieval which indicates that it gets to change only when responding to transactions that are authorized. The challenge is that there is no standard in place to ensure the integrity of data during migration. Cloud migration is considered to be among the top issues discussed when cloud managers are discussing the adoption of cloud computing services (Elzamly, et.al, 2019).
Cloud tends to behave the same as an interface via which companies are capable of accessing data within a virtual environment. Therefore, the smooth functioning of the cloud relies on how appropriately groomed as well as knowledgeable the providers of the cloud are within this region. Additionally, if migration of data is not carried out systematically as well as appropriately, it is capable of causing problems concerning data as well as cloud security of the assets of an organization. Bearing the above in mind, it is necessary to hire cloud providers who have experience which is sound concerning the field so that cloud service management can be done efficiently as well as effectively (Zelenkov, 2016).Cloud Computing Risk Securities Essay
Conclusion
Data migration is an essential component of cloud computing. The effectiveness of cloud computing is highly dependent on data migration and system integrations. Organizations that safely migrate their data to cloud platforms are better placed to leverage the benefits of cloud computing in comparison to those that do not safely migrate their data. In the migration process, two main things must be considered. The first thing is the type of data being migrated. Trade secret and proprietary data ought to be migrated in phases to ensure that it is not compromised or that it is not altered during migration. Secondly, customers or organizations must consider the volume of data being moved in the migration process. Large data volumes must be moved in blocks or phases to ensure that all data is moved in the migration process. The failure to segment large data volumes has the potential to lead to data loss in the migration process.
As much as migration is the center of focus during cloud computing, organizations and users must consider the security risks associated with cloud computing before adopting the technology. Cloud computing offers numerous benefits to users such as easy access to data and systems from any location of the world given that there is internet access. Due to the easy access, organizations and users can streamline operations. For organizations to ensure that they leverage the benefits of cloud computing they must deal with the security issues associated with cloud computing. For example, organizations or users must have in place measures to prevent or counter shadow IT and insider dealings. Also, organizations and users must have in place measures to ensure that security when using cloud services is guaranteed.Cloud Computing Risk Securities Essay
Chapter 2 – Literature Review
Abstract
Cloud computing is a novel paradigm capable of combining multiple computing technologies and concepts of the internet to come up with an agile and cost-effective business platform and information technology infrastructure. Adoption of cloud computing in various industries has been on the rise in the recent past. This has enticed organization yearning to go digital get interested with the technology. Adoption of cloud computing requires migration of data and information from the existing servers to cloud servers, a process known as data migration. The purpose of the process is making information available for use over the network. Data migration is vulnerable to several cloud computing risks, as revealed in this paper.
Keywords- Security; Cloud Computing; Data Migration
Introduction
Cloud computing is a novel paradigm capable of combining multiple computing technologies and concepts of the internet to come up with an agile and cost-effective business platform and information technology infrastructure. In the recent past, the adoption of cloud computing in various industries has been on the rise. This has positively impacted the maturity of the markets associated (Hammami et al., 2017). Despite the increasing popularity of cloud computing services like Amazon EC2, a good number of people are still unclear on the path to take because of the associated security issues. Some people lack a solid understanding of what cloud computing is. Cloud Computing Risk Securities Essay