Site icon Tutor Bin

Harvard Potential Information Security Benefits for Moving to The Cloud Discussion & Responses

Harvard Potential Information Security Benefits for Moving to The Cloud Discussion & Responses

Description

Cloud Computing – Post #4

In your final 250 to 500 word-long discussion post, identify two potential information security benefits for moving to the cloud and two potential information security drawbacks for being in the cloud.

response 1

Two potential information security benefits of moving to the cloud:

Data Security: Current companies depend on a digital workplace even more than before. Employees generally access the same data and share them with colleagues using multiple devices from different locations. These activities can result in massive data leaks and network-wide malware infections if not properly managed. Cloud services safeguard all data and provide sophisticated capabilities for simple exchange and cloud applications to employees and companies. Employees can interact with documents in a secure place, and the information can be transferred in that environment. The data is still available if an employee lost their device or has a laptop accident, preventing mass loss.

Security Updates: The cloud provides significantly higher security than traditional data centers since it centrally stores your business information and data. Many built-in security capabilities, including security analytics, frequent upgrades, and cross-enterprise visibility, are available from most notable cloud providers. Usually, cloud providers take care of more challenging security issues, such as preventing unwanted traffic from accessing the machines where your business data and apps are stored and ensuring that their systems receive automatic security fixes to keep them safe from the latest known security threats. This means that if your company has unique processes are currently or regulations.

Two potential information security drawbacks of being in the cloud:

Unauthorized Access: Cloud-based installations, unlike on-premises infrastructure, are outside the protected Network and easily accessible from the public Internet. While this is helpful in terms of employee and customer use of the cloud, also this also makes it easy for hackers unauthorized entry into a company’s cloud-based services. An attacker may acquire full access to the system through incorrectly configured security or hacked credentials, possibly without the company’s notice.

Cyberattacks: Cybercriminals select their targets based on how beneficial their attacks are likely to be. Cloud-based technology can be accessed from the open Network, can often be vulnerable, and holds much critical and valuable information. Moreover, because a variety of businesses uses the cloud, a successful attempt can be replicated on many occasions with a high possibility of winning. Therefore, hacking on cloud services is more frequent nowadays.

Reference:

Timothy Morrow 2018, 12 Risks, Threats, & Vulnerabilities in Moving to the Cloud – https://insights.sei.cmu.edu/blog/12-risks-threats…

https://www.cdnetworks.com/cloud-security-blog/wha…

Response 2

Cloud computing includes moving business-basic information and handling to locations outside of the organization’s computer. These external storage areas and capacities are regularly acquired from external experts. Cloud computing is undoubtedly no particular case where outsourcing can lead to threats. However, the efficiencies obtained using cloud computing technologies are being affirmed as authentic versus theoretical and should not be ignored.

Potential information security benefits of moving to the cloud

Increase Mobility:

One of the benefits of cloud computing for organizations is how colleagues can work from anywhere. This is very important when the working-class employees want flexibility in their timetables and workplace. In addition, organizations that work on the cloud can furnish staff with choices to chip away at the go or home from their work areas, computers, and smart devices (Gregory Zolkos 2017).

Aids of disaster recovery:

Setting up the system and securing the data on the cloud gives a better defense if there are any way of threats. Man-made and catastrophic events can destroy the hardware, shut off power and debilitate basic IT protocol. Supporting catastrophe get the lost data is one of the significant benefits of cloud computing for organizations (Gregory Zolkos2017).

Potential information security drawbacks of being in the cloud

Credentials are stolen:

The attackers can gain access to cloud user credentials as well as access to the CSP services which will lead to more confidential data. The attacker can take leverage of the resources from cloud computing and target the administrative user.

Stored data lost:

Coincidental erased by the cloud specialist organization, like a fire or natural disaster, can prompt the long-lasting loss of client information as well as data taken by the attacker. The weight of staying away from information misfortune doesn’t fall exclusively on the supplier’s shoulders. Assuming a client scrambles its information before transferring it to the cloud but loses the encryption key, the information will be lost (Timothy 2018).

Reference:

Gregory Zolkos,2017. 5 biggest benefits of moving to the cloud: The Business Journals

Marrow Timothy, 2018. 12 Risks, Threats, & Vulnerabilities in moving to the Cloud: Carnegie Mellon University

Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."

Exit mobile version