1. CHAPTER 1 INTRODUCTION 1.1. BACKGROUND OF THE STUDY Nowadays, cloud computing system is widely known in business environment. As stated by Potey, Dhote and Sharma (2013) cloud computing already known by people as it is not a new technology but it is consider new in a delivery model for information and services that are normally use existing technology. It connects the communication between client and server side’s services or application by using an internet infrastructure. Cloud service providers (CSP’s) offer cloud platforms for their customers to use and create their web services, much like internet service providers offer costumers high speed broadband to access the internet. Cloud computing is another way to store business …show more content…
2. Study the factors affecting middle management awareness toward the security risks of the cloud computing 3. Measure the degree of exposion about the security risk of cloud computing among middle management. 1.4 RESEARCH QUESTION The research questions used in this study are: 1. Is there any relationship between middle management awareness and the security risks of cloud computing? 2. What are the factors affecting middle management awareness toward security risks of cloud computing? 3. What are the effects of awareness about the security risks of cloud computing toward the middle management? 4. Does the middle management are exposed to the security risks of cloud computing? 5. What is the importance of exposion about the security risks of cloud computing toward middle management? 1.5 SIGNIFICANCE OF THE STUDY To Employees i. By understanding the security risk of cloud computing the employees can be aware of the right way to use cloud computing. ii. This survey will help the employees to be more aware of the risk of cloud computing in order to protect business information. To Organization i. By understand the security risk of cloud computing organization can save money by paying for only the Information Technology (IT) computing resources they need. ii. Organization can ramp up or ramp down computing resources quickly without capital investment. iii. Organization can increase their reach to
Despite the numerous advantages offered by cloud computing, security is a big issue concerned with cloud computing. There are various security issues and concerns associated with cloud computing, among them being phishing, data loss and data privacy. There are
Cloud computing has recently emerged as a ground-breaking model for hosting and delivering services over the Internet. This paradigm is engaging to business organizations since it removes the need for users to plan ahead for provisioning and enables enterprises to start from minimal and increase resources only when there is an increase in demand for service. However, the deployment and implementation of cloud computing for enterprises has been characterized with various challenges and security concerns. In essence, the successful deployment and cloud computing in an enterprise needs proper planning and understanding of the various emerging threats, risks, vulnerabilities, and potential counter-measures. As there are top five challenges in cloud computing for the enterprise, there are various available solutions with varying benefits and limitations, which necessitate the development of a new solution.
Cloud computing is the new buzz in the recent days and allows users to share files and applications over the internet. This is the most important expansion in which it is an interaction between providers and customers. Basically it deals with how different computers are connected over the network at the same to run an application and also very useful for both large and medium scale industries which grade a lot more advantages and disadvantages of using. Instead of using local servers to handle the applications, this type of computing depends on sharing the computer resources. It is attracting much of the attention now-a-days which can be seen by observing the large companies of the IT industry like IBM,
However, research focusing on the adoption of cloud computing technology and its impact on business operation is limited. This trend may be explained by cloud computing being a relatively new field. Available research on the structures, processes, security measures surrounding the cloud services are still at an early stage.
Organizations use the Cloud in a variety of different service models (SaaS, PaaS, IaaS) and deployment models (Private, Public, Hybrid). There are a number of security issues/concerns associated with cloud computing but these issues fall into two broad categories: Security issues faced by cloud providers (organizations providing software-, platform-, or infrastructure-as-a-service via the cloud) and security issues faced by their customers.In most cases, the provider must ensure that their infrastructure is secure and that their clients’ data and applications are protected while the customer must ensure that the provider has taken the proper security measures to protect their information.
This research paper tackles the issues that faces Cloud Computing today and gives the experts and industry’s point of view on the matter. The aspects explored are the significant industry questions that have risen about the use of Cloud Computing, business value, organization impact, adaptability, limitations, initial cost of implementation, and the severe business security risks
The majority of us have been found out about the most cloud security disappointments in which all the cloud innovation organizations are kept on developing, despite everything they endure a similar kind of issues in-house infrastructure's. Distributed computing has turned into a greatest market in the present innovation. In a report of 2016, experts at Gartner anticipated that exchanging to cloud will influence $1 Trillion in Information innovation in the following five years. Cloud administrations showcase has developed to a degree level that it was not a striking level of aggregate it is spending, which was creating new innovations and new businesses which are conceived in the cloud. At the point when cloud administrations are going
The study by Glasberg et al (2014) analyzes the risks healthcare providers experience and the impact cloud computing has in using the new technologies. Focusing on overall risk management, the study takes a holistic approach, where the research focuses both on human and organizational aspects. Using interviews as a form of data collection, the authors categorize risks and assesses impact from 2 perspectives; supply (S) and information systems (IS) as shown in the table 1 below.
Recent technological advancements have resulted in an increased number of Internet-enabled devices, such as tablets and smartphones that can connect to corporate systems.These systems may also be running anywhere, including a public software-as-a-service (SaaS) cloud, a
This journal examines the various types of threats that a cloud-based company has to defend against. The authors recognize that the cloud has the potential to be a disruptive force in technology, and it examines the concerns that a business has for migrating to the cloud through the use of surveys. The benefits and risks are examined and the article provides statics and charts to illustrate the findings. The most interesting point of this article is it highlights the concerns customers have listing security as the number one reason preventing a business from migrating to the cloud. I plan to use this article to explain the challenges developers face in securing data on the cloud, not only with application development but also with educating businesses to alleviate misconceptions on cloud computing.
The high regard to cloud computing is on the rise due to its ability to improve flexibility, expand access to data, and lower costs. Cloud computing release organizations from being required to have their hardware and software infrastructure from being acquired and maintained (Holt, Niebuhr, Aichberger, & Rosiello, 2011). On the other hand, while there is much noise being made about the benefits of cloud computing, questions have been brought up with respect to whether cloud computing is safe especially when it comes to its privacy, security, and reliability. The purpose of this paper is to discuss the different general controls and audit approaches for software and architecture, cloud computing, service-oriented architecture, and virtualization. This paper gives a summary analysis of the recent research that is available. Additionally, risks and vulnerabilities associated with public clouds, private clouds, and hybrids have also been researched. Within the research conducted, there are important examples provided. Recommendations are shown on how organizations could implement and mitigate these risks and vulnerabilities. This paper even outlines a list of IT audit tasks that focuses on a cloud computing environment due to the results of the analysis, the risks and vulnerabilities, and the mitigation controls.
Ten years ago business professionals were grappling with the decision of whether to implement cloud computing into their organizations. Today, we no longer have the luxury of “If” we will embrace the new technology but rather “How” we will make it as safe as possible.
Cloud computing is vast and so are the security threats. When a company opts for cloud computing, it will consider the advantages, but some of the companies fail to consider the vulnerabilities that might lead to data lost and misuse.
Usage of remote servers via internet to store, manage and process data instead of using a personal computer is known as Cloud computing. It’s a set of Information Technology services with the ability to scale up or down their service requirements. Most of the cloud services are provided by a third party service provider. In cloud computing, organizations can utilize IT services without in advance investment. Despite its benefits obtained from the cloud computing, the organizations are slow in accepting it due to security issues and challenges. Security is one of the major problems which hinder the growth of cloud. It’s not wise to handing over the important data to another company; such that clients need to be vigilant in understanding the risks of data infringement in this new environment. This paper discusses a detailed analysis of the cloud computing security issues and challenges. (Ayoleke)
This project is going to discuss about the Cloud Computing and its application in business. To briefly describe what cloud