Business Environment Implementation Of Security And Risk Management Issues

1004 Words5 Pages
The research methodology is discussed in this chapter and research questions as formulated in the introduction chapter are discussed against the data that has been made available in the sample used for the study. Cloud computing is the latest in information technology and the sophistication of the technology appears to be advancing every six months, keeping up with the cloud technology and the different types of clouds that have emerged within the technology to suit different types of business environment have also increased the security risks as the intruders and penetrators are equally knowledgeable about technology. Defense Exploration methodology using for this investigation, for the business environment implementation of security and…show more content…
Description of Methodology The research methodology will consist of quantitative research with a range of statistical data that is empirical in nature in order to be able to evaluate the level of risks and the risks involved in migrating to the cloud. This is essential, as mentioned earlier the risks of penetration also increase proportionately when the cloud technology passes to more advanced stages of technical sophistication. Data Analysis In analysis, the data will be studied with the aim of trying to understand the risks in order to mitigate the risks or to minimize the existing risks in the cloud computing system. The objective is to extract the useful information from the analysis of the data collected during the course of the study, which will help in creating resolutions to the issues that surface regarding cloud computing security. The basic form of data analysis will be used to gather the information, which will help to unify the data empirically so that the statistical range of the risk levels and the types of risks in the security in the different cloud system and the risks in migrating to the cloud. Before the analysis the data will be lean and processed so that the integrity of the data is intact and is verifiable data. Research Questions What are the security issues and risks in migration to the hybrid clouds? For the first research question the information gathering
Get Access