EXECUTIVE SUMMARY According to the research from different sources, the cloud-security market services is expected to be around $4 billion in revenue in 2016, up from $2.1 billion from the previous year. As most of the businesses are moving to the cloud, it is important that we should understand best practices of cloud security to provide transparency when it comes to the solutions. The Cyber security in cloud computing is targeted to reduce the security threats in cloud environment. This project involves in creating a knowledge base to establish comprehensive research plans for improvement in cybersecurity and for developing tools that will work efficiently in this area. The primary aim is to research the feasibility to develop minimum performance requirements in cybersecurity to perform efficiently. PROJECT PURPOSE/JUSTIFICATION BUSINESS NEED/CASE In today’s global, digital world, data rules and safeguarding intellectual property, financial information, and company’s reputation is a crucial part of business strategy. Yet with the number of threats and the sophistication of attacks increasing, it’s a formidable challenge. The undertaking has been made to enhance the security considering the extensive variety of danger from outer security breaks. The expenses connected with the effective outline and execution of these efforts to establish safety will be recuperated as an aftereffect of the expected lessening in monetary harms. BUSINESS OBJECTIVES The business
Because technology is consistently growing and changing, preventative measures must include flexibility to allow for change and growth. Without these considerations, a business could jeopardize themselves by restricting the ability to expand or even update the systems with necessary security patches. Preventative measures should include future growth. As technology grows, risks increase. Protection mechanisms will change as new threats are introduced to business as well as new legislations. Many security standards are based on data protection regulations and as laws change or new laws are introduced, information technology is the most costly element in ensuring compliance. There could be costly ramifications with poor planning.
There are three main factors that need to be addressed when examining physical and technical security. These are prevention, detection of threats, and finally the recovery of systems. Prevention’s goal is to stop breaches and thieves before they even have a chance to make a move. Prevention is one of the main goals of all cybersecurity. This prevention will be the first line of defence. Detection ensures that if the protections are breached that the cause and effect will be identified. These detections also help in changing the company’s security policies. Finally, is recovery is the way that the breaches are addressed. All systems affected will be restored in some fashion and further changes will be made to policy and documentations. If there is any physical damage, it will be fixed.
In today’s IT world every organization has a responsibility to protect the information and sensitive data they have. Protecting data is not only responsibility of security and IT staff but every individual is involved in protecting the information. The risks to information security are not digital only, but it involves technology, people and process that an organization may have. These threats may represent the problems that are associated to complex and expensive solution, but doing nothing about these risks is not the solution.
Organizations use the Cloud in a variety of different service models (SaaS, PaaS, IaaS) and deployment models (Private, Public, Hybrid). There are a number of security issues/concerns associated with cloud computing but these issues fall into two broad categories: Security issues faced by cloud providers (organizations providing software-, platform-, or infrastructure-as-a-service via the cloud) and security issues faced by their customers.In most cases, the provider must ensure that their infrastructure is secure and that their clients’ data and applications are protected while the customer must ensure that the provider has taken the proper security measures to protect their information.
Research Objective: The main theme of this research paper is to protect sensitive information that any organization or business possess. With community’s increasing reliance on information systems and technology there is scope for security breaches, more likely to happen. Not only monetary loss it can create damage to information assets that has sensitive data. To secure these assets from any internal or external damage organizations has to follow proposed rules and guidelines. Also security responsibilities
A successful business works on the basis of revenue growth and loss prevention. Whenever an organization start a project, they first plan for security because security breach can impact on overall project like data leakage, down-time and reputation loss. This may, in turn, impact on the company’s bottom line and ultimately profit margins. A virus attack on project or a network breach can cost a business thousands of dollars. In some cases, it may even lead to legal liability and lawsuits.
Now a day, companies are focusing and investing more on IT security, where the company’s and customers’ personal and financial information managing and storing. Certainly, more cost involves in this process. Companies who failed in security breach prevention paid and paying huge amount. Example for this is Target. This multinational grocery stores company’s data breached in 2013 this affecting its business. Furthermore, by 2015 nearly 1000 Target employees lost their jobs and the company is facing legal suits from bankers and customers.
The Firm is a trusted information security firm. Practices include security testing services, compliance assessments and validation, education and training, and solving complex IT security problems. Our philosophy is to deliver value with every engagement, and provide results that actionable.
There are numerous ways one can gain unauthorized access to data maintained in the cloud’s data centers. The methods vary from physical theft to trickery and electronic attack. Common methods of attack include cracking weak passwords, privilege escalation, exploiting unused database functionality, targeting known unfixed software vulnerabilities, SQL injection, and stealing unencrypted back-up tapes (Higgins, 2008).
In this paper, the authors survey many sources and literature on cloud security issues, namely vulnerabilities, threats, and attacks. A total of 504 articles were look at to gather the data used in this paper. While the authors use this number to say that the research trend is up on mitigating security risks, they also suggest that security is the main priority of most research to the detriment of other areas. They offer no concrete numbers to back up this claim..
In this article, we discuss about the different cloud types and models, threats and vulnerabilities of cloud, and how to manage them. The main aim of this literature review is to identify the weak points in cloud computing, minimize the threats and improve the security system. We will also discuss two of the main concepts of cloud – virtualization and multi-tenancy (Mishra, Mathur, Jain, & Rathore, 2013). A brief analysis of each of the threat and security measure is described in the literature review.
In this fast-paced technology era, organizations are always looking for new innovative ways to increase productivity and efficiency. One emerging technology adopted by many organisations is cloud computing. Cloud computing is a model that uses internet and remote servers for maintaining data and applications (Association of Modern Technologies Professionals 2017). It replaces expensive infrastructure and need of maintenance. Cloud provides access to data anytime, anywhere over the internet. However, like any cyber technology cloud computing is vulnerable to various kinds of cyber-attacks (Amna Riaz 2017).
Safety of information is the most valuable asset in any organization particular those who provide financial service to others. Threats can come from a variety of sources such as human threats, natural disasters and technical threats. By identifying the potential threats to the network, security measure can be taken to combat these threats, eliminate them or reduce the likelihood and impact if they should occur.
Keywords: Cloud Computing, Security treats, Cloud service user, Cloud service provider, security challenges, cloud computing, threat and countermeasures
Almost all kind of large and small organizations might face increasing number of attacks into their network or intellectual property. This may lead to data disclosure, data destruction, and damage of organization’s reputation. There are numerous threats in the cyber space which might be capable of stealing, destroying or making use of out sensitive data for financial and non-financial gains. As the amount of computer, mobile and internet users increases, so does the number of exploiters.