首页> 外文期刊>Engineering Mathematics >Assessing and Mitigating the Security Concerns, Threats and Associated Risks with Cloud Adoption
【24h】

Assessing and Mitigating the Security Concerns, Threats and Associated Risks with Cloud Adoption

机译:通过采用云来评估和缓解安全问题,威胁和相关风险

获取原文
           

摘要

Cloud Computing Security is part of the foreseeable evolution of Information Technology (IT) which any organisation intending to attain or sustain competitiveness must need to embrace in order to play in the evolving digital economy. Evidently, companies who tackle cloud computing responsibly need not entertain fears of security concerns, threats and associated risks on the path to the cloud. This research paper unveils that the concerns of handling security, privacy or forensic in the cloud virtualised environment are not as much a nightmare as compared to addressing them in-house. In an environment where information systems security and privacy has become paramount concern to enterprise customers, the risk of unauthorized access to information in the cloud poses a significant concern to cloud stakeholders. In a bid to mitigate the inevitable threats concerns of the associated stakeholders, this research prescribes the deployment of a cloud computing threat model, relevant to all other computing environments. Further, the research undertook and accessed a survey which was designed to identify and rank the various security, privacy, and forensic issues plaguing fears to the full adoption and deployment of this new computing paradigm. The survey was geared at the Nigeria marketplace among practicing IT professionals and organisations. Consequently, the drive to underpin this new direction and computing paradigm was advocated where the research highlights and ranks some of the operational concerns for cloud users in Nigeria, and further suggests measures to raise the level of awareness and engagement around those concerns within the constituencies of various consumers of the services. However, the research further argues that proper implementation of security, privacy, and forensic measures should not just be seen as the cloud providers' sole concern, but the responsibilities of all consumers of the services. Thus, the paper prescribes techniques which could help cloud users maintain control of their data at rest or in transit within the cloud networks rather than outsource control to external vendors as usual.
机译:云计算安全性是信息技术(IT)可预见的发展的一部分,任何企图获得或维持竞争力的组织都必须加入云计算安全性,才能在不断发展的数字经济中发挥作用。显然,负责任地处理云计算的公司不必在通往云的道路上担心安全问题,威胁和相关风险。该研究论文揭示,与内部解决这些问题相比,在云虚拟化环境中处理安全性,隐私或取证问题的担忧不算是一场噩梦。在信息系统安全性和隐私已成为企业客户最关心的环境中,未经授权访问云中信息的风险使云利益相关者非常关注。为了减轻相关利益相关者不可避免的威胁问题,本研究规定了与所有其他计算环境相关的云计算威胁模型的部署。此外,该研究进行并访问了一项调查,该调查旨在识别和排序各种安全性,隐私和取证问题,这些问题困扰着人们对这种新的计算范式的全面采用和部署的担忧。该调查是针对尼日利亚市场的IT专业人士和组织的。因此,提倡为该新方向和计算范式奠定基础的驱动力,该研究突出并排列了尼日利亚云用户的一些运营关注点,并进一步提出了一些措施,以提高对这些关注点的关注和参与程度。各种消费者的服务。但是,研究进一步指出,正确实施安全性,隐私和取证措施不仅应被视为云提供商的唯一关注点,而且还应视为服务所有消费者的责任。因此,本文规定了一些技术,这些技术可以帮助云用户在云网络内保持对数据静态或传输中数据的控制,而不是像往常一样将控制权外包给外部供应商。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号