scholarly journals Analysis of Cloud Computing Information Security Strategy in Biznet Networks

2017 ◽  
Vol 4 (2) ◽  
pp. 159
Author(s):  
Heri Sutrisno

Information security on cloud computing requires goodplanning and understanding of the risks, threats and vulnerabilities ofdata or information that is managed in a cloud computing environment.Measurement of information security in cloud computing is no differentto conventional information technology, which uses an approach basedon confidentiality, integrity and availability of information. Whereas thestandard used on information security such as NIST, CSA and COBITare often used to assess information security analysis of the cloudcomputing service providers. This research will review the informationsecurity strategy at Biznet Networks as a provider of cloud computingservices.

Author(s):  
Finn Olav Sveen ◽  
Jose M. Torres ◽  
Jose M. Sarriegi

2021 ◽  
Vol 7 (1) ◽  
Author(s):  
Salman M. Faizi, Shawon Rahman

Lack of alignment between information technology (IT) and the business is a problem facing many organizations. Most organizations, today, fundamentally depend on IT. When IT and the business are aligned in an organization, IT delivers what the business needs and the business is able to deliver what the market needs. IT has become a strategic function for most organizations, and it is imperative that IT and business are aligned. IT governance is one of the most powerful ways to achieve IT to business alignment. Furthermore, as the use of cloud computing for delivering IT functions becomes pervasive, organizations using cloud computing must effectively apply IT governance to it. While cloud computing presents tremendous opportunities, it comes with risks as well. Information security is one of the top risks in cloud computing. Thus, IT governance must be applied to cloud computing information security to help manage the risks associated with cloud computing information security. This study advances knowledge by extending IT governance to cloud computing and information security governance.


2016 ◽  
pp. 1585-1610
Author(s):  
Deniz Tuncalp

There are a number of risk domains that are relevant for information privacy and security in cloud-based scenarios and alternative deployment models, which require implementation of a number of controls. However, cloud service providers often take a one-size-fits-all approach and want all their customers to accept the same standardized contract, regardless of their particular information security and legal compliance needs. Taking ISO 27001 Information Security Management standard as a guide, we have employed the Delphi method with a group of cloud computing experts from around the world who are subscribed to the “Cloud Computing” group on LinkedIN to identify the most applicable controls in a generic cloud service provider – customer context. Based on these results, we use a sample of cloud computing customer service agreement as a case study to further discuss related contingencies. As a result, this chapter argues that a more balanced approach is needed in service contracts to ensure the maintenance of necessary service levels and the protection of cloud users.


Author(s):  
O Sri Nagesh ◽  
Tapas Kumar ◽  
Venkateswara Rao Vedula

Significant exploitation and utilization of cloud computing in industry is come with and in the identical time vulnerable by unease regarding protection of data hold by cloud computing providers. One of the penalties of moving data processing and storage off business site is that organizations have fewer controls over their infrastructure. seeing that, cloud service (CS) providers must hope that the CS provider is capable to protect their data and infrastructure from both exterior and domestic attacks. Presently however, such hope can only rely on organizational procedures stated by the CS provider and cannot be remotely verified and validated by an external party. The central distinction between cloud computing and conventional enterprise internal Information Technology services is that the proprietor and the consumer of cloud Information Technology infrastructures are separated in cloud. This transform requires a safety responsibility severance in cloud computing. Cloud service providers (CSP) should safe the services they propose and cannot surpass the customers’ authorities. Virtualization is a buildup utterance in the Information Technology world. With the assure to reduce the ever mounting infrastructure inside data centers connected to other important apprehensions such as ease of use and scalability, virtualization technology has been in advance recognition not only with IT experts yet also among administrators and executives as well. The progressively more growing rate of the approval of this technology has exposed these systems to new protection concerns which in recent history have been unnoticed or merely overlooked. This paper presents an in depth state of art gaze at  present most old server virtualization explanations, as well as a writing study on different security matters found inside this virtualization technology. These problems can be practical to all the existing virtualization technologies accessible with no spotlight on a specific answer. Nevertheless, we do susceptibility investigation of two of the mainstream recognized virtualization answers: VMware ESX and Xen. to conclude, we illustrate some clarifications on how to progress the security of online banking and electronic commerce, using virtualization.


2019 ◽  
Vol 8 (S1) ◽  
pp. 80-83
Author(s):  
J. VimalRosy ◽  
S. Britto Ramesh Kumar

Day by day witnesses a wide development of information technology in the use of cloud computing, and its services shape its architecture. It is indeed, that replaces the former attempts to enrich the security strategy in cloud computing. Security is one of the major issues in the cloud computing environment. In this paper we investigate about security threads and possible solution for cloud. The paper is categorized as follows: Section I describes the cloud computing overview. Section II describes the security threats and challenges in cloud computing. Section III describes the Obstacles and vulnerabilities that can be carried out to cloud environments. Section IV describes the possible solution of the issues. Section V concludes the paper with a cloud computing security.


Sign in / Sign up

Export Citation Format

Share Document