Risk Management in the Cloud and Cloud Outages

2015 ◽  
pp. 1721-1731
Author(s):  
S. Srinivasan

Cloud computing is facilitated often through the open Internet, which is not designed for secure communications. From the cloud user perspective, access to the cloud through a Virtual Private Network (VPN) is a possibility, but this is not the default access method for all cloud users. Given this reality, the cloud service users must be prepared for risk management because they do not control the cloud hardware or the communication channels. Added to this uncertainty is the potential for cloud service outage for risk management planning. In this chapter, the authors discuss the various aspects of risk management from the cloud user perspective. In addition, they analyze some of the major cloud outages over the past five years that have resulted in loss of trust. This list includes the outages in Amazon Web Services, Google, Windows, and Rackspace.

Author(s):  
S. Srinivasan

Cloud computing is facilitated often through the open Internet, which is not designed for secure communications. From the cloud user perspective, access to the cloud through a Virtual Private Network (VPN) is a possibility, but this is not the default access method for all cloud users. Given this reality, the cloud service users must be prepared for risk management because they do not control the cloud hardware or the communication channels. Added to this uncertainty is the potential for cloud service outage for risk management planning. In this chapter, the authors discuss the various aspects of risk management from the cloud user perspective. In addition, they analyze some of the major cloud outages over the past five years that have resulted in loss of trust. This list includes the outages in Amazon Web Services, Google, Windows, and Rackspace.


EDIS ◽  
2019 ◽  
Vol 2019 (3) ◽  
Author(s):  
Martie Gillen ◽  
Beatrice Pierre

As risks evolve and diversify, approaches to conducting business require a targeted focus on risk management, particularly in agriculture. This new 3-page document explores risk in agriculture, the need to understand risk, formation of strategies to manage risk, and government programs that exist to help growers and producers manage risk. Written by Martie Gillen and Beatrice Pierre, and published by the UF/IFAS Department of Family, Youth and Community Sciences, May 2019.  http://edis.ifas.ufl.edu/fy1482


2015 ◽  
Vol 7 (4) ◽  
pp. 237-257 ◽  
Author(s):  
Stephanie Kewley ◽  
Anthony Beech ◽  
Leigh Harkins ◽  
Helen Bonsall

Concepts in risk management in PPP projects have continuously evolved over the years. Introduction of new concepts, risk management planning, sustainability risk management and risk stakeholders, create a greater understanding of the acceptable workings of PPP projects. This chapter aims to investigate and compare these concepts in academic literatures and to the practices of PPP project implementations as exemplified in numerous PPP projects. This chapter reviews and analyzes information on these concepts. Extant literatures are reviewed and their take on the concepts are compared with the results obtained from the case studies. The chapter found both similarities and differences and also suggests some interesting researches on several key areas that should be emphasized for a better take in having an effective risk management strategy.


Author(s):  
Junfeng Tian ◽  
He Zhang

The credibility of cloud service is the key to the success of the application of cloud services. The dual servers of master server and backup server are applied to cloud services, which can improve the availability of cloud services. In the past, the failures between master server and backup server could be detected by heartbeat algorithm. Because of lacking cloud user's evaluation, the authors put forward a credible cloud service model based on behavior Graphs and tripartite decision-making mechanism. By the quantitative of cloud users' behaviors evidences, the construction of behavior Graphs and the judgment of behavior, they select the most credible cloud user. They combine the master server, the backup server and the selected credible cloud user to determine the credibility of cloud service by the tripartite decision-making mechanism. Finally, according to the result of credible judgment, the authors could decide whether it will be switched from the master server to the backup server.


Sign in / Sign up

Export Citation Format

Share Document