Preview

Cmgt 441 - Week 2 Individual

Better Essays
Open Document
Open Document
1626 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cmgt 441 - Week 2 Individual
Week 2 Individual Assignment
University of Phoenix – CMGT 441
Ryan Monaghan

Cloud computing is a fast growing information technology trend that many companies including Google, Microsoft, and IBM are currently looking to get a stake in as demand for the service grows. Cloud computing is the concept of allowing both individuals and businesses to store data and applications on remote servers (owned and operated by a third party company), rather than on their own hard drives and data centers. The service boasts the ability to securely access data and applications from just about any device with an internet connection, allowing for such services as streaming music from a personal collection from multiple devices, and even to business development and storage of applications on remote servers. For the past few years, cloud computing has quickly grown in popularity, and as such, has come with its own set of risks and security concerns. As use of this service grows by both consumers and businesses, it will no doubt continue to attract the attention of hackers and cyber criminals, as it offers a central repository of data that can contain everything from financial statements, to company intellectual property. On 7/11/2011, eweek.com posted an article called “Cloud Computing Security: 10 Ways to Enforce It”, which attempts to give several suggestions on the best way to ensure that cloud computing is as safe as it is convenient. The articles goes through 10 steps that it claims are sure fire ways to ensure that security in cloud computing is effective. While I think that the suggestions given seem valid and thought out, I found that the lack of details and information left much to be desired. I think that the importance of such a topic, especially as cloud computing continues to grow in popularity and use, cannot be taken lightly, and thus these articles are crucial. The article gives the following 10 steps:

1. Identify the Foundational Controls – These are the



References: Preimesberger, Chris (2011). Cloud Computing: 10 Ways to Enforce it. Retrieved from http://www.eweek.com/c/a/Cloud-Computing/Cloud-Computing-Security-10-Ways-to-Enforce-It-292589/

You May Also Find These Documents Helpful

  • Powerful Essays

    Cms 441 Week 1

    • 4767 Words
    • 20 Pages

    This discrepancy is between forward and reverse grouping owing to weak or missing antigens. This is a quite uncommon type of discrepancy. Some of the common causes in this group are:…

    • 4767 Words
    • 20 Pages
    Powerful Essays
  • Satisfactory Essays

    TCN Toys Human Resources department is proud to announce its first Two Day Offsite Training Session for the Hot Wheels Project. This training session will last anywhere from six to eight hours each day. All location managers will be required to attend. For the managers that are located over 50 miles from the training facility, TCN Toys will supply transportation and lodging. For the managers that are less than 50 miles from the training facility, TCN Toys will supply transportation only. All managers that are coming from locations over 50 miles from the training facility are being asked to arrive the day before to allow for the training to being at 8:00 am.…

    • 698 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    CMGT 575 Week 2 Summary

    • 348 Words
    • 2 Pages

    This file includes CMGT 575 Week 2 Individual Assignment SR-rm-004 Project plan of HR Integration of Riordan Manufacturing…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    When specifying security policies for an enterprise, setting security on an individual-by-individual basis provides the tightest and most personalized security. The tradeoff, however, is the increased amount of administration effort in setting up the security and maintaining it on an ongoing basis. You have been brought in as a consultant from Smith Systems Consulting to advise Riordan Manufacturing on what it will take to establish adequate enterprise security policies. You will need to prepare a 3-5 page paper that highlights why they should establish separation of duties via role assignment and how this will provide safeguards to protecting the data in their information systems.…

    • 354 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    CMGT/430 Week 4

    • 622 Words
    • 3 Pages

    Lafleur Trading Company, established in 1975, is a worldwide supplier of the finest foods and wines. With buyers dealing strictly with reputable producers and exporters, Lafleur Trading Company guarantees the highest quality products. Some concerns have surfaced about the direction the organization should take in regards to some key areas.…

    • 622 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    CMGT 575 Week 6 Summary

    • 385 Words
    • 2 Pages

    This work of CMGT 575 Week 6 Learning Team Assignment SR-kf-001 Project Final Presentation includes: Kudler Fine Foods - Coupons Project SR-kf-001…

    • 385 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Cmgt 430 Week 2

    • 1585 Words
    • 7 Pages

    University of Phoenix (2005). Huffman Trucking Service Request SR-ht-001. Materials section. Retrieved February 08, 2011, from https://ecampus.phoenix.edu/secure/aapd/cist/…

    • 1585 Words
    • 7 Pages
    Best Essays
  • Satisfactory Essays

    The objective is to successfully convert the United States Army Medical Department from EMR to AHLTA. There are trainers that are set in place to ensure that the staff receives their full attention and that they also feel comfortable with the software. The outcome of this would be to have the ability to easily communicate electronically regarding patients and is up to date with today’s advanced technology which will allow the compliance with government standards as well as high reimbursement for every office. . While being trained the staff should feel very comfortable when working with the software and to ensure that this happens a questionnaire is given for feedback.…

    • 655 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    CMGT 410 week 5

    • 308 Words
    • 2 Pages

    Enables project manager to analyze the findings of the review and improve on certain aspects in the next project that need attention.…

    • 308 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    CMGT 445 Week 2 IA

    • 814 Words
    • 3 Pages

    Each organization should implement their set of technical standards for configuration management and control. There are established guideline templates for different sets of configuration management already on the market. One such set of industry standards…

    • 814 Words
    • 3 Pages
    Better Essays
  • Better Essays

    Cmgt400 Week3

    • 1493 Words
    • 6 Pages

    Security authentication is a hot topic in today 's business world. However, many people may have differing ideas when it comes to what security authentication actually is. This paper will address those perceptions in a straightforward and easy to understand manner.…

    • 1493 Words
    • 6 Pages
    Better Essays
  • Good Essays

    The use of this tool will help provide an assessment for the stakeholders on the effectiveness of the internal security and controls related to the cloud computing environment. Deficiencies within the internal controls can be identified. An assessment can be prepared for the stakeholders that will help them determine if the quality and reliability of the service they are being provided is compliant with the results of the internals control audits.…

    • 1171 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    In this article, Patrick Thibodeau comments on Federal CIO Vivek Kundra’s claim that cloud computing concerns are exaggerated. Thibodeau explains clearly the claims made by Kundra about the overall security with cloud computing. Thibodeau blames the scare of cloud computing to IT developers belief of a status quo. Thibodeau concludes the article with a few success stories of basic cloud computing services working in the U.S. Government.…

    • 659 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Abstract—This paper discusses the security issues that arise in a cloud computing framework. We concentrate on what is typically called the metering problem or “proof of work” where the client can ascertain that the amount it is being billed for by the cloud service is in accordance with the amount of work done by it. We define many different attack scenarios and propose counter schemes for each. Our simulation and theoretical analysis show that the schemes require a reasonably low verification effort at the client side, and provide non-repudiation property.…

    • 4041 Words
    • 17 Pages
    Powerful Essays
  • Powerful Essays

    Inf 103: Computer Literacy

    • 1963 Words
    • 8 Pages

    The national Institute of Standards and Technology under the department of Commerce defines Cloud Computing as “a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction”. Another definition for cloud computing is a term used to describe a network of computers that deliver information technology services over the internet to many users in an on-demand environment (P.Y. Thomas 2011). As you can see by the definitions above the term Cloud Computing has been defined, yet many of us are barely getting to understand how this type of computing affects the work we do both in our personal life and in the workplace. In the following pages you will see how cloud computing is the way of the future without it being limited to business applications; furthermore creating a niche in the social media/personal computing we do on a daily basis.…

    • 1963 Words
    • 8 Pages
    Powerful Essays

Related Topics