Preview

Risk Management Strategies

Good Essays
Open Document
Open Document
1210 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Risk Management Strategies
Risk management strategies:

Taking a step towards cloud is a big challenge but it is a great start to modernize the organization. The entire software framework of the system will be affected by this change. It’s not simple as said, it involves numerous unexpected complexities which are to be dealt with. It would also take significant development effort in terms of software development. With such big changes in hand system security and integrity cannot be compromised and issues in privacy and security are a major concern. Like mentioned above many questions arise when security and privacy of the system is considered. A strong security framework is essential to perform operations like authorization, restriction, identity management, etc.

The Open Data Center Alliance (ODCA) Cloud Provider Assurance model proposed a year ago suggested four different usage levels: basic security requirements (bronze), enterprise security equivalent (silver), financial organization security equivalent (gold) and military organization security equivalent (platinum).Perhaps it looks ambitiously simple but these frameworks could serve as a good platform to build a security system that would suit UMBC cloud.

To reduce the risk of imposters or masquerade or eavesdropping during the data transfer in a network, we also would have to implement Secure Sockets Layer (SSL) certificates are here to stand up to the risks. Using SSL encryption and authentication, SSL certificates have long been established as a primary security standard of computing and the Internet, and a no-brainer for securely transferring information between parties online. SSL offers encryption that prevents prying eyes from reading data traversing the cloud, as well as authentication to verify the identity of any server or endpoint receiving that data, it’s well-suited to address a host of cloud security challenges.

To address the problem of unauthorized access of static data, it is recommended to encrypt the data

You May Also Find These Documents Helpful

  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Cloud computing is a fast growing information technology trend that many companies including Google, Microsoft, and IBM are currently looking to get a stake in as demand for the service grows. Cloud computing is the concept of allowing both individuals and businesses to store data and applications on remote servers (owned and operated by a third party company), rather than on their own hard drives and data centers. The service boasts the ability to securely access data and applications from just about any device with an internet connection, allowing for such services as streaming music from a personal collection from multiple devices, and even to business development and storage of applications on remote servers. For the past few years, cloud computing has quickly grown in popularity, and as such, has come with its own set of risks and security concerns. As use of this service grows by both consumers and businesses, it will no doubt continue to attract the attention of hackers and cyber criminals, as it offers a central repository of data that can contain everything from financial statements, to company intellectual property. On 7/11/2011, eweek.com posted an article called “Cloud Computing Security: 10 Ways to Enforce It”, which attempts to give several suggestions on the best way to ensure that cloud computing is as safe as it is convenient.…

    • 1626 Words
    • 7 Pages
    Better Essays
  • Better Essays

    Cis 500- Cloud Computing

    • 1078 Words
    • 5 Pages

    Technology has taken great leaps of advancement. Some of the new technology that companies and consumers are taking advantage of to store and process data is cloud computing. Cloud computing was derived from virtualization. Virtualization allows companies to separate business applications from hardware. Doing this gives the company the capability of assigning applications as needed. The option to manage applications is a great benefit to companies. Resulting from the virtualization error, cloud computing has emerged to provide flexible IT infrastructures. This has not only enhanced the options companies now have, but it is also proven to be more cost efficient. This has increasingly become a preferred method of companies and consumers alike. (Turban, & Volonino, 2011, p.47)…

    • 1078 Words
    • 5 Pages
    Better Essays
  • Good Essays

    WFV1 Notes

    • 4474 Words
    • 16 Pages

    Symmetric/ asymertric encryption Network Technology Associate v2.0, Lesson 6: Network and Cloud Security Risks, section "Encryption.”…

    • 4474 Words
    • 16 Pages
    Good Essays
  • Best Essays

    Termpaper

    • 4159 Words
    • 22 Pages

    1.Identify the potential sales and department store transactions that can be stored within the database.…

    • 4159 Words
    • 22 Pages
    Best Essays
  • Good Essays

    Risk Assesments

    • 972 Words
    • 4 Pages

    Describe three procedures used to promote and maintain a healthy and safe sporting environment (P4). Explain three procedures used to promote and maintain a health and safety sporting environment (M3). Analyse three procedures used to promote and maintain a healthy and safe sporting environment.…

    • 972 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Risk Management

    • 622 Words
    • 3 Pages

    The Integrated Distributors Incorporated is a publically traded company that is facing many challenges. The company’s Information technology infrastructure has been ignored and many of its operating locations are running outdated hardware and software, which greatly increases the risk to the network in relations to confidentiality, integrity, and availability. Because of the outdated hardware and software, the company suffered some network compromises through their JV internet site and it led to disclosures of sensitive and strategic information.…

    • 622 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Risk Management

    • 2295 Words
    • 10 Pages

    The metrics that best work to measure Xemba Translations performance on this project is project diagnostic metrics. While not all risks of a project can be mitigated, using this objective data based on these metrics will make a huge difference to mitigate risk. Using diagnostic project metrics is like using a thermometer to assess the projects current status. This can help eliminate or mitigate the issue before it becomes unmanageable at the close of the project. This can help avoid the, should have, could have, would have moments that may happen once the project closes and gets reviewed from a retrospective project metric. With the diagnostic project metric when an issue does arise a contingency plan can be created if there is a trend toward a major risk as well. Diagnostic project metrics use current project statistics to gage where the project stands throughout the work of the project. This allows the project manager the ability to make better decisions along the route of the project to mitigate risk. Metrics that help improve the decision making, help aid to lower the risk of any project. Diagnostic metrics are comparative measures. The metrics compare a baseline (usually set at time of planning the project) to current project actuals. The actuals are compared to an earned value figure that is determined by where the project should be at that exact moment in time according to the project schedule. These diagnostic metrics will use the actual cost, earned value, and planned value to evaluate schedule variance, schedule performance, cost performance, and cost variance. Schedule performance and schedule variance will evaluate the earned value against the planned value. This will help show if the project is currently on schedule, or if not is it over or under schedule and by how much. Cost variance and cost schedule will reveal how the project is performing compared to the current cost and planned budget. These values will help the project manager assess if the…

    • 2295 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    Risk Management

    • 305 Words
    • 2 Pages

    Tokyo is 216.6743. The yen rate in New York is given in the preceding table. Are arbitrage profits possible? Set up an arbitrage scheme with your capital. What is the gain (loss) in dollars?…

    • 305 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Security plays a significant role in today’s corporations and mitigating risks to a company’s most valuable asset, data, is important. With data breaches, such as the one experienced by Target, the Department of Homeland Security as well as the Internal Revenue System, it is becoming increasingly obvious that no one is immune. Securing data is complex and with the advent of cloud services where information is now gathered and stored in various locations throughout the globe, securing that data continues to be a challenge. Even as we implement policies and procedures to secure our environment, we are now partnering with many companies and vendors that must also follow the same guidelines to ensure a company’s assets.…

    • 1286 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Risk Management

    • 607 Words
    • 3 Pages

    The candidate does not develop a social responsibility strategy for the chosen client that includes an environmental considerations and recommendations component.…

    • 607 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Public key infrastructure is becoming an integral and essential element of security these days. It provides highly secure enterprise systems in companies that provide large scale rankings of data that need to be encrypted to improve security levels. With the public key infrastructure, we want to retrieve digital certificates and set up practices, ways and policies to encrypt data. Provides access to secure data exchange or networking through networks and provides access to authentication and verification. We can refer to it as an infrastructure that distributes public keys. Data Center Basics (2003).…

    • 601 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Risk Management

    • 2368 Words
    • 10 Pages

    The reason of using Risk Assessment is to analyze hidden risks that could force a clash with the operation of the business of McBride Financial Services. This will analyze the plan of attack that will help to implemented for to avoid the risks and to minimize the risks that are inescapable.…

    • 2368 Words
    • 10 Pages
    Better Essays
  • Powerful Essays

    Risk Management

    • 1604 Words
    • 7 Pages

    According to the Risk Management section of Wells Fargo’s 2011 Annual Report, to be successful they manage and control three major business risks: credit, asset/liability, and market risk. As for this paper, I’m only going to discuss about their credit and interest rate risk, which is managed under their asset/liability section. Wells Fargo has continued to invest in its risk infrastructure especially since it is a larger and more complex company than before it merged with Wachovia. Wells Fargo’s Senior Executive Vice President and Chief Risk Officer, Michael Loughlin states that they have three lines of defense for managing the risks:…

    • 1604 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Risk Management Trends

    • 886 Words
    • 4 Pages

    There is an adage that says ‘nothing remains the same forever” and in business this is definitely true. As times evolve and the demographics of business territories change risk management involving these trends and developments become paramount to the survivability and long-term success of both organizations and individuals. An individual need be concerned with the relevance and significance of a linear nature while an organization must take into account consideration of other stakeholders and all factors involved. Trend risk management for an organization exists at the corporate, business, and project levels. At each level stakeholders are identified and encouraged to participate in the risk management process (AL-Thani & Merna, 2005). This insures that risk mitigation of trends and developments are conducive to all involved and yields a positive outlook for future challenges that may arise. The duration of this passage will focus on new trends and developments in the risk management process as they pertain to technology, culture, and government regulation, the pros and cons of each and the implications of each to the business environment.…

    • 886 Words
    • 4 Pages
    Better Essays