Preview

Risk Management Strategies

Good Essays
Open Document
Open Document
1210 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Risk Management Strategies
Risk management strategies:

Taking a step towards cloud is a big challenge but it is a great start to modernize the organization. The entire software framework of the system will be affected by this change. It’s not simple as said, it involves numerous unexpected complexities which are to be dealt with. It would also take significant development effort in terms of software development. With such big changes in hand system security and integrity cannot be compromised and issues in privacy and security are a major concern. Like mentioned above many questions arise when security and privacy of the system is considered. A strong security framework is essential to perform operations like authorization, restriction, identity management, etc.

The Open Data Center Alliance (ODCA) Cloud Provider Assurance model proposed a year ago suggested four different usage levels: basic security requirements (bronze), enterprise security equivalent (silver), financial organization security equivalent (gold) and military organization security equivalent (platinum).Perhaps it looks ambitiously simple but these frameworks could serve as a good platform to build a security system that would suit UMBC cloud.

To reduce the risk of imposters or masquerade or eavesdropping during the data transfer in a network, we also would have to implement Secure Sockets Layer (SSL) certificates are here to stand up to the risks. Using SSL encryption and authentication, SSL certificates have long been established as a primary security standard of computing and the Internet, and a no-brainer for securely transferring information between parties online. SSL offers encryption that prevents prying eyes from reading data traversing the cloud, as well as authentication to verify the identity of any server or endpoint receiving that data, it’s well-suited to address a host of cloud security challenges.

To address the problem of unauthorized access of static data, it is recommended to encrypt the data

You May Also Find These Documents Helpful

  • Good Essays

    Risk Assesments

    • 972 Words
    • 4 Pages

    Describe three procedures used to promote and maintain a healthy and safe sporting environment (P4). Explain three procedures used to promote and maintain a health and safety sporting environment (M3). Analyse three procedures used to promote and maintain a healthy and safe sporting environment.…

    • 972 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Risk Management Policies

    • 398 Words
    • 2 Pages

    Develop Health & Safety and Risk Management Policies, Procedures and Practices in Health & Social Care or Children and Young People’s Settings.…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Best Essays

    With the unprecedented growth and spread of information, there is no wonder why large Information Technology companies have been investing in the “cloud”. To expand, when referring to Cloud Computing, this means to access and store information not stored with in your computer whether it be public, private, or hybrid cloud computing. In technological terms, the server you are accessing is somewhere else and therefore, the information and tools you are using are “up in the clouds” but more so stored in another server space. However, whether you are paying for services through software, total usage, or free usage (hence the types of cloud services) Cloud Computing seems to be everywhere. Yet, it is important to recognize what is to gain by using cloud computing from big businesses to individual users and what are some risky moves when utilizing cloud storage over the Internet. Hence, the content of this paper will discuss the pros and cons of cloud computing and where cloud computing is headed in todays online society.…

    • 1307 Words
    • 6 Pages
    Best Essays
  • Best Essays

    Termpaper

    • 4159 Words
    • 22 Pages

    1.Identify the potential sales and department store transactions that can be stored within the database.…

    • 4159 Words
    • 22 Pages
    Best Essays
  • Good Essays

    My partners and I have made a list of areas that might cause the project delays or failure with their respective outcomes. We have listed the risk below that can prevent the project to finish on time.…

    • 1078 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Freier, A., Karlton, P., & Kocher, P., (2011, August). The secure sockets layer (SSL) protocol version 3.0. Internet engineering task force. Retrieved from http://tools.ietf.org/html/rfc6101…

    • 2890 Words
    • 12 Pages
    Powerful Essays
  • Better Essays

    Risk Management Trends

    • 886 Words
    • 4 Pages

    There is an adage that says ‘nothing remains the same forever” and in business this is definitely true. As times evolve and the demographics of business territories change risk management involving these trends and developments become paramount to the survivability and long-term success of both organizations and individuals. An individual need be concerned with the relevance and significance of a linear nature while an organization must take into account consideration of other stakeholders and all factors involved. Trend risk management for an organization exists at the corporate, business, and project levels. At each level stakeholders are identified and encouraged to participate in the risk management process (AL-Thani & Merna, 2005). This insures that risk mitigation of trends and developments are conducive to all involved and yields a positive outlook for future challenges that may arise. The duration of this passage will focus on new trends and developments in the risk management process as they pertain to technology, culture, and government regulation, the pros and cons of each and the implications of each to the business environment.…

    • 886 Words
    • 4 Pages
    Better Essays
  • Better Essays

    Trust is not easily defined, but most people agree that when it comes to cloud computing, transparency is essential to creating trust. Businesses must be able to see cloud service providers are complying with agreed data security standards and practices. These must include controls around who has access to data, staff security vetting practices, and the technologies and processes to segregate, backup and delete data. Suppliers of cloud technologies and services are quick to claim that cloud computing is well equipped to provide the necessary controls. Virtualization, they argue, underlies cloud computing, and therein lies the potential to achieve hitherto impossible levels of security. While virtualization is viewed with suspicion and fear by many IT directors, suppliers like RSA, IBM and other say that the technology enables organizations to build security into the infrastructure and automate security processes, to surpass traditional data protection…

    • 1351 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Privacy of communications is essential to ensure that data cannot be modified or viewed in transit. Distributed environments bring with them the possibility that a malicious third party can perpetrate a computer crime by tampering with data as it moves between sites.…

    • 4620 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    The use of this tool will help provide an assessment for the stakeholders on the effectiveness of the internal security and controls related to the cloud computing environment. Deficiencies within the internal controls can be identified. An assessment can be prepared for the stakeholders that will help them determine if the quality and reliability of the service they are being provided is compliant with the results of the internals control audits.…

    • 1171 Words
    • 5 Pages
    Good Essays
  • Best Essays

    Cyber Security

    • 4964 Words
    • 20 Pages

    10. Catteddu, D. and Hogben, G. (2009). Cloud Computing: benefits, risks and recommendations for information security. Technical Report. European Network and Information Security Agency.…

    • 4964 Words
    • 20 Pages
    Best Essays
  • Good Essays

    Public key infrastructure is becoming an integral and essential element of security these days. It provides highly secure enterprise systems in companies that provide large scale rankings of data that need to be encrypted to improve security levels. With the public key infrastructure, we want to retrieve digital certificates and set up practices, ways and policies to encrypt data. Provides access to secure data exchange or networking through networks and provides access to authentication and verification. We can refer to it as an infrastructure that distributes public keys. Data Center Basics (2003).…

    • 601 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cloud Computing: Fact vs Fog

    • 9067 Words
    • 37 Pages

    News of Cloud is everywhere, and its predominance in IT is a foregone conclusion. In fact, the push to adopt Cloud has been so strong that risks inherent in this model have largely been ignored The recent economic turmoil and the promise of Cloud leading a renaissance of the tech sector are shaping the perspective and appetite for Cloud rather than the readiness of the technology itself. Cloud is a powerful tool for mobilizing data; however, there are no regulations, standards, or assurances of data protection from a technical perspective Major breaches at Google, Salesforce.com, and Amazon, have exposed the fragility of the Cloud delivery model, and the fundamental issues of data security, privacy, and standards that have yet to be addressed. Though price points gained in Cloud can be significant, businesses should weigh advantages against the hidden costs of compromised data Analyst sentiment seems to be the sole voice of reason. Principal analysts from Forrester, Gartner, and Yankee cite major security concerns with Cloud. Hackers have also highlighted the vulnerabilities of Cloud and issued a manifesto of mayhem against it (Black Hat 2009 – Clobbering the Cloud by SensePost) Assessing your organization’s readiness for Cloud should include the evaluation of hybrid models, hybrid architectures, integration constraints, and innovative data protection…

    • 9067 Words
    • 37 Pages
    Good Essays
  • Good Essays

    Security plays a significant role in today’s corporations and mitigating risks to a company’s most valuable asset, data, is important. With data breaches, such as the one experienced by Target, the Department of Homeland Security as well as the Internal Revenue System, it is becoming increasingly obvious that no one is immune. Securing data is complex and with the advent of cloud services where information is now gathered and stored in various locations throughout the globe, securing that data continues to be a challenge. Even as we implement policies and procedures to secure our environment, we are now partnering with many companies and vendors that must also follow the same guidelines to ensure a company’s assets.…

    • 1286 Words
    • 6 Pages
    Good Essays