IT-Hosting sensitive information.doc - Running head HOSTING SENSITIVE INFORMATION IN THE COMMERCIAL CLOUD1 Hosting Sensitive Information in the

IT-Hosting sensitive information.doc - Running head HOSTING...

This preview shows page 1 - 4 out of 11 pages.

Running head: HOSTING SENSITIVE INFORMATION IN THE COMMERCIAL CLOUD1 Hosting Sensitive Information in the Commercial Cloud: An Investigation of Professional Perceptions of Security Date of Submission
Image of page 1
HOSTING SENSITIVE INFORMATION IN THE COMMERCIAL CLOUD 2 Section 1: Foundation of the Study Background of the Problem Cloud computing is a form of innovation founded on information systems that are believed to be the future of computer technology (Zissis & Lekkas, 2012). The adoption of cloud computing has made it possible for users to be freed from the hardware limitations of a computer and at the same time, it has minimized user complexity and requirements. As much as cloud computing is defined differently by various experts, the National Institute of Standards and Technology (NIST) offers a standard definition for this concept that is based on deployment model, service model, and essential characteristics. Thus, cloud computing is defined as a means that enhances the levels of convenience of network accessibility in the context of shared computing resources which are speedily deployed with restricted interaction with the service provider (Mell &Grance, 2011). The nature of cloud computing increases security and privacy risks for personal data. Specifically, cloud computing is characterized by shared resources and components between subscribers that increases unauthorized access to sensitive information by other subscribers through exploitation of the vulnerabilities found in the cloud environment(King & Raja, 2012). The cloud computing environment has high system complexity that provides hackers with opportunities for unauthorized data access by maximizing on the security vulnerabilities found in the complex cloud computing infrastructure (Jansen &Grance, 2011). Another issue is that the commercial cloud services are delivered over the Internet that exposes data and applications to high network threats from malicious outsiders. Security and privacy risks related to the protection of sensitive information are viewed as some of the main obstacles in cloud computing
Image of page 2
HOSTING SENSITIVE INFORMATION IN THE COMMERCIAL CLOUD 3 (King & Raja, 2012). It is against this that this study seeks to examine the perceptions of IT professionals in terms of the security of information hosted in the commercial cloud. Problem Statement Kshetri (2013) noted that the majority of cloud providers’ services do not come with assurance or promise of an established level of privacy and security. The issue of security in the cloud computing environment is becoming increasingly relevant given that insiders are threatening the security of information by executing attacks in the cloud computing environment. Statistics indicate that insider attacks accounted for 17% of data breaches while external attacks represented 92 % of security attacks on information stored in clouds (Ahuja &Komathukattil, 2012). A study conducted by the Ponemon Institute in 2014 that involved over 250 organizations in 11 countries revealed that the cost of data breaches is on the increase as it cost $3.5 million on
Image of page 3
Image of page 4

You've reached the end of your free preview.

Want to read all 11 pages?

  • Fall '16
  • cyber security
  • Qualitative Research, commercial cloud

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern

Stuck? We have tutors online 24/7 who can help you get unstuck.
A+ icon
Ask Expert Tutors You can ask You can ask You can ask (will expire )
Answers in as fast as 15 minutes
A+ icon
Ask Expert Tutors