Mitigating Cloud Computer Risks I.docx - Running head MITIGATING CLOUD COMPUTING RISKS 1 Mitigating Cloud Computing Risks CIS 552 Cybercrime Techniques

Mitigating Cloud Computer Risks I.docx - Running head...

This preview shows page 1 - 3 out of 6 pages.

Running head: MITIGATING CLOUD COMPUTING RISKS 1 Mitigating Cloud Computing Risks CIS 552 Cybercrime Techniques & Response December 2, 2019
Image of page 1
MITIGATING CLOUD COMPUTING RISKS Mitigating Cloud Computing Risks With the advancement in technology, cloud computing is seen as one of the best web- based technology to use in the current advanced information age. It is based on the fact that cloud computing is associated with the provision of software and data to users on remote servers. Just like Data outsourcing, cloud computing provides reliable and cheap storage services to individuals and entities. Now, it is possible to offer value to customers without incurring a lot of money on programming and storage system for data and information storage. There is no need to have a complete infrastructure of hardware and software to meet clients’ demands, applications, and requirements (Crooks, 2018). All that is required is an Internet browser and Internet connection. In this paper, we will discuss in detail on deploying internal controls in cloud computing. In line with this, the article has a summary analysis of recent research on cloud computing. Additionally, the paper discusses the vulnerabilities and risks associated with hybrids, private clouds, public clouds, and private clouds in addition to vital internal controls to mitigate the weaknesses and threats. Recent Research According to the latest clouding computing research, could platforms are currently overloaded given that the cloud computing market is now flooded with numerous vendors including Amazon Web Servers, Microsoft Azure, and Google Cloud Platform (Cloud Codes, 2019). The vendors are struggling to outdo each other for market share. Although the number of cloud computing vendors have increased significantly, there are concerns about security threats to cloud computing. It is difficult for clients of cloud services and the vendors to determine who is responsible for cloud data security. It is said that there is shared responsibility when it comes to securing cloud computing. For instance, the vendors are responsible for protecting the
Image of page 2
Image of page 3

You've reached the end of your free preview.

Want to read all 6 pages?

  • Spring '15

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern

Stuck? We have tutors online 24/7 who can help you get unstuck.
A+ icon
Ask Expert Tutors You can ask You can ask You can ask (will expire )
Answers in as fast as 15 minutes
A+ icon
Ask Expert Tutors