5th article - Rakotoarimanana Jean Maurice Article 05 (CA...

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
Rakotoarimanana Jean Maurice Article 05 (CA Boosts Cloud Authentication Service) There many different issues organization need to consider when deciding to choose could- computing. Cloud computing puts your data outside of your organization. Also when you use a cloud computing service, you are limiting yourself to the amount of advanced security tools that you can put on the system. You cannot limit the access to only internal staff. There are many other security tools that cannot be put in place in cloud environments, unless the cloud environment is specifically designed for them. There are also other issues to consider. You have little control over how much audit information is collected. For example, you likely do not have access to failed log-in attempts, so you cannot proactively look for attack reconnaissance. Likewise, while you may maintain ownership of your own data, you do not likely own all of the access log data. That potentially creates legal problems. For example, if someone does illicitly access your information, you might need to get a court
Background image of page 1
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/15/2012 for the course CIS CIS120 taught by Professor Zales during the Spring '12 term at Harrisburg Area Community College.

Ask a homework question - tutors are online