StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Cloud Computing Security Policy - Essay Example

Comments (0) Cite this document
Summary
The service shall be implemented with security protocols both from the vendor and SNPO-MC.
The cloud vendor shall provide servers to host the companies website,…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.9% of users find it useful
Cloud Computing Security Policy
Read Text Preview

Extract of sample "Cloud Computing Security Policy"

Download file to see previous pages The private network shall be hosted off the premises of SNPO-MC but will be managed by both the cloud vendor and IT staff from SNPO-MC. The shall effect cloud bursting between the public and private cloud.
Cloud computing services comprise of an infrastructure, resources and applications that SNPO-MC can access over the Internet. Large companies like Microsoft, Google, Amazon provide these resources so that they can be readily and cheaply available to people. Most of the cloud services provide support for communication, data storage, data analysis, data processing, project management, and scheduling. Cloud services will be very easy for the staff and executives of SNPO-MC to use since they are readily accessible to workstations, tablets, smartphones and laptops via the Internet. Despite the numerous advantages of the cloud, security is a primary concern especially on the public cloud where unauthorized access of organizations data can compromise the operations of an organization and bring a lot of losses.
SNPO-MC should verify before entering into an agreement with the cloud vendor that it complies with standards from Federal Information Processing (FIPS) and NIST Special Publications (SP). The standards include:
A chief IT manager shall be appointed and will be responsible for all cloud service negotiations with cloud vendors. The IT manager will overview the implementation of all security policies that involve both the general staff and the executive. The IT manager in consultancy with the company lawyer will monitor compliance with SNPO-MC cloud policies with the required government standards. No individual department or manager in SNPO-MC shall be allowed to procure cloud services for the daily operations of the organization.
Data and information stored in the cloud databases are owned by the creator of the data. In this case SNPO-MC organization. The cloud provider shall not in any case alter, ...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cloud Computing Security Policy Essay Example | Topics and Well Written Essays - 1250 words”, n.d.)
Cloud Computing Security Policy Essay Example | Topics and Well Written Essays - 1250 words. Retrieved from https://studentshare.org/information-technology/1692496-cloud-computing-security-policy
(Cloud Computing Security Policy Essay Example | Topics and Well Written Essays - 1250 Words)
Cloud Computing Security Policy Essay Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/information-technology/1692496-cloud-computing-security-policy.
“Cloud Computing Security Policy Essay Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/information-technology/1692496-cloud-computing-security-policy.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Cloud Computing Security Policy

Cloud Computing and Security Issues

... helps the user in using the service as and when needed. The concept behind cloud computing is truly revolutionary as it allows small organizations to scale up their operations to high proportions without buying hardware and software and without hiring a fleet of IT experts. The immense potential offered by cloud computing is acknowledged across the industry, and yet, there is hesitation in its rapid adoption by many organizations (Armbrust et al, 2010). This is because the rapid growth in the technology is also accompanied by growing concerns about security related issues. Cloud computing, being an innovative method of using applications and hardware, has to face various implementation issues as it requires a shift in perceptions about...
51 Pages (12750 words) Dissertation

Cloud Computing

..., and data of the user. The reason for the study of “cloud computing” is to have a detailed insight into the history, significance, fundamentals, components, systems, methodologies, and implementation, and more related to cloud computing. This paper achieves this purpose by first discussing the history of cloud computing, followed by the discussion of its ramifications in the technology world, development of the system and its security, and relationship between agile software development and cloud computing. The history of cloud computing Although there is subjectivity about the exact time when the term cloud computing surfaced, yet it appears to have originated from the use of the stylized clouds drawings for the denotation of the networks...
10 Pages (2500 words) Research Paper

Cloud Computing and Security

... Cloud Computing and Security In the last few years, the paradigm of cloud computing has evolved from a talented business idea to one of the rapidly developing tools of information technology all over the world. Additionally, with its talent to offer users animatedly extendable and collective business resources over the web based technology like internet cloud computing prevents from large level business expenses. In addition, cloud computing guarantees to modernize the future of business as well as corporate computing environment extensively. At the present, recession-hit businesses are progressively considering that only by establishing a strong connection with the cloud they could be able to get rapid access to most valuable corporate...
7 Pages (1750 words) Term Paper

Security Concerns in Cloud Computing

...? Full Paper Introduction Cloud computing is considered to be a value driven technology, as it saves cost along with advanced virtualization of business functions that is globally accessible. Organizations consider it a cost effective tools, as the requirement of maintaining a complex technology infrastructure along with resources is not essential. Likewise, risk factors are also been considered, as the risk, mentioned in the underpinning contract is now owned by a third party i.e. cloud computing vendors. Martin Sandler, who is a director of HP systems security Lab says, “People often think of virtualization as adding to security problems, but it is fundamentally the answer to a lot of those problems,” (Anthes, 2010).In a nutshell, cloud...
5 Pages (1250 words) Research Paper

Cloud Computing Security

... in the cloud computing arrangement. These security issues are becoming more and more serious and causing serious damages to working and operational environment. Insecure Interfaces and APIs Cloud computing services are provided through a wide variety of user interfaces which are known as application programming interfaces (APIs). A user who wants to access and use a cloud service must interact with the cloud using an interface. Thus, the security of a cloud service heavily depends on the security of these APIs. In addition, from confirmation and access control to encryption and activity assessment, these interfaces have to be designed to protect beside together malicious and accidental attempts to avoid a policy (Cloud Security Alliance...
5 Pages (1250 words) Dissertation

Cloud Computing Security

...? Cloud Computing Security Cloud Computing Security Introduction The rising cost of computing resources has been a matter of concerns for many organizations whether large, medium, or small. As a result, many organizations are struggling to adopt a cost effective computing resources for their business applications. In this regard, many organizations have moved towards adoption cloud-computing concept in their business environment in a bid to reduce cost. Iyer and Henderson (2010) define cloud computing as a collection of information technology resources such as servers, applications and databases, which are accessible upon demand and provided by a service corporation online allowing for resource pooling among several users. This paper...
4 Pages (1000 words) Essay

Cloud Computing

AWS Case Study: Ericsson AWS Case Study: Ericsson Cloud computing has emerged as the best alternative for both small and medium sized firms as well as big companies in their implementation of Information Technology strategies. This emerging trend in the contemporary world gives companies both attractive technological and financial benefits as well as giving them a competitive edge in the highly competitive environment. Cloud computing involves sharing of computer resources, both software and hardware, among many users along connected computers over a network, mostly the internet (Armbrust et al, 2010). Various concepts employed in cloud computing include software-as-a-service (SAAS), infrastructure-as-a-service (IAAS), Platform-as...
3 Pages (750 words) Case Study

Cloud computing

... also requires a strict evaluation of the security measures such as firewall and encryption techniques. Although, the cloud enables a company to move from a capex model to an opex model, it does not necessarily mean that the overall expenditure over the period of contracts will be less in a cloud as compared to an in-house implementation. Besides, having no capital investment may have certain tax related disadvantages. From the point of view of Governance, SLAs might not be customized to the specific business requirements leading to inadequate compensation for downtime. Another issue with using cloud computing is - the different standards and technologies being used by different vendors. This difference results in the inability of vendors...
5 Pages (1250 words) Research Paper

Cloud computing risks & security concerns

They could be deployed as private, solely for an organisation; public, accessible by the public; community, shared by organisation; hybrid, bringing together multiple clouds between which application and data portability could occur; and partner, offered to a limited and definite number of parties (Pearson & Yee 2013). With cloud computing, organisations do not have to invest in physical infrastructure. Instead, they contract computing services based on demand. This therefore presents immense benefits and cost savings to organisations. For this reason, over 33% of UK companies compute in the cloud (Buyya, Broberg & Goscinski 2011). However, the technology has aroused numerous risk and security concerns in organisations across the...
12 Pages (3000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Cloud Computing Security Policy for FREE!

Contact Us