Cloud_Computer_Security_Discussion_8

docx

School

California State University, Fullerton *

*We aren’t endorsed by this school

Course

MISC

Subject

Information Systems

Date

Nov 24, 2024

Type

docx

Pages

4

Uploaded by marttiatoo

Report
Risk Assessment: The Detection, Evaluation, and Measuring of Potential Dangers are the Cornerstones of Risk Assessment. This exercise is meant to alert participants to the risks their organization, project, or system may face. There are several ways in which risk assessment can boost a company's security. How businesses use the information gleaned from risk assessments depends on the assessment's methodology and level of detail. Likelihood analysis is used in qualitative risk assessment. This method surveys participants based on their perceptions of specific risks' likelihood and potential outcomes. Therefore, the results of qualitative risk assessments are open to different interpretations. Risks identified through the study are assigned dollar amounts in quantitative risk assessments. Companies can benefit from these evaluations by taking more informed action. If the threat materializes, the company stands to lose the indicated amount (Muralidharan et al.,2019). Risk Management: Controlling Risk Through Management Risks can be avoided, transferred, or accepted when we assess them and determine the best course of action. There's nothing left to do but take a chance after all other possibilities have been used up. To deal with possible threats effectively, Methods of Reducing or Eliminating Risk Take action to reduce the likelihood of recognized risks occurring and their possible impact on the company. Risk avoidance entails doing everything one can to prevent or lessen the occurrence of potential bad events. The original risk taker is relieved of responsibility by transferring risks to another party, such as through insurance or a legally binding agreement (Rosado et al.,2020). Risk management requires acknowledging that some risks cannot be avoided or minimized cost-effectively and creating strategies to cope with the consequences of these risks should they materialize. They recognize the impossibility of mitigating all hazards within a reasonable budgetary framework. Together, these two pillars form a comprehensive framework for addressing risks in various settings, including the business world, the financial
sector, the engineering industry, the medical field, and many others. Gathering as much information as possible before making decisions is essential for giving oneself the best chance of striking a good balance between the potential benefits of an effort and the risks involved in carrying it through. The odds of succeeding in one's endeavours will be increased by doing this (Muralidharan et al.,2019). References Muralidharan C, Anitha R. (2019). E-eclat algorithm risk analysis of cloud service providers based on problem frequency. Wireless networks, 27(8), 5587-5595. doi:10.1007/s11276-019-02191-4 Rosado DG, Moreno J, Sánchez LE, Santos-Olmo A, Serrano MA, Fernández-Medina E. (2020). Marisma-bida pattern: integrated risk analysis for huge data. Computing & Security, 102, 1-1. doi:10.1016/j.cose.2020.102155 Reply: All data in storage must be protected by whoever is responsible for doing so, using the available safeguards. It shows if the data are merely being moved from one place to another or stored for the foreseeable future. Security measures like encryption and user notification of updates are only two of many implemented in these systems. Cloud infrastructures can become vulnerable to attacks if enterprises and cloud service providers fail to take adequate security precautions. It could increase the organization's susceptibility to a wide range of threats. The risk of a security breach at the firm is increased dramatically if something like this occurs. Doing a risk assessment as part of an effort to strengthen the network's security could lead to particular technical repercussions, such as the findings of a network inspection or the installation of a firewall. The goal of risk management is to systematically recognize challenges and make headway in resolving them through applying various approaches. It is
what effective risk management is all about. In-depth analyses of the industry as a whole or of a single technology project or business division are required to discover the possible security dangers to which a corporation is exposed. You can do these analyses in any order that makes sense to you. It is hoped that the examination will uncover any weaknesses in the existing security measures before dishonest parties exploit them. Your firm's chief security officer wants maximum safety and oversight to complete all tasks per corporate policy and relevant laws and regulations. The head of security may now monitor compliance with both sets of rules and ensure that everyone works within the confines of the law. Since it fulfills the criteria laid out by both parties, this crucial piece is the solution to the issue at hand. Extensive security solutions have been developed to solve the problems associated with cloud computing. These features are indispensable when it comes to protecting cloud workloads and ensuring the validity, availability, and security of critical data. Reply: The Cloud Information Security Risk Assessment approach was developed to provide customers of cloud services with a tool that would assist them in assessing the benefits and drawbacks of using a variety of cloud vendors. To accomplish this, cloud storage users should have access to a database with all of the necessary information. This is accomplished by researching the historical data obtained from cloud service providers and the customers of those providers to ascertain the possibility of a variety of risk scenarios. With this information in hand, selecting the cloud service provider with the highest security level, respect for users' privacy, and dependability is a straightforward process. In particular, it assists in locating the cloud provider that presents the least amount of danger. The following is a list of some of the goals that the evaluation is trying to accomplish: Determine the areas of potential vulnerability and access points within the company's cloud infrastructure; Examine the network for vulnerabilities, both known and unknown, that could be exploited to get access to
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
the system. Put in writing everything you could do to prevent it from happening again. By conducting a cloud information security audit, businesses can gain peace of mind knowing that their cloud resources and networks are adequately configured, safe, and not under constant threat. An in-depth investigation of the organization's network will be carried out to identify any potential entry points or other architectural weaknesses and make concrete proposals for future improvements. Some benefits of assessing the information security offered by cloud computing are as follows: Configuration errors introduced by accident will occur far less frequently. If the business performs the particular configuration adjustments that have been proposed, the cloud's vulnerability to attack can be mitigated to some degree. The possibility of not seeing vital communications from If a company pays attention to the recommendations made by the cloud security assessment team, it may be in a better position to identify potential dangers and react appropriately before even relatively minor security lapses lead to significant breaches.