Cloud_Computer_Security_Discussion_8
docx
keyboard_arrow_up
School
California State University, Fullerton *
*We aren’t endorsed by this school
Course
MISC
Subject
Information Systems
Date
Nov 24, 2024
Type
docx
Pages
4
Uploaded by marttiatoo
Risk Assessment:
The Detection, Evaluation, and Measuring of Potential Dangers are the
Cornerstones of Risk Assessment. This exercise is meant to alert participants to the risks their
organization, project, or system may face. There are several ways in which risk assessment
can boost a company's security. How businesses use the information gleaned from risk
assessments depends on the assessment's methodology and level of detail. Likelihood
analysis is used in qualitative risk assessment. This method surveys participants based on
their perceptions of specific risks' likelihood and potential outcomes. Therefore, the results of
qualitative risk assessments are open to different interpretations. Risks identified through the
study are assigned dollar amounts in quantitative risk assessments. Companies can benefit
from these evaluations by taking more informed action. If the threat materializes, the
company stands to lose the indicated amount (Muralidharan et al.,2019).
Risk Management:
Controlling Risk Through Management Risks can be avoided,
transferred, or accepted when we assess them and determine the best course of action. There's
nothing left to do but take a chance after all other possibilities have been used up. To deal
with possible threats effectively, Methods of Reducing or Eliminating Risk Take action to
reduce the likelihood of recognized risks occurring and their possible impact on the company.
Risk avoidance entails doing everything one can to prevent or lessen the occurrence of
potential bad events. The original risk taker is relieved of responsibility by transferring risks
to another party, such as through insurance or a legally binding agreement (Rosado et
al.,2020).
Risk management requires acknowledging that some risks cannot be avoided or minimized
cost-effectively and creating strategies to cope with the consequences of these risks should
they materialize. They recognize the impossibility of mitigating all hazards within a
reasonable budgetary framework. Together, these two pillars form a comprehensive
framework for addressing risks in various settings, including the business world, the financial
sector, the engineering industry, the medical field, and many others. Gathering as much
information as possible before making decisions is essential for giving oneself the best
chance of striking a good balance between the potential benefits of an effort and the risks
involved in carrying it through. The odds of succeeding in one's endeavours will be increased
by doing this (Muralidharan et al.,2019).
References
Muralidharan C, Anitha R. (2019). E-eclat algorithm risk analysis of cloud service providers
based on problem frequency. Wireless networks, 27(8), 5587-5595.
doi:10.1007/s11276-019-02191-4
Rosado DG, Moreno J, Sánchez LE, Santos-Olmo A, Serrano MA, Fernández-Medina E.
(2020). Marisma-bida pattern: integrated risk analysis for huge data. Computing &
Security, 102, 1-1. doi:10.1016/j.cose.2020.102155
Reply:
All data in storage must be protected by whoever is responsible for doing so, using the
available safeguards. It shows if the data are merely being moved from one place to another
or stored for the foreseeable future. Security measures like encryption and user notification of
updates are only two of many implemented in these systems. Cloud infrastructures can
become vulnerable to attacks if enterprises and cloud service providers fail to take adequate
security precautions. It could increase the organization's susceptibility to a wide range of
threats. The risk of a security breach at the firm is increased dramatically if something like
this occurs. Doing a risk assessment as part of an effort to strengthen the network's security
could lead to particular technical repercussions, such as the findings of a network inspection
or the installation of a firewall. The goal of risk management is to systematically recognize
challenges and make headway in resolving them through applying various approaches. It is
what effective risk management is all about. In-depth analyses of the industry as a whole or
of a single technology project or business division are required to discover the possible
security dangers to which a corporation is exposed. You can do these analyses in any order
that makes sense to you. It is hoped that the examination will uncover any weaknesses in the
existing security measures before dishonest parties exploit them. Your firm's chief security
officer wants maximum safety and oversight to complete all tasks per corporate policy and
relevant laws and regulations. The head of security may now monitor compliance with both
sets of rules and ensure that everyone works within the confines of the law. Since it fulfills
the criteria laid out by both parties, this crucial piece is the solution to the issue at hand.
Extensive security solutions have been developed to solve the problems associated with cloud
computing. These features are indispensable when it comes to protecting cloud workloads
and ensuring the validity, availability, and security of critical data.
Reply:
The Cloud Information Security Risk Assessment approach was developed to provide
customers of cloud services with a tool that would assist them in assessing the benefits and
drawbacks of using a variety of cloud vendors. To accomplish this, cloud storage users should
have access to a database with all of the necessary information. This is accomplished by
researching the historical data obtained from cloud service providers and the customers of
those providers to ascertain the possibility of a variety of risk scenarios. With this information
in hand, selecting the cloud service provider with the highest security level, respect for users'
privacy, and dependability is a straightforward process. In particular, it assists in locating the
cloud provider that presents the least amount of danger. The following is a list of some of the
goals that the evaluation is trying to accomplish: Determine the areas of potential
vulnerability and access points within the company's cloud infrastructure; Examine the
network for vulnerabilities, both known and unknown, that could be exploited to get access to
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
the system. Put in writing everything you could do to prevent it from happening again. By
conducting a cloud information security audit, businesses can gain peace of mind knowing
that their cloud resources and networks are adequately configured, safe, and not under
constant threat. An in-depth investigation of the organization's network will be carried out to
identify any potential entry points or other architectural weaknesses and make concrete
proposals for future improvements. Some benefits of assessing the information security
offered by cloud computing are as follows: Configuration errors introduced by accident will
occur far less frequently. If the business performs the particular configuration adjustments
that have been proposed, the cloud's vulnerability to attack can be mitigated to some degree.
The possibility of not seeing vital communications from If a company pays attention to the
recommendations made by the cloud security assessment team, it may be in a better position
to identify potential dangers and react appropriately before even relatively minor security
lapses lead to significant breaches.