Coca Cola_7080_Week 4 PowerPoint Presentation
pptx
keyboard_arrow_up
School
Strathmore University *
*We aren’t endorsed by this school
Course
7000
Subject
Information Systems
Date
Nov 24, 2024
Type
pptx
Pages
9
Uploaded by DukeMinkMaster907
Cloud-based
Solutions Security
Wilmington University
Introduction
•
Organizations are increasingly leaving on-premises
cloud environment to a cloud environment.
•
Although organizations have been prompted to
migration to a cloud environment because of the
benefits involved, there are also security risks and
vulnerabilities involved.
•
During migration, these cloud security threats and
vulnerabilities should be clear to organizations
•
It is only by knowing the security threats and
vulnerabilities will organizations be able to protect
and secure against.
Advantages of Cloud-based
Solutions
•
While organizations have been using on-premises cloud
environments, cloud-based environments are becoming
necessary.
•
There are many reasons for which organizations are
preferring cloud-based environment, among which are:
•
Lower operation costs
•
Improved security
•
Maintenance of business continuity
•
Business agility and adaptability
•
Automatic updates
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Cloud-based Solutions Security
Vulnerabilities and Threats
•
Although the benefits of cloud-based solutions
are known, there are also security vulnerabilities
and threats associated with them, including:
•
Cloud misconfigurations
•
Insecure APIs
•
Lack of visibility
•
Lack of multi-factor authentication
•
Malicious insiders
•
Distributed denial-of-service attacks
Potential Impact of Cloud-based
Solutions Security Compromise
•
Similar to other types of security
compromise, when cloud security is
compromised, there are impacts to IT and
organization.
•
In the event of a compromise, an
organization is likely to be impacted in the
following ways:
•
Loss of revenue
•
Reputational damage
•
Intellectual property losses
•
Online vandalism
•
Other hidden costs
Use of Data Analytics to Identify
Cloud Security Risks
•
The increase in cloud security threats and
vulnerabilities means that organizations must be
creative in how they protect against their cloud-
based solutions and environment.
•
An effective way organizations can achieve high
security in their cloud-based solutions is by using
data analytics
•
Organizations can use data analytics in the
following ways:
•
Threat detection and response
•
Reducing false alarms
•
Performing cybersecurity analysis
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Cybersecurity Strategies to Mitigate
Cloud Security Risk
•
As organizations now know the existence of
cloud security threats and vulnerabilities and
the damage they can cause, they should be
ready to adopt strategies for mitigating the risk.
•
There are various ways through which the cloud
risk can be mitigated, including the following:
•
Cloud infrastructure risk assessment
•
Monitor third parties service providers
•
Train and educate employees on security
•
Create a robust security system
•
Prepare for incidents and breaches
Conclusion
•
While organizations have been traditionally
using on-premises cloud solutions, they are
increasingly migrating to cloud-based
solutions
•
The reason for migrating to cloud-based
solutions is because of the advantages
associated with the environment
•
With the popularity of cloud-based solutions
also comes security risks and vulnerabilities.
•
There are many measures organizations can
put in place to mitigate the risk along with
using data analytics
References
Gonzalez, N. M., Goya, W. A., de Fatima Pereira, R., Langona,
K., Silva, E. A., de Brito Carvalho, T. C. M., ... & Sefidcon,
A. (2016, October). Fog computing: Data analytics and
cloud distributed processing on the network edges.
In
2016 35th International Conference of the Chilean
Computer Science Society (SCCC)
(pp. 1-9). IEEE.
Paxton, N. C. (2016, November). Cloud security: a review of
current issues and proposed solutions. In
2016 IEEE 2nd
International Conference on Collaboration and Internet
Computing (CIC)
(pp. 452-455). IEEE.
Tari, Z., Yi, X., Premarathne, U. S., Bertok, P., & Khalil, I.
(2015). Security and privacy in cloud computing: vision,
trends, and challenges.
IEEE Cloud Computing
,
2
(2), 30-
38.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help