Coca Cola_7080_Week 4 PowerPoint Presentation

pptx

School

Strathmore University *

*We aren’t endorsed by this school

Course

7000

Subject

Information Systems

Date

Nov 24, 2024

Type

pptx

Pages

9

Uploaded by DukeMinkMaster907

Report
Cloud-based Solutions Security Wilmington University
Introduction Organizations are increasingly leaving on-premises cloud environment to a cloud environment. Although organizations have been prompted to migration to a cloud environment because of the benefits involved, there are also security risks and vulnerabilities involved. During migration, these cloud security threats and vulnerabilities should be clear to organizations It is only by knowing the security threats and vulnerabilities will organizations be able to protect and secure against.
Advantages of Cloud-based Solutions While organizations have been using on-premises cloud environments, cloud-based environments are becoming necessary. There are many reasons for which organizations are preferring cloud-based environment, among which are: Lower operation costs Improved security Maintenance of business continuity Business agility and adaptability Automatic updates
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Cloud-based Solutions Security Vulnerabilities and Threats Although the benefits of cloud-based solutions are known, there are also security vulnerabilities and threats associated with them, including: Cloud misconfigurations Insecure APIs Lack of visibility Lack of multi-factor authentication Malicious insiders Distributed denial-of-service attacks
Potential Impact of Cloud-based Solutions Security Compromise Similar to other types of security compromise, when cloud security is compromised, there are impacts to IT and organization. In the event of a compromise, an organization is likely to be impacted in the following ways: Loss of revenue Reputational damage Intellectual property losses Online vandalism Other hidden costs
Use of Data Analytics to Identify Cloud Security Risks The increase in cloud security threats and vulnerabilities means that organizations must be creative in how they protect against their cloud- based solutions and environment. An effective way organizations can achieve high security in their cloud-based solutions is by using data analytics Organizations can use data analytics in the following ways: Threat detection and response Reducing false alarms Performing cybersecurity analysis
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Cybersecurity Strategies to Mitigate Cloud Security Risk As organizations now know the existence of cloud security threats and vulnerabilities and the damage they can cause, they should be ready to adopt strategies for mitigating the risk. There are various ways through which the cloud risk can be mitigated, including the following: Cloud infrastructure risk assessment Monitor third parties service providers Train and educate employees on security Create a robust security system Prepare for incidents and breaches
Conclusion While organizations have been traditionally using on-premises cloud solutions, they are increasingly migrating to cloud-based solutions The reason for migrating to cloud-based solutions is because of the advantages associated with the environment With the popularity of cloud-based solutions also comes security risks and vulnerabilities. There are many measures organizations can put in place to mitigate the risk along with using data analytics
References Gonzalez, N. M., Goya, W. A., de Fatima Pereira, R., Langona, K., Silva, E. A., de Brito Carvalho, T. C. M., ... & Sefidcon, A. (2016, October). Fog computing: Data analytics and cloud distributed processing on the network edges. In 2016 35th International Conference of the Chilean Computer Science Society (SCCC) (pp. 1-9). IEEE. Paxton, N. C. (2016, November). Cloud security: a review of current issues and proposed solutions. In 2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC) (pp. 452-455). IEEE. Tari, Z., Yi, X., Premarathne, U. S., Bertok, P., & Khalil, I. (2015). Security and privacy in cloud computing: vision, trends, and challenges. IEEE Cloud Computing , 2 (2), 30- 38.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help