6050_Week 1 Essay
docx
keyboard_arrow_up
School
Strathmore University *
*We aren’t endorsed by this school
Course
ORGANIZATI
Subject
Information Systems
Date
Nov 24, 2024
Type
docx
Pages
5
Uploaded by DukeMinkMaster907
1
Running Head: ANALYTICS IN CLOUD SECURITY
Analytics in Cloud Security
Student Name
Wilmington University
March 11, 2023
2
ANALYTICS IN CLOUD SECURITY
Analytics in Cloud Security
Introduction
According to Hegde, (2022), more and more organizations are increasingly transitioning
to the cloud. However, these organizations cannot effectively and securely make transition
without a robust cloud security. With agility, scalability, and efficiency associated with cloud
computing infrastructure, organizations are increasingly churning massive gains. Additionally,
with cloud computing, organizations are gaining the ultimate in reliability. When organizations
leverage the right cloud security measures, they will be in a better position of safely accessing
data and applications within the cloud. In this paper, we described how analytics shape cloud
security so that organizations can be in a better position of benefitting from cloud computing.
How Analytics Shapes Cloud Security
As organizations are increasingly adopting cloud computing technologies, cloud data
security is consequently becoming increasingly important. In order that organizations achieve
better cloud security, it has also become important that they create inclusive cybersecurity
policies, an organizational culture of cybersecurity, and implementing cloud security controls and
solutions. However, this would not be possible without organizations utilizing analytics (Morris,
2021). Utilizing analytics is increasingly helping organizations in identifying and remediating
flaws in the cloud computing infrastructure as well as securing cloud data. Furthermore, with
analytics, organizations are efficiently selecting the right cloud security solutions. By doing that,
they are able to get the best when transitioning to cloud as well as ensuring security to the on-
premises technology infrastructure in form of unauthorized access and data breaches (Morris,
2021).
3
ANALYTICS IN CLOUD SECURITY
Today, organizations are having to control access to their cloud environment and the
movement of their sensitive data and information to and from the same environment. This is the
point at which cloud security plays a significant role. However, cloud security does not play
these roles alone. It is with analytics that organizations are able to spot how sensitive data is
moving in the cloud, unauthorized activities, access control, data exfiltration, privilege misuse or
compromise, and unauthorized data sharing (Stark, 2019). This is because, data is manipulated
and analyzed in the cloud instead of in the cloud. Additionally, analytics introduce security
monitoring to the cloud and applications. Furthermore, with analytics, it enable organizations to
assess user entitlements and events in the cloud to identify and spot malicious activities (Stark,
2019).
Cloud computing is associated with offering a variety of models from which customers
can choose the right cloud computing service model according to their needs. At the same time, it
is known for posing challenges to users because it is connected to the Internet and, therefore,
accessed via the Internet. Storing data in the cloud facilitates opening of access points to both
internal and external malware. However, organizations find it difficult to find malware because
of the existence of a variety of malware detection tools in the market (Kumar, 2020). Malware is
the point at which large-scale distributed denial of service (DDoS) attacks, email spamming, and
phishing happens specifically through the deployment of botware. However, with analytics,
organizations are able to access, aggregate, analyze, and utilize data to select the best and most
effective malware detection system. An effective malware detection system has a mechanism for
detecting viruses, Trojan horses, worms, and spyware and protecting organizations against the
same and other forms of malicious codes (Kumar, 2020).
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4
ANALYTICS IN CLOUD SECURITY
Conclusion
Organizations are today migrating to cloud computing infrastructure. This is because of
the advantages associated with the infrastructure over the on-premises computing infrastructure.
However, organizations may not be able to achieve the best outcomes without cloud security.
With cloud security, organizations are able to protect their cloud computing infrastructure from
potential attacks. Analytics on the other hand is significantly shaping cloud security by
improving it and making it better so that organizations are able to benefit from the cloud
computing migration.
5
ANALYTICS IN CLOUD SECURITY
References
Hegde, S. (2022).
What is Cloud Analytics and Its Importance?
https://www.analyticsvidhya.com/blog/2022/10/what-is-cloud-analytics-and-its-
importance/
Kumar, V. (2020).
Cloud Security Analytics: Significance and Use Cases
.
https://www.analyticsinsight.net/cloud-security-analytics-significance-and-use-cases/
Morris, A. (2021).
What Is Cloud Analytics? How it Works & Benefits Businesses
.
https://www.netsuite.com/portal/resource/articles/erp/cloud-analytics.shtml
Stark, M. (2019).
Top Benefits of Cloud Analytics
.
https://analytiks.co/top-benefits-of-cloud-
analytics/