6050_Week 1 Essay

docx

School

Strathmore University *

*We aren’t endorsed by this school

Course

ORGANIZATI

Subject

Information Systems

Date

Nov 24, 2024

Type

docx

Pages

5

Uploaded by DukeMinkMaster907

Report
1 Running Head: ANALYTICS IN CLOUD SECURITY Analytics in Cloud Security Student Name Wilmington University March 11, 2023
2 ANALYTICS IN CLOUD SECURITY Analytics in Cloud Security Introduction According to Hegde, (2022), more and more organizations are increasingly transitioning to the cloud. However, these organizations cannot effectively and securely make transition without a robust cloud security. With agility, scalability, and efficiency associated with cloud computing infrastructure, organizations are increasingly churning massive gains. Additionally, with cloud computing, organizations are gaining the ultimate in reliability. When organizations leverage the right cloud security measures, they will be in a better position of safely accessing data and applications within the cloud. In this paper, we described how analytics shape cloud security so that organizations can be in a better position of benefitting from cloud computing. How Analytics Shapes Cloud Security As organizations are increasingly adopting cloud computing technologies, cloud data security is consequently becoming increasingly important. In order that organizations achieve better cloud security, it has also become important that they create inclusive cybersecurity policies, an organizational culture of cybersecurity, and implementing cloud security controls and solutions. However, this would not be possible without organizations utilizing analytics (Morris, 2021). Utilizing analytics is increasingly helping organizations in identifying and remediating flaws in the cloud computing infrastructure as well as securing cloud data. Furthermore, with analytics, organizations are efficiently selecting the right cloud security solutions. By doing that, they are able to get the best when transitioning to cloud as well as ensuring security to the on- premises technology infrastructure in form of unauthorized access and data breaches (Morris, 2021).
3 ANALYTICS IN CLOUD SECURITY Today, organizations are having to control access to their cloud environment and the movement of their sensitive data and information to and from the same environment. This is the point at which cloud security plays a significant role. However, cloud security does not play these roles alone. It is with analytics that organizations are able to spot how sensitive data is moving in the cloud, unauthorized activities, access control, data exfiltration, privilege misuse or compromise, and unauthorized data sharing (Stark, 2019). This is because, data is manipulated and analyzed in the cloud instead of in the cloud. Additionally, analytics introduce security monitoring to the cloud and applications. Furthermore, with analytics, it enable organizations to assess user entitlements and events in the cloud to identify and spot malicious activities (Stark, 2019). Cloud computing is associated with offering a variety of models from which customers can choose the right cloud computing service model according to their needs. At the same time, it is known for posing challenges to users because it is connected to the Internet and, therefore, accessed via the Internet. Storing data in the cloud facilitates opening of access points to both internal and external malware. However, organizations find it difficult to find malware because of the existence of a variety of malware detection tools in the market (Kumar, 2020). Malware is the point at which large-scale distributed denial of service (DDoS) attacks, email spamming, and phishing happens specifically through the deployment of botware. However, with analytics, organizations are able to access, aggregate, analyze, and utilize data to select the best and most effective malware detection system. An effective malware detection system has a mechanism for detecting viruses, Trojan horses, worms, and spyware and protecting organizations against the same and other forms of malicious codes (Kumar, 2020).
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4 ANALYTICS IN CLOUD SECURITY Conclusion Organizations are today migrating to cloud computing infrastructure. This is because of the advantages associated with the infrastructure over the on-premises computing infrastructure. However, organizations may not be able to achieve the best outcomes without cloud security. With cloud security, organizations are able to protect their cloud computing infrastructure from potential attacks. Analytics on the other hand is significantly shaping cloud security by improving it and making it better so that organizations are able to benefit from the cloud computing migration.
5 ANALYTICS IN CLOUD SECURITY References Hegde, S. (2022). What is Cloud Analytics and Its Importance? https://www.analyticsvidhya.com/blog/2022/10/what-is-cloud-analytics-and-its- importance/ Kumar, V. (2020). Cloud Security Analytics: Significance and Use Cases . https://www.analyticsinsight.net/cloud-security-analytics-significance-and-use-cases/ Morris, A. (2021). What Is Cloud Analytics? How it Works & Benefits Businesses . https://www.netsuite.com/portal/resource/articles/erp/cloud-analytics.shtml Stark, M. (2019). Top Benefits of Cloud Analytics . https://analytiks.co/top-benefits-of-cloud- analytics/