Cyber Security Policies In The Private And Public Sector

Read Complete Research Material



Cyber Security Policies in the Private and Public Sector



Introduction1

Discussion2

Cloud Computing2

Cloud Computing Architecture3

Infrastructure-as-a-Service (IaaS)3

Platform-as-a-Service (PaaS)4

Software-as-a-service (SaaS)4

Cloud Computing and Cyber Security5

Cloud Computing Risks6

Cloud Computing Threats7

Cloud Computing Vulnerability7

Policies8

Cloud Computing Security Enablers8

Key Management9

Identity & Access Management9

Secure Software Development Lifecycle9

Security Management9

Multi-Clouds Federation Security10

Conclusion10

References11

Cyber Security Policies in the Private and Public Sector

Introduction

The vulnerabilities of the cyber security challenge the individuals, businesses and governments globally. By the individuals and countries, these cyber attacks have been started. The victims and targets of the cyber attacks incorporate the companies, military defenses, political organizations, and the government networks. All these were targeted in order to conduct the industrial or diplomatic intelligence, military intelligence, or the activities of politics. Additionally, the national limits of data mean nothing to the cyber attackers. The attributes of cyber attackers to particular locations can be intricate that also creates problematic response (Tehan, 2013).

As far as the usage and implementation, still the domain of cloud computing is in its early years. Moderately, this is because of the high promotion of the cloud computing through the advancement of technology and is so dependent on the resources that the researches have not had several chances to experiment and asses it. In the present world, the fundamental comprehending of cloud computing is meant to a number of concepts.

These concepts include the software as a service, utility computing, grid computing, and virtualization. These concepts are linked to a client, which uses a remote service of the providers, which is also identified in the cloud. If the debate should be initialized on the concepts that they should be dealt individually and separated in terms of definition, then the general consensus is that all these concepts should be summed up in the umbrella term of cloud computing.

Other than the recent updates and developments of the cloud computing, a number of discussions on the security and protection of the cloud services are discussed. The cyber security of cloud computing is becoming very intricate and requires effective approaches to control it. This paper discusses about the security risk and concerns of the cloud computing that incorporates its architecture, threats and vulnerabilities (Morsy, Grundy, & Muller, 2010).

Discussion

Cloud Computing

The cloud computing is the means of constructing the services of IT that utilizes the enhanced storage abilities and the improved power of computation. From the viewpoint of service provider, the main emphasis of cloud computing as an unconnected hardware is to support the downtime to any available network device. This is done without any change in the perspective of the user data.

In addition, the data of the user can be easily moved and shifted from one cloud to another without any data loss. It is been proposed that a mechanism of layering should happen among the back-end storage and servers, middle-ware networking, and the front-end software. Through this, each and every component of the cloud computing can be evaluated, implemented, ran, and designed accordingly and independently from the following layers (Bisong, & Rahman, 2011).

The concept and services of cloud computing are growing rapidly and there are ...
Related Ads
  • The Right To Privacy In T...
    www.researchomatic.com...

    This conflict reconsiders the basic questions as to ...

  • It Ethics
    www.researchomatic.com...

    ... reasons that it has become essential for ...