Top Threat to cloud computing in Management information system

Muhammad Mohsin

Abstract


Cloud Computing represents one of the most significant shifts in information technology many of us are Likely to see in our lifetimes. Reaching the point where computing functions as a utility has great Potential, promising innovations we cannot yet imagine. Customers are both excited and nervous at the prospects of Cloud Computing. They are excited by the opportunities to reduce capital costs.

They are excited for a chance to divest them of infrastructure management, and focus on core competencies. Most of all, they are excited by the agility offered by the on-demand provisioning of computing and the ability to align information technology with business Strategies and needs more readily. However, customers are also very concerned about the risks of Cloud Computing if not properly secure, and the loss of direct control over systems for which they are nonetheless accountable. Numerous organizations around the world are incorporating the guidance to manage their cloud strategies.

Some cloud applications contain regulated personal information, while others instead provide cloud-based protection against external threats. It is incumbent upon the cloud customer to understand the organizational value of the system they seek to move into the cloud. Ultimately, CSA guidance must be applied within the context of the business mission, risks, rewards, and cloud threat environment —using sound risk management practices.

The purpose of this document, “Top Threats to Cloud Computing”, is to provide needed context to assist organizations in making educated risk management decisions regarding their cloud adoption strategies. We have tried to focus on issues we feel are either unique to or greatly amplified by the key characteristics of Cloud Computing and its shared, on-demand nature.

 


Keywords


Cloud computing; threats in cloud computing, Infrastructure as a Service, IaaS, Platform as a Service, PaaS, Software as a Service, SaaS; computer security; data security; API

Full Text:

Untitled




Copyright (c) 2018 Edupedia Publications Pvt Ltd

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

 

All published Articles are Open Access at  https://journals.pen2print.org/index.php/ijr/ 


Paper submission: ijr@pen2print.org