Risks Associated with Cloud Computing Adoption Paper

User Generated

wtbyqf

Computer Science

Description

As an IT analyst for BallotOnline, a company providing voting solutions to a global client base, you are working to convince the organization to move the current infrastructure to the cloud.

Your supervisor and the director of IT, Sophia, has asked you to summarize for the company executives the potential risks and compliance issues that BallotOnline will have to contend with in the transition to the cloud.

Unformatted Attachment Preview

As an IT analyst for BallotOnline, a company providing voting solutions to a global client base, you are working to convince the organization to move the current infrastructure to the cloud. Your supervisor and the director of IT, Sophia, has asked you to summarize for the company executives the potential risks and compliance issues that BallotOnline will have to contend with in the transition to the cloud. Step 1: Research Risks Associated With Cloud Adoption • The first step in assessing risk in cloud computing will be to identify and describe risk concepts and cloud computing risk factors associated with cloud adoption. As a software as a service (SaaS) company considering an infrastructure as a service (IaaS) cloud service provider for your hosting needs, consider third party outsourcing issues and the generally accepted best practices for cloud adoption and review relevant cloud risk case studies. You should also consider best practices for cloud adoption. • As part of the risk management process, identify and describe other types of risk, such as risks associated with having a service-level agreement (SLA). An example of a potential risk could be if your company is obligated to protect personal information, and then the cloud provider that you use suffers a security breach exposing that personal information. • Here, identify and describe other types of risks or potential liability issues that apply to BallotOnline and discuss them with your colleagues in the Discussion: Risk forum. • You will incorporate your research into your final report. • Step 2: Identify the Most Appropriate Guidelines for Managing Risks • In order to identify guidelines applicable to your company's industry, you must have an understanding of the different types of risk management guidelines that exist and are frequently applicable in cloud environments. • There are several cybersecurity standards applicable to cloud computing environments such as the NIST Cybersecurity Framework, ISO standards, and US federal government standards (DoD/FIPS), as well as several major sets of risk guidelines for dealing with the risks involved. Also, there are organizations such as the Cloud Security Alliance (CSA) that recommend best practices for managing risks. • Review the different guidelines and determine which are most appropriate for BallotOnline. For example, NIST has responsibility for developing a number of elections industry guidelineswithin the United States. • Identify why those guidelines are most appropriate and compile these items into a brief (one page or less) recommendation and justification of your choice. Your recommendation will also be incorporated into your final report in the final step.
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: CLOUD COMPUTING TECHNOLOGY

Cloud Computing Technology
University Affiliation
Student Name
Date

1

2

CLOUD COMPUTING TECHNOLOGY
Introduction
Many companies have adopted cloud computing for the need of ensuring that their
Information Technology infrastructure is improved and well enhanced. Cloud computing has
seen tremendous growth over the past few years. Cloud computing is the delivery of computing
services over the internet. Some of these computing services are data and information storage,
networking, servers, software as well as intelligence among others. Many benefits come with
cloud computing such as lower operating costs; companies experience faster innovation.
Companies enjoy economies of scale and running of the company’s infrastructure more
efficiently (Rittinghouse & Ransome, 2016). As BallotOnline Company moves its infrastructure
to cloud computing service providers, the company has to understand different security threats
that cloud computing has before adopting the growing technology to avoid any possible future

issues. It is known that most of the cloud computing providers are aware of various issues related
to cloud computing hence it is crucial that every company be aware and make wise decisions
(Botta et al., 2016).
Risks Associated with Cloud Computing Adoption
Security is one of the fundamental features that BallotOnline among other companies
considers each day because most of the company’s services is online. It is crucial to understand
that the internet market is one of the most venerable markets by different attacks that can
compromise the authenticity of the company. Cloud computing is done wholly on the internet
hence is faced by many threats as well. Some of the negative risks associated to cloud computing
are:

CLOUD COMPUTING TECHNOLOGY

3

Reduced Control and Visibility by Consumers
Once a company transitions to cloud computing, it...


Anonymous
Great! 10/10 would recommend using Studypool to help you study.

Studypool
4.7
Indeed
4.5
Sitejabber
4.4

Similar Content

Related Tags