Controlling Access

User Generated

vevfu_unc7976

Computer Science

Description

This is the third assignment of the series. Continue the Applying Risk Management Consulting assignment for your chosen organization.

Refer to your Week Three individual assignment.

Write a 4- to 5-page business proposal in which you cover what concerns and potential actions the organization should take for each of the following areas:

  • How to manage and control the use of cloud resources and other service providers that may be used for processing and data storage outside the organization's physical locations
  • Specific recommendations to control mobile access to organizational system users (employees and customers)
  • Identify specific issues to be addressed with business partners and inter-connection of systems.

Note: Brief the organization on the major issues involved but keep each section succinct.

Format your business proposal consistent with APA guidelines.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hi, kindly find attached

Running Head: CONTROLLING ACCESS BUSINESS PROPOSAL

Controlling Access Business Proposal
Student’s Name
Institution
Date

1

CONTROLLING ACCESS BUSINESS PROPOSAL

2

Introduction
The recent advancements in technology and increased data insecurities have led to the
emergence of new means of storing and processing data for organizations some of which are offpremise such as the cloud resources (Yang & Jia, 2014). However, there is need to manage and
control these resources and other providers of these services because of the associated risks that
are the threat to the organization’s data security. Again there is a need for the organization to
develop and implement effective strategies for controlling mobile access to its systems by
various parties including the employees and customers. All these issues are addressed in the
proposal and specific recommendations provided as well. Data or information is among the core
assets of every organization which must be secured and protected because they are critical to the
organization's success and its long-term survival.
Management and Control of Off-Premise Data Processing and Storage Resources
Like most the other organizations in various industries today, the organization has
adopted some off-premise data storage and processing resources such as the cloud's services
(Younis et al., 2014). However, these new techniques and technologies have several risks they
expose the organization thus it is essential that appropriate strategies for managing and
controlling these risks are controls are implemented. This will protect the organization’s data
and minimize the exposure to risks associated with information insecurity arising from the use of
these external resources in storage and information processing especially the cloud services.
Major concerns and Risk Exposures
The risks and concerns associated with off-premise data storage and processing resources
are many. Among the most common resources used by the organization for this purpose are the

CONTROLLING ACCESS BUSINESS PROPOSAL

3

cloud services. Other big data storage service providers are Amazon, Google, and Microsoft.The
cloud services normally appear to be relatively static, but behind the scenes, a lot happens. Once
the organization's data is fed into the cloud it might transverse thr...


Anonymous
Great content here. Definitely a returning customer.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags