Many organizations are using cloud services in place of


The Scenario

Many organizations are using cloud services in place of internal IT services hosted on premise. Cloud services reduce the need for capital expenditure and can be set up in minutes without the need for long hardware procurement cycles. However using cloud services implies a loss of control over the infrastructure used to provide the services but not the need for security.
There are many forms of cloud service these include Software as a Service, Platform as a Service, and Infrastructure as a Service. There are many deployment models including Public Cloud, Private Cloud and Community Cloud.

Assignment Task

This assignment requires you to write a report which describes the major information security challenges faced by an organization using cloud IT services in place of internal IT services hosted on premises. You should use research from the internet and other available sources to identify these challenges. This report should then describe the technologies that are available and relevant that an organization using cloud services can exploit to manage the challenges that you have identified. It should then provide some recommendations. The report should not exceed 3000 words in length.

Report Structure
Introduction
This should be an introduction and summary of your paper and findings in 200 to 300 words.

  • Description of cloud services and deployment models
  • This should provide a short description of the different cloud service models and deployment models together with a summary their advantages and security challenges. As a guide, an approximate word count for this section is 800 words.
  • Security Challenges of cloud services.
  • Identify and describe the major information security challenges of cloud services to an organization that is using them. Describe how the responsibility for security is divided between the cloud service provider and the cloud service tenant. As a guide, an approximate word count for this section is 800 words.

Relevant Information Security Technologies.

This section should describe the relevant IT security technologies and approaches that are available to an organization using cloud services to manage the security challenges that were described in the previous section. It should provide practical advice on which technologies are most suitable and their effectiveness. As a guide, an approximate word count for this section is 800 words.
Conclusions and recommendations

This section should be 200 to 300 words in length and should summarize the conclusions and recommendations from your study.

Request for Solution File

Ask an Expert for Answer!!
Basic Computer Science: Many organizations are using cloud services in place of
Reference No:- TGS01245750

Expected delivery within 24 Hours