Write reply to this post -nbsp identifying risky users and


Write reply to this post.

Cloud computing is quickly becoming a new and emerging way for companies to operate. By conducting their business on the cloud, business owners have flexibility to provide services to a large group of customers without the concern for regulating bandwidth, storage congestion, or large volume equipment expenses. All these advantages, with several other pros, translates to a bottom line of cost savings for the business. In a web article for Lifewire magazine, Priya Viswanaathan confirms this fact stating, Cloud computing is probably the most cost efficient method to use, maintain and upgrade (Viswanaathan, 2017).

It is for these reasons I believe Cloud computing is the next big focus for business's Chief Information Officers Although there are many advantages to cloud computing, there are likewise disadvantages that should be weighed in the decision to use this service. Security attacks are on the rise in this emerging technology and over the past year there has been several high profile attacks which by attacking one cloud service provider, thousands of businesses transactions were critically interrupted[1].

Posted in their Internet Security Threat Report, one key finding stated by anti-virus giant Symantec concluded, widespread adoption of cloud applications in corporations, coupled with risky user behavior that the corporation may not even be aware of, is widening the scope for cloud-based attacks (Symantec, 2017). Denial of Service, Ransomware, cyber fraud and identity theft either by data breeches or risky behavior of employees, are all on the rise through attacks on the cloud.

User Behavior Analysis (UBA) is critical to identifying risky users and identifying and preventing exploits such as data exfiltration, data destruction, and account compromise. (Symantec, 2017). Education of company policies and training in the proper use for employees is one way to assist the security process. In a concluding statement on the advantages and disadvantages of cloud computing, contributing authors were in agreement saying We conclude that while Cloud computing technology can prove to be a great asset to companies, it could also cause harm if not understood and used properly (Fujita, H., Tuba, M., & Sasaki, J., 2013).

Reference Viswanathan, P. (2017). What You Should Know Before Moving to the Cloud. Retrieved April 26, 2017, Fujita, H., Tuba, M., & Sasaki, J. (2013).

Recent advances in applied computer science and digital services: proceedings of the 13th international conference on applied computer science (ACS '13), proceedings of the 2nd international conference on digital services, internet and applications (DSIA '13): Morioka City, Iwate, Japan, April 23-25, 2013. Greece: WSEAS Press. Symantec: Internet Security Threat Report (ISTR), Volume 22. (2017, April). The Cloud is a Dangerous Place

Solution Preview :

Prepared by a verified Expert
Software Engineering: Write reply to this post -nbsp identifying risky users and
Reference No:- TGS02275576

Now Priced at $10 (50% Discount)

Recommended (94%)

Rated (4.6/5)