TITLE

INFORMATION SECURITY Federal Guidance Needed to Address Control Issues with Implementing Cloud Computing

AUTHOR(S)
Wilshusen, Gregory C.
PUB. DATE
July 2010
SOURCE
GAO Reports;7/1/2010, preceding p1
SOURCE TYPE
Government Documents
DOC. TYPE
Article
ABSTRACT
The article discusses the advantages and disadvantages of implementing cloud computing in federal agencies. It states that cloud computing offers service models including the provision of infrastructure, computing platforms, and software. It indicates that cloud computing can lessen and elevate the security of information in federal agencies.
ACCESSION #
52428176

 

Related Articles

  • How to Evolve Federal Cloud Security. PRENDERGAST, TIM // Signal;Nov2015, Vol. 70 Issue 3, p15 

    The article examines how U.S. federal cloud security can evolve. Topics covered include how former U.S. Chief Information Officer Vivek Kundra paved the way for federal agencies to adopt cloud computing through the Cloud First initiative which mandates that agencies examine cloud options before...

  • A Novel Third Party Auditability and Dynamic Based Security in Cloud Computing. Vinitha Mary, J.; Backiyalakshmi, R. // International Journal of Computer Science & Information Technolo;2014, Vol. 5 Issue 1, p417 

    Cloud computing refers to the use and access of multiple server-based computational resources via a digital network (WAN, Internet connection using the World Wide Web, etc.). Cloud users may access the server resources using a computer or other device. In cloud computing, applications are...

  • Open Cloud Practice is the Way to Go. Bhalla, Anuj // Dataquest;6/30/2015, Vol. 33 Issue 12, p54 

    The article discusses the advantage of a free cloud platform over on-premise alternatives or public cloud platforms in terms of hosting applications. Topics mentioned include security as the main reason that refrains clients from adopting cloud, the emergence of Cloud Services Brokers, and a...

  • Cloud Computing Still Faces Obstacles to Adoption. Cohen, Howard M. // eWeek;1/17/2012, Vol. 29 Issue 1, p15 

    The article focuses on various obstacles which are hindering businesses from reaping the optimal benefits of cloud computing. It states that a lack of understanding and misinformation is a major concern which impede the customers' transition to cloud computing and discusses concerns related to...

  • CLOUD COMPUTING AND INFORMATION SECURITY. ńĆapek, Jan // Scientific Papers of the University of Pardubice. Series D, Facu;2012, Vol. 18 Issue 24, p23 

    The article takes into account cloud computing and information security. It is shown, that in spite of the advantage from costs point of view the data - placed within the cloud are still not safe, due to the fact that providers are not able to secure data from physical point of view. So the...

  • Building Trust in the CLOUD. Kothari, Pravin // Siliconindia;Jun2011, Vol. 14 Issue 6, p30 

    The article focuses on the technology of cloud computing. It states that according to a research by independent research firm Forrester Research, by 2020 global cloud computing market may reach upto 241 billion dollars. It highlights the issue of data security, compliance and governance in cloud...

  • Data Security and Privacy in Cloud Computing: Threat Level Indications. Razzaq Malik, Kaleem; Umar Chaudhry, Muhammad; Munwar Iqbal, Muhammad; Saleem, Yasir; Farhan, Muhammad // Science International;2014, Vol. 26 Issue 5, p1991 

    Cloud computing is becoming nowadays the major focus as the future of computer science. Due to its dynamic distributed nature it is adopted as a solution to the problems attached to such a networking. By looking at the architecture of cloud computing infrastructure as a service is considered to...

  • The First Steps to the Cloud. OTEY, MICHAEL // Windows IT Pro;Sep2011, Vol. 17 Issue 9, p4 

    The article highlights the advantages found in Office 365 and private cloud computing for businesses. While there are a lot of interesting going for cloud computing, only a few are willing to invest due to several reasons. The author says businesses already making a significant investment in...

  • Formulating a Security Layer of Cloud Data Storage Framework Based on Multi Agent System Architecture. Talib, Amir Mohamed; Atan, Rodziah; Abdullah, Rusli; Azmi Murad, Masrah Azrifah // International Journal on Computing;Aug2010, Vol. 1 Issue 1, p120 

    The tremendous growth of the cloud computing environments requires new architecture for security services. In addition, these computing environments are open, and users may be connected or disconnected at any time. Cloud Data Storage, like any other emerging technology, is experiencing growing...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics