TITLE

Securing the Cloud

AUTHOR(S)
Bates, Keith
PUB. DATE
August 2010
SOURCE
Database & Network Journal;Aug2010, Vol. 40 Issue 4, p10
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article focuses on how information technology (IT) organisations can reduce the risk of moving to cloud computing, but still obtain all the benefits of economies of scale, new revenue systems, and reduced headcount. It states that Independent Software Vendors (ISVs) and other IT providers are shifting from on-premise systems to cloud-based service delivery. However, it says that shifting to cloud computing from using on-premise systems appears inexorable. Moreover, it emphasizes on the system's security implications including data protection, vulnerability management, and privacy practices that should be considered by organizations. Furthermore, organisations should look at the key issues such as authentication and access control on the application of public cloud services.
ACCESSION #
53011031

 

Related Articles

  • Cloud Security Mechanisms for Data Protection: A Survey. Joseph, Allen Oommen; Kathrine, Jaspher W.; Vijayan, Rohit // International Journal of Multimedia & Ubiquitous Engineering;2014, Vol. 9 Issue 9, p81 

    Cloud computing has evolved over the years in providing various services to the end users. The cloud features makes it acceptable by the industries in leveraging most of its applications in to the cloud. Security concerns exist in most cloud platforms and are prone to various attacks. This paper...

  • Countering the Dropbox.com Security Menace. Vizard, Michael // Channel Insider;4/9/2012, p1 

    The article reports on the concerns over the security and productivity issues involving Dropbox.com. Dropbox users believe that information technology (IT) organizations were not prepared for the need to share documents among users. Meanwhile, IT professionals are anxious about the security...

  • DEDIPOWER OFFERS ISV ACCESS TO PRIVATE CLOUD, HYBRID HOSTING.  // UNIX Update;May2010, Vol. 21 Issue 5, p4 

    The article focuses on the comprehensive suite of server and storage solutions being offered by DediPower Managed Hosting of Reading, England to Independent Software Vendors (ISV). Included in the offering is a managed hosting and managed Private Cloud consulting service. Partnership with...

  • Targeted attacks are changing the IT security landscape. Scott, Jennifer // Computer Weekly;7/16/2013, p21 

    The article presents information from a information technology security roundtable hosted by the journal "Computer Weekly" in Edinburgh, Scotland. Topics discussed includes the shift by criminals away from random attacks and toward targeted attacks, the threat that social networks websites like...

  • NEWS BRIEFS.  // SC Magazine: For IT Security Professionals (15476693);Oct2010, Vol. 21 Issue 10, p14 

    This section offers news briefs related to information technology security in the U.S. Payment Card Industry (PCI) Council general manager Bob Russo stressed that merchants and assessors should not expect major changes when the version 2.0 of PCI Data Security Standard (PCI DDS) is launched. A...

  • Salesforce's Force.com Gives ISVs Entry to Cloud.  // Channel Insider;2/18/2010, p1 

    An excerpt from the article regarding the solid on-ramp applications offered by Force.com to independent software vendors (ISVs) from the website http://www.eweek.com/c/a/Cloud-Computing/Building-for-the-Cloud-with-Forcecom-759200 is presented.

  • How Safe Is the Cloud? Tillery, Steve // Baseline;Sep/Oct2010, Issue 106, p15 

    The article offers tips on how to improve information technology (IT) security systems of companies. It states that some of consumers perceive that engaging IT in cloud computing would be dangerous, however, it was stated that the IT security threats were not from the cloud but in the security...

  • Lies, Damned Lies and Statistics. Macleod, Calum // Database & Network Journal;Dec2008, Vol. 38 Issue 6, p17 

    The article reports on the improper use of computer systems of an organization due to the misuse of privilege accounts. It notes that through privilege accounts, users can bypass internal control to access confidential data. Such accounts are said to pose significant security risks especially...

  • All about the data. Grimes, Roger A. // NetworkWorld Asia;Nov2007, Vol. 3 Issue 10, p40 

    The article offers tips on how to secure information technology infrastructure and storage system in data-centric approach. According to the author, the different efforts made by various companies to secure its security systems has only one objective which is to protect information integrity....

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics