One of the biggest risks that organizations face when using cloud computing is the fact that they expose their customers and their proprietary information to hackers and other forms of activities that are conducted by people with malefic intentions. Consider the photos of celebrities that were leaked to the world by the hackers from the iCloud hack. (Olivarez-Giles, 2014) This is a live example of how proprietary technologies can be attacked and at the same time powerful people’s private information can be leaked to the outside world and this is one of the biggest threats that companies face.
It is technically impossible for any cloud services platform to have 100% uptime and provide this benefit to all its customers. (2020) There will be a point in time but there is a desperate need for organizations to log onto the virtual machines that has been set up in the cloud platform, but for some reason or the other either a hardware failure or a software failure this could lead to the virtual machine being unavailable to the customer and therefore this will lead to a loss or some form of handicap to the end customer.
In my opinion, yes it does provide a viable solution. But does that mean that there will not be other areas that are not mentioned in the article that will be exposed by future attackers, the answer would be no. In order to handle all types of risks, risk management steps need to evolve periodically over a period of time so that they are able to adapt to the upcoming different types of threats and they can be tested against these attacks and they can be used against future forms of attacks.
Despite the fact that cloud computing offers a variety of advantages such as scalability, cost-efficiency, reliability, increased security, remote access, and integration, it also comes with a number of issues and risks. According to Mackita, Shin, & Choe (2019), there has been an increase in the number of organizations migrating to the cloud in recent years with the goal of maximizing the benefits associated with cloud computing. However, Mackita, Shin, & Choe point out that when it comes to risk management, it’s critical for businesses to understand the many risks that come with these technologies.
There are a number of threats in the cloud, each with its own frequency of occurrence and severity. According to Erl Puttini and Mahmood (2013), despite firms increasing their IT resources for system security, the human factor will always be the greatest threat to system security. Insider threats have remained a key source of concern over the years. People are the same entities tasked to protect the cloud environment, which is one of the key reasons why maintaining the appropriate security levels is a threat. In this case, an organization may concentrate in building system that may prevent an organization from external attacks only for cases such as data breaches to occur within the institutions (James, 2018). Singh & Pandey (2018) categorizes these threats as malicious insiders whereby these group would either be current or former employees. In this case, these employees have the privileges of accessing the cloud resources hence they might attack and cause harm to the cloud environment.
Please provide two response for Discussion 1 &2. A substantive post will do at least two of the following:
- Ask an interesting, thoughtful question pertaining to the topic
- Answer a question (in detail) posted by another student or the instructor
- Provide extensive additional information on the topic
- Explain, define, or analyze the topic in detail
- Share an applicable personal experience
- Provide an outside source that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
- Make an argument concerning the topic.
Need 150 words each reply