Cloud Security{2}


by Han C
Onsite resources are not the only ones in need of protection anymore. Every day new methods of cloud computing are being introduced and adopted by companies of all sizes, all over the world. That’s the beauty of the cloud. You can access it from just about anywhere but so can the bad guys. The article I researched discusses the importance of security in the cloud environment. It even states that “cloud computing is subject to the same threats as traditional dedicated hosting and in-house computing” meaning that hackers are able to prey on weak or unsecured passwords just the same and customers or end users need to be warned. Adopters of cloud technologies should learn how things work before going full throttle into adoption. This test drive can provide the IT department with insight into system integration and a greater understanding of how to mitigate risks within their infrastructure.

 

In addition to this, there should be an action plan in place to compare reputable cloud providers to make sure that there is sufficient security to protect data and prevent downtime. Any disruption could potentially be catastrophic for a business. Compare the compliance measures in place and the specificities of each because cloud computing is continually evolving there may already be newer security technologies. Furthermore, the article discusses a forward thinking method to plan for cloud adoption. Meaning that while some companies seek short-term benefits, all companies should be planning for longer-term cloud strategies to avoid unintentional design limitations.

 

I was able to find this article from my subscription of The Processor. It holds relevance to what we are discussing in class because we are preparing to do our first project on SaaS or Software as a Service in relation to cloud computing. In addition, the topic of cloud computing was a huge subject matter during the 2011 Information Technology Competition, hosted by Cal Poly Pomona’s, CIS department and College of Business. Which seemingly implies that companies may have already adopted cloud technologies or were considering these ventures. Students should be mindful that there is a whole other industry which is still in its infancy stages and the ability to tailor their skills towards this industry may hold great possibilities.

 

Sources: The Processor. March 23, 2012. v34 Issue6. Minimize Cloud Computing Risks: Overcome Vulnerabilities and Build a Secure Cloud Environment. http://www.processor.com/editorial/article.asp?article=articles/P3406/22p06/22p06.asp&guid=