Cloud Security

by Han C
Onsite resources are not the only ones in need of protection anymore. Every day new methods of cloud computing are being introduced and adopted by companies of all sizes, all over the world. That’s the beauty of the cloud. You can access it from just about anywhere but so can the bad guys. The article I researched discusses the importance of security in the cloud environment. It even states that “cloud computing is subject to the same threats as traditional dedicated hosting and in-house computing” meaning that hackers are able to prey on weak or unsecured passwords just the same and customers or end users need to be warned. Adopters of cloud technologies should learn how things work before going full throttle into adoption. This test drive can provide the IT department with insight into system integration and a greater understanding of how to mitigate risks within their infrastructure.

 

In addition to this, there should be an action plan in place to compare reputable cloud providers to make sure that there is sufficient security to protect data and prevent downtime. Any disruption could potentially be catastrophic for a business. Compare the compliance measures in place and the specificities of each because cloud computing is continually evolving there may already be newer security technologies. Furthermore, the article discusses a forward thinking method to plan for cloud adoption. Meaning that while some companies seek short-term benefits, all companies should be planning for longer-term cloud strategies to avoid unintentional design limitations.

 

I was able to find this article from my subscription of The Processor. It holds relevance to what we are discussing in class because we are preparing to do our first project on SaaS or Software as a Service in relation to cloud computing. In addition, the topic of cloud computing was a huge subject matter during the 2011 Information Technology Competition, hosted by Cal Poly Pomona’s, CIS department and College of Business. Which seemingly implies that companies may have already adopted cloud technologies or were considering these ventures. Students should be mindful that there is a whole other industry which is still in its infancy stages and the ability to tailor their skills towards this industry may hold great possibilities.

 

Sources: The Processor. March 23, 2012. v34 Issue6. Minimize Cloud Computing Risks: Overcome Vulnerabilities and Build a Secure Cloud Environment. http://www.processor.com/editorial/article.asp?article=articles/P3406/22p06/22p06.asp&guid=

2 thoughts on “Cloud Security”

  1. Looking over the article I was able to see how there is a connection with cloud computing. There are small and large businesses that are going into this new technology but many are going into the idea not knowing that if the cloud goes down there may not be a way to get your information back. Many things still should be placed on a local hard drive to help downtime if someting does occur to a cloud.
    On a personal use level there are many people that do not know the side effects of what they are doing many people have unsecure networks and believe some of their passwords to their wifi are secure. Many things can be broken and if you use the cloud people can be sharing their information with one another in a good way or a bad way. Security needs to be a focus for everyone the cloud is only good if you know how to secure your personal information

Comments are closed.