Computer Security • Evaluate approaches to the management of IT Security • Apply ideas from research and current practices to address problems of IT system security Assignment Description You have to...

1 answer below »
Computer Security • Evaluate approaches to the management of IT Security • Apply ideas from research and current practices to address problems of IT system security Assignment Description You have to (I) Write a research paper with a total size of 6-8 pages The research paper should contain at least the following sections. Note that you may add sections and subsections to improve the paper and its structure; for example, you may want to organize the literature review in sub-sections, and/or you may want to include a Background section after the Introduction. 1.


Document Preview:

Computer Security • Evaluate approaches to the management of IT Security • Apply ideas from research and current practices to address problems of IT system security Assignment Description You have to (I) Write a research paper with a total size of 6-8 pages The research paper should contain at least the following sections. Note that you may add sections and subsections to improve the paper and its structure; for example, you may want to organize the literature review in sub-sections, and/or you may want to include a Background section after the Introduction. 1. An abstract where you state what you have done, what is the contribution of the paper to the literature and what is the significance of that contribution (200-300 words). 2. An introduction where you state the research context/background, your research question, the practical relevance of this question, how you will answer this question, and how the paper is structured. 3. A critical analysis of existing literature addressing your research question. For relevant articles analyzed, provide a summary, discuss any interesting results, insights, or contributions, and also discuss limitations, omissions, or technical flaws you have identified that are important regarding your research question. Additionally, you can also review relevant practices from high quality sources, when applicable. 4. A discussion of mitigation/countermeasures from research and/or current practices that minimize or avoid issues identified by the literature review in respect to the research question. 5. A conclusion where you draw conclusions about the research you carried out to answer the research question. Elaborate on possibilities for future research; imagine you have the opportunity to carry on researching the topic based on the knowledge you gained and the ideas you mentioned in the discussion. The topic and research question that will drive your research can be selected from the list contained in the next section....



Answered Same DayDec 21, 2021

Answer To: Computer Security • Evaluate approaches to the management of IT Security • Apply ideas from research...

Robert answered on Dec 21 2021
119 Votes
Abstract
For many IT administrators, it appears that cloud computing is solely a brand new word for a
long-held vision of figuring as a function, that has lately arose as a poster realism. The
significant to thoughtful cloud computing, particularly as security within the cloud is turning
into a serious question, is to acknowledge that the knowledge is essentially not new, or
untried. Cloud computing is that the subsequent step for IT facilities to require as
had
components of IT are commoditized. Cloud computing signifies the reasonable development
to subcontracting of artifact IT services during a way the same as that that the govt. has been
undertaking for ages.
Introduction
Purpose
In IT promoting and in style management writings, the communication is that cloud
computing goes to renovate IT. Whether or not that's true isn't however clear; in truth, what
cloud computing is earnings a spread of variations.
This study seeks to elucidate the disparities of cloud services and inspect the present and
near-term possible for Federal cloud computing from the cyber security viewpoint. The
possible of cloud computing is especially necessary currently, once most federal
organizations area unit wanting to apprise aged heritage systems. It proposals debasing
openings to chop costs; fast-track growth; substitute high-ticket, rapidly old-fashioned
structure and growth organization tractability for each infrastructure and applications.
Moreover, IT and communications organization is vicinity wherever government
administrations usage a spread of obtaining models. Whereas several organizations still favor
to course their own organization, over the historically many years there has been a tendency
to distribution or integrative organization.
What is Cloud Computing?
Cloud computing suggests that various things to totally different folks. office has revealed no
but fifteen reiterations of its “Working Definition of Cloud Computing” normally terms,
cloud computing could be opportune, on-demand ideal for net access to a communal pool of
configurable processing resources (e.g., nets, servers, storing, applications, and facilities)
which will be chop-chop provisioned and free with marginal organization exertion or facility
supplier communication. The cloud part of cloud-computing originates from a figure used for
the net, from the method it's typically portrayed in network diagrams. Theoretically it bring
up to a prototypical of ascendible, real-time, internet-based data expertise facilities and
properties, sustaining the computing desires of consumers, while not the consumers
acquisition the prices of retaining the fundamental infrastructure. Samples within the personal
segment include providing mutual commercial applications on-line that are retrieved from an
online browser, with code and information hold on the “cloud” benefactor’s servers.
Security Challenges
Realizing cloud-computing resolution experiences totally different dangers than with
dedicated assistance information interiors. Risks related to the application of a brand new
technology service distribution model embody policy intervals, employment of active
applications, and safeguarding the dynamic atmosphere. The extenuation arrange for these
dangers rest on creating sturdy security program to instrument business best observes and
government policies within the organization of any package. Additionally, the federal
communal can have to be compelled to actively place in situ new security actions which are
able to allow protected use of active applications and information-sharing to be enforced
during a protected way.
Specific security challenges include:
Privacy:
Guidelines on the conduct of non-public data vary across the world and a rising range of
nations place limitations on whether or not it is hold on external of the nation. It’s
troublesome or not possible for a cloud service to produce one level of service that's
satisfactory in each dominion. Suppliers have become a lot of willing to lodge confidentiality
rules through written agreement promises to stock information inside precise republics,
though this is often troublesome to confirm.
“Actions should implement associate valuation plan once using cloud computing facilities.
Once revolving to cloud computing, operate of IT security can convert into a lot of of an
agreement and risk supervision character, instead of safekeeping operations”, aforesaid
Chenxi Wang, analyst at Forrester analysis. In associate age once the results and possible
prices of errors are increasing quickly for firms that manage private and personal...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here