Week 7 Discussion Overall rating of the message is 0. Overall Rating: Your Rating: Some organizations are moving their business applications to the cloud to reduce their infrastructure costs. In some instances, organizations use web applications, which introduces security challenges. Go to to locate and integrate at least two quality, academic resources (in addition to your textbook) on cloud computing and the risks associated with it. You may also use government websites, such as from the National Institute of Standards and Technology.
Cloud computing has become a popular choice for organizations to reduce infrastructure costs associated with their business applications. By moving their applications to the cloud, organizations can take advantage of the scalability, flexibility, and cost savings that cloud computing offers. However, this shift to the cloud also introduces various security challenges that organizations must address.
In order to gain a comprehensive understanding of cloud computing and the risks associated with it, it is important to consult quality, academic resources. In addition to the textbook, two such resources that can provide valuable insights into cloud computing and its security risks are the National Institute of Standards and Technology (NIST) and reputable academic research.
The National Institute of Standards and Technology is a government agency that provides guidance and standards for various industries, including cloud computing. Their publication on “NIST Special Publication 800-144: Guidelines on Security and Privacy in Public Cloud Computing” is a comprehensive resource that delves into the security and privacy challenges of cloud computing. It outlines various risks associated with cloud computing, such as data breaches, data loss, insider threats, and shared resources vulnerabilities. It also provides recommendations and best practices for organizations to mitigate these risks and enhance the security of their cloud-based applications.
Academic research is another valuable source of information on the risks associated with cloud computing. Researchers in the field of computer science, information security, and cloud computing have conducted numerous studies to analyze and understand the security challenges of cloud computing. For example, a study conducted by researchers from the University of California, Berkeley, titled “Above the Clouds: A Berkeley View of Cloud Computing,” provides a detailed analysis of the security risks associated with cloud computing. The study examines risks such as data breaches, insecure APIs, shared technology vulnerabilities, and malicious insiders. It also highlights the need for robust security measures and controls to protect against these risks.
Both the NIST publication and academic research contribute to our understanding of the risks associated with cloud computing. They provide valuable insights into the various security challenges organizations face when adopting cloud computing and offer recommendations and best practices to mitigate these risks. By consulting these quality resources, organizations can make informed decisions about their cloud computing strategies and implement effective security measures to protect their data and applications in the cloud.
In conclusion, the shift to cloud computing offers organizations cost savings and flexibility. However, it also introduces security challenges that organizations must address. By referring to quality, academic resources such as the NIST publication and academic research, organizations can gain a comprehensive understanding of the risks associated with cloud computing and implement effective security measures to protect their cloud-based applications.