Amazines Free Article Archive
www.amazines.com - Thursday, April 18, 2024
Read about the most recent changes and happenings at Amazines.com
Log into your account or register as a new author. Start submitting your articles right now!
Search our database for articles.
Subscribe to receive articles emailed straight to your email account. You may choose multiple categories.
View our newest articles submitted by our authors.
View our most top rated articles rated by our visitors.
* Please note that this is NOT the ARTICLE manager
Add a new EZINE, or manage your EZINE submission.
Add fresh, free web content to your site such as newest articles, web tools, and quotes with a single piece of code!
Home What's New? Submit/Manage Articles Latest Posts Top Rated Article Search
Google
Subscriptions Manage Ezines
CATEGORIES
 Article Archive
 Advertising (133573)
 Advice (161671)
 Affiliate Programs (34799)
 Art and Culture (73855)
 Automotive (145712)
 Blogs (75614)
 Boating (9851)
 Books (17223)
 Buddhism (4130)
 Business (1330636)
 Business News (426446)
 Business Opportunities (366518)
 Camping (10973)
 Career (72795)
 Christianity (15848)
 Collecting (11638)
 Communication (115089)
 Computers (241951)
 Construction (38962)
 Consumer (49953)
 Cooking (17080)
 Copywriting (6733)
 Crafts (18203)
 Cuisine (7549)
 Current Affairs (20319)
 Dating (45908)
 EBooks (19703)
 E-Commerce (48258)
 Education (185521)
 Electronics (83524)
 Email (6438)
 Entertainment (159854)
 Environment (28970)
 Ezine (3040)
 Ezine Publishing (5453)
 Ezine Sites (1551)
 Family & Parenting (111007)
 Fashion & Cosmetics (196605)
 Female Entrepreneurs (11853)
 Feng Shui (134)
 Finance & Investment (310615)
 Fitness (106469)
 Food & Beverages (63045)
 Free Web Resources (7941)
 Gambling (30227)
 Gardening (25202)
 Government (10519)
 Health (630137)
 Hinduism (2206)
 Hobbies (44083)
 Home Business (91657)
 Home Improvement (251210)
 Home Repair (46243)
 Humor (4723)
 Import - Export (5459)
 Insurance (45104)
 Interior Design (29616)
 International Property (3488)
 Internet (191029)
 Internet Marketing (146687)
 Investment (22861)
 Islam (1161)
 Judaism (1352)
 Law (80506)
 Link Popularity (4596)
 Manufacturing (20914)
 Marketing (99316)
 MLM (14140)
 Motivation (18233)
 Music (27000)
 New to the Internet (9496)
 Non-Profit Organizations (4048)
 Online Shopping (129734)
 Organizing (7813)
 Party Ideas (11855)
 Pets (38165)
 Poetry (2229)
 Press Release (12689)
 Public Speaking (5643)
 Publishing (7566)
 Quotes (2407)
 Real Estate (126700)
 Recreation & Leisure (95495)
 Relationships (87674)
 Research (16182)
 Sales (80350)
 Science & Technology (110290)
 Search Engines (23514)
 Self Improvement (153300)
 Seniors (6220)
 Sexuality (36010)
 Small Business (49311)
 Software (83033)
 Spiritual (23516)
 Sports (116155)
 Tax (7663)
 Telecommuting (34070)
 Travel & Tourism (308304)
 UK Property Investment (3123)
 Video Games (13382)
 Web Traffic (11790)
 Website Design (56919)
 Website Promotion (36663)
 World News (1000+)
 Writing (35844)
Author Spotlight
TAL BARNEA

Tal is an electrical engineer with over 25 years of expertise with hardware, software, mechanical an...more
MANMOHAN SINGH

Digital marketing professional with 8 years of experience. A good listner, Stratgist and fun loving ...more
LEMUEL ASIBAL

Lemuel Asibal is a web content writer who also ventures on writing articles and blog posts about any...more
TUSHAR BHATIA

Tushar Bhatia is the Founder President of EmpXtrack Inc with over 19 years of experience in the soft...more
BRENDA PANIN

Passionate blogger and a great animal lover. ...more


What to expect of cloud computing by Innes Donaldson





What to expect of cloud computing by
Article Posted: 03/03/2015
Article Views: 218
Articles Written: 2885
Word Count: 1089
Article Votes: 0
AddThis Social Bookmark Button

What to expect of cloud computing


 
Advice,Business,Consumer
In the IT business, one frequently see businesses and government entities fielding contracts to provide wireless capabilities for their facilities and personnel. As a security professional, the first question is always: "Why?" experience has shown that, businesses and government agencies tend to undervalue the sensitivity of their data-even their mundane, everyday data. They also tend to underestimate the vulnerabilities introduced by wireless connections points, even if secured, and their potential risk to expensive systems and business operations.

Recently, there has been a virtual explosion in the use of Cloud Computing to decrease security costs and increase accessibility to data. Once again, businesses and government entities are jumping on the bandwagon to place volume upon volume of proprietary and potentially sensitive data into the great wide open of "The Cloud." In this process, data owners are yielding broad powers of control over their data to external service providers for which an appropriate trust relationship may not be fully established, nor understood. Once again, I the basic question is, "Why?"

The Attraction of Cloud Computing

Cloud Computing utilizes internet web services from external vendors to provide companies an attractively-priced and scalable means to outsource infrastructure, software, and even technical expertise. The vendor provides these services en-masse, leveraging the efficiencies inherent in economies of scale to provide IT capabilities that would be more expensive, or even prohibitive, to build and maintain independently.

A company or government agency of virtually any size can invariably find some aspect of their operation, or even a total solution, that would realize reduced financial costs in moving internal systems and capabilities into the Cloud. In fact, ventures with limited or non-existent internal information security resources to begin with may greatly improve their security posture simply by making the move.

It all sounds so new, wonderful, and exciting; and to a certain extent it is. But even in an economy dominated by the bottom line, it is easy to overlook a simple truth: The real value of a piece of data to its owner cannot be fully captured by a dollar sign, alone. In fact, that data may be priceless.

The Element of Trust

Often times, the true value of a piece of data is not realized until it is compromised. We work with volumes of data every day, and it is easy to take it for granted. It is also easy to take commercial services for granted. So, let the buyer beware: When considering outsourcing resources into the Cloud, it is imperative to understand the value of data and capabilities being entrusted to the vendor, as well as the nature of the trust relationship-with both the vendor and their third-party business partners! After all, you may be giving them the keys to the kingdom. As a starting point, some simple questions to consider should be:

Where will the data be located, both physically and logically? Different states within the U.S., and certainly different countries, have widely varying laws regarding second-party responsibility-and liability-for handling of data.

Ironically, the U.S. has come under scrutiny from other countries due to the post-9/11 ease with which the federal government can gain access to foreign data. Logically speaking, is the data stored on single or multiple servers? Does it share space with data from other sources? Is it housed at one site or multiple, geographically separate sites?

Who will have access to the data, and how are they vetted and monitored? How does one control and gain access to your own Cloud data? How are vendor employees, contractors, and third parties restricted and monitored with regards to access to your data? What security policies are in place?

How will the data be secured on the server, and how is it backed up and/or replicated? Is the data encrypted on the server and/or in transit? How will encryption (or lack thereof) affect performance? How often is the data replicated, and to where? How long are backups maintained? What is the procedure and timeframe for gaining access to backups?

Is the vendor, and the storage site(s), controlling the data in compliance with applicable laws, regulations, governance, and best practices? Have they been cited or had unacceptable incidences in the past? What are the Terms of Service, contractually? What is the fine print, and what information is missing entirely regarding vendor responsibility and liability for data stewardship, loss, and compromise?

The answers to these questions, along with others particular to an individual situation, will define the level of trust required in a relationship with a potential vendor.

Evaluating Risk in Establishing Cost vs. Benefit

Once potential vendors' offerings are understood, there are a few industry-standard security topics to consider in establishing the level of risk involved in outsourcing data and capabilities. Once the risk is quantified, the cost of moving to the cloud can be considered not only in terms of monthly savings, but also in terms of expected fiscal expense over time due to loss or compromise of data or capabilities. These macro-security topics are:

Confidentiality: What is the potential for disclosure of data with each vendor, and what degree of damage would be experienced to revenue, ongoing or future business efforts, company image, operations, or security if data were disclosed inappropriately?

Integrity: What is the potential for data corruption or loss with each vendor, and the degree of damage (per above) if data were corrupted or lost?

Availability: What is the speed of data access and degree of system reliability for each vendor? What is their system availability rate; and how will change management procedures, system upgrades, and potential disasters affect accessibility to data or capabilities?

Accountability: What is the detection and forensic capability for each vendor if data is lost or stolen? Can unauthorized access, inappropriate disclosure, or loss be tracked so that potential damage can be prevented or mitigated?

Choosing a Solution

In making a decision whether to utilize Cloud Computing, and to what degree, the primary focus should be the criticality of the Cloud Computing data and capabilities in question. Considering all cost and risk factors, internal secured data systems may offer higher value for critical data than entrusting an outside party with its control.

While service providers and various consortiums are beginning to address some of the security concerns inherent in Cloud Computing, uniform legal and industry standards are still many years off. Furthermore, security comes with a price: Higher degrees of security and performance than what is currently the norm will necessarily reduce the margin of savings and the overall value to business.

Related Articles - Call, Calls, Handling, Call Handling,

Email this Article to a Friend!

Receive Articles like this one direct to your email box!
Subscribe for free today!

 Rate This Article  
Completely useless, should be removed from directory.
Minimal useful information.
Decent and informative.
Great article, very informative and helpful.
A 'Must Read'.

 

Do you Agree or Disagree? Have a Comment? POST IT!

 Reader Opinions 
Submit your comments and they will be posted here.
Make this comment or to the Author only:
Name:
Email:
*Your email will NOT be posted. This is for administrative purposes only.
Comments: *Your Comments WILL be posted to the AUTHOR ONLY if you select PRIVATE and to this PUBLIC PAGE if you select PUBLIC, so write accordingly.
 
Please enter the code in the image:



 Author Login 
LOGIN
Register for Author Account

 

Advertiser Login

 

ADVERTISE HERE NOW!
   Limited Time $60 Offer!
   90  Days-1.5 Million Views  

 

Great Paranormal Romance


TIM FAY

After 60-plus years of living, I am just trying to pass down some of the information that I have lea...more
LAURA JEEVES

At LeadGenerators, we specialise in content-led Online Marketing Strategies for our clients in the t...more
ALEX BELSEY

I am the editor of QUAY Magazine, a B2B publication based in the South West of the UK. I am also the...more
GENE MYERS

Author of four books and two screenplays; frequent magazine contributor. I have four other books "in...more
SUSAN FRIESEN

Located in the lower mainland of B.C., Susan Friesen is a visionary brand strategist, entrepreneur, ...more
STEVERT MCKENZIE

Stevert Mckenzie, Travel Enthusiast. ...more
STEPHEN BYE

Steve Bye is currently a fiction writer, who published his first novel, ‘Looking Forward Through the...more
SHALINI MITTAL

A postgraduate in Fashion Technology. Shalini is a writer at heart! Writing for her is an expression...more
ADRIAN JOELE

I have been involved in nutrition and weight management for over 12 years and I like to share my kn...more
JAMES KENNY

James is a Research Enthusiast that focuses on the understanding of how things work and can be impro...more

HomeLinksAbout UsContact UsTerms of UsePrivacy PolicyFAQResources
Copyright © 2024, All rights reserved.
Some pages may contain portions of text relating to certain topics obtained from wikipedia.org under the GNU FDL license