It Risk Assessment on Cloud Security: [Essay Example], 780 words GradesFixer

Haven't found the right essay?

Get an expert to write your essay!


Professional writers and researchers


Sources and citation are provided


3 hour delivery

This essay has been submitted by a student. This is not an example of the work written by professional essay writers.

IT Risk Assessment on Cloud Security

Download Print

Pssst… we can write an original essay just for you.

Any subject. Any type of essay.

We’ll even meet a 3-hour deadline.

Get your price

121 writers online

Download PDF


Computing resources can be offered through the storage cloud. Cloud computing as a technology advancenment provides service for storage of data and users may acquire these data through the use of the internet. Resources which can be stored in the cloud includes programs and applications, data and information. Examples include email management and software storage. The target groups upon the implementation of the cloud computing includes the following; private users, public users, members of the community and the hybrid group. The private group will have their services accessed from different location. Unlike the public where bidding process is involved so that anyone will be able to give out the best proposal is given the offer.

The main functional parts in the cloud include the following three models:Platform as a service- the software programs are installed in this cloud modelSoftware as a service- this is where software programs are downloaded and uploadedInfrastructure as a service- ensures that all network devices are connected through the right protocol.Literature review The organization should also make use of control measures concerning cloud security issues and may stay away from them. Likewise, if there should arise an occurrence of an event, the company will be prepared to control the harm and recover from the fiasco in negligible reaction time (Mather, Kumaraswamy & Latif 2009).

Recurrence of a problem is one of the security estimates that will be utilized to shield the cloud applications from a range of related risks. The hackers won’t have the capacity to stick to the system if the recurrence is adjusted at normal cycles. The cloud APIs can prevent security issues by just giving out an alert to the users and admins to alert them on the problem issue. The admins will immediately block the intruder from further appearances. This a security concern to all the users of the cloud storage model. The popup message can be link to the email to ensure that a quick alert is passed to all the admins (Robinson, Vogt & Wagealla, 2006).

The utilization of encryption of the considerable number of informational indexes will be influenced obligatory with the goal that the attackers will bomb in the abuse of the data sets. The verification plans utilized in the cloud storage will likewise be improved to stay away from information ruptures. Since cloud platforms are prone to various types of attacks such as the brute force attacks, a confirmation, and multi-overlay verification plans are used to keep away from those threats from infringing of access control (Robinson, Vogt & Wagealla, 2006). Organizations must not limit to the well-established cloud access control measures. The more up to date types of access control tools in the cloud will be utilized and incorporated in the application (Robinson, Vogt & Wagealla, 2006).

Innovation is quickly progressing and the use of innovation in the field of security controls has been noteworthy. The ascent of cyberattacks and other electronic attacks has prompted the rise and improvement of specialized devices and controls for security. Malware attacks on the cloud applications will be controlled and identified with the mix of the application with the most recent attacker of malware devices (Takabi, 2010). Denial of service devices and dispersed software of managing and controlling attacks will be identified and counteracted with the denial of service devices. The point of the association will not be limited towards the counteractive action and recognition of the attacks. Be that as it may, the event of such issues will be maintained a strategic distance from and the success must be done towards that path also.

One of such estimates that will be utilized will benefit reviewing of the service. The procedure will rattle off every one of the administrations being done on the cloud server. Every one of the points of interest related with the system ports and hubs and the cloud conventions will be presented by this procedure. An ongoing introduction and investigation of the application administrations will be made accessible. Another procedure that will be utilized in a similar way will be document reviewing (Krutz & Vines, 2010).

Disaster recovery and risk control are also the instruments that will prompt the measure of the data and informational collections. There must be a catastrophic recovery plan created for the task with the goal that all types of security issues might be taken care of and handled. There are computerized reinforcement and recovery instruments and plans that must be incorporated in the cloud service providers. These instruments will keep a duplicate of the informational indexes at a substitute area. The application will be taken back to the recovery state on account of the service provider.

Remember: This is just a sample from a fellow student.

Your time is important. Let us write you an essay from scratch

100% plagiarism free

Sources and citations are provided

Find Free Essays

We provide you with original essay samples, perfect formatting and styling

Cite this Essay

To export a reference to this article please select a referencing style below:

It Risk Assessment on Cloud Security. (2020, January 03). GradesFixer. Retrieved January 14, 2021, from
“It Risk Assessment on Cloud Security.” GradesFixer, 03 Jan. 2020,
It Risk Assessment on Cloud Security. [online]. Available at: <> [Accessed 14 Jan. 2021].
It Risk Assessment on Cloud Security [Internet]. GradesFixer. 2020 Jan 03 [cited 2021 Jan 14]. Available from:
copy to clipboard

Sorry, copying is not allowed on our website. If you’d like this or any other sample, we’ll happily email it to you.

    By clicking “Send”, you agree to our Terms of service and Privacy statement. We will occasionally send you account related emails.


    Attention! this essay is not unique. You can get 100% plagiarism FREE essay in 30sec

    Recieve 100% plagiarism-Free paper just for 4.99$ on email
    get unique paper
    *Public papers are open and may contain not unique content
    download public sample

    Sorry, we cannot unicalize this essay. You can order Unique paper and our professionals Rewrite it for you



    Your essay sample has been sent.

    Want us to write one just for you? We can custom edit this essay into an original, 100% plagiarism free essay.

    thanks-icon Order now

    Hi there!

    Are you interested in getting a customized paper?

    Check it out!
    Having trouble finding the perfect essay? We’ve got you covered. Hire a writer uses cookies. By continuing we’ll assume you board with our cookie policy.