Literature Review on "Cloud Lit Rev Insider Threats"
Literature Review 5 pages (1418 words) Sources: 5
[EXCERPT] . . . .
Cloud Lit RevInsider Threats in Cloud Computing
The diversity of threats that loud networks face and the complexities involved in effectively countering these threats in a manner that allows companies to truly take advantage of such technologies without enormous security and control expenditures have made these networks and their security issues the subject of abundant research and literature in recent years. Numerous perspectives have been brought to bear on these problems and the means by which they can be addressed, from directly practical examinations of a technical nature to larger-scale theoretical understandings of the practicalities of cloud computing in the real world to a consideration of certain ethical considerations that exist amongst all of these practicalities. While the issue of cost feasibility as a direct measurement of risks and solutions presented by insider threats inherent to cloud computing networks has not been specifically addressed in the research, current literature does provide a comprehensive foundation upon which to build such an investigation.
Addressing insider threats to cloud computing networks is itself problematic, as there are many modes of external attack or unauthorized access that could be utilized by insiders perhaps more easily than by wholly external forces (Qaisar & Khawaja, 2012). Whether or not these would truly be considered insider threats is a matter of semantics, but the fact is an insider would be in a better position to launch a number of attacks, including a "man in the middle" attack (intercepting communication between two parties that was meant to be private and encrypted) and "network sniffing
download full paper ⤓
The many problems that are specific to cloud computing and to insider threats only adds to the complexity and the difficulty of dealing with these security problems in a manner that is effective and efficient for medium- to large-scale enterprises. Perhaps most importantly, the very architecture of a cloud computing network removes the actual hardware and software control from the organization that needs to maintain network security as a direct means of protecting its interests; this "abstracted infrastructure" typically means that even the type of hardware and software being used to protect their data is unknown to the organizations and individuals that utilize cloud computing networks (Durkee, 2010). This level of ignorance can make it much more difficult to develop and implement effective security measures on the user end of the network, and also creates an inherent dependence on an outside organization to maintain strict security protocols in its own processes and with its own personnel -- insider threats are not faced solely within the business organization, but also within the cloud computing service provider's organization (Durkee, 2010; Reddy & Reddy, 2011). Combine this with the fact that all substantially sized cloud computing service providers have different contractual obligations and perhaps different methodologies for every client organization whose data and processes they handle, and the threat of accidental security breaches or lapses, accidental data loss or process interruption, and a host of other malicious and accidental security threats emerge as a problem in cloud computing and the nature of insider threats in such networks (Reddy & Reddy, 2011).
Of course, the business and technology communities have not simply thrown their hands up in despair over the new security threats that have arise in cloud computing, and specifically in regards to insider threats in cloud computing networks. There have been a… READ MORE
Quoted Instructions for "Cloud Lit Rev Insider Threats" Assignment:
Brief Literature Review
A review of the literature is a written review of what has been published on a selected topic by scholars. This informs readers of the ideas that have emerged and the strengths and weaknesses of a topic. The review should relate to the research questions, summarize the results, generate questions for future research, and identify controversial questions.
Compose a Brief Literature Review
Create a brief literature review on your topic. The purpose of this activity is to integrate and synthesize the major and foundational literature on your topic from scholarly, peer-reviewed journals. Writing a review of the literature requires more than just listing and summarizing studies that relate to the dissertation. Your literature review should describe the key theories and findings related to the study topic. Ideally, the majority of work cited should be published within the last 5 years (with the exception of foundational literature).
*****
*****
How to Reference "Cloud Lit Rev Insider Threats" Literature Review in a Bibliography
“Cloud Lit Rev Insider Threats.” A1-TermPaper.com, 2012, https://www.a1-termpaper.com/topics/essay/cloud-lit-rev-insider-threats/4266138. Accessed 3 Jul 2024.
Related Literature Reviews:
Insider Threat in the Cloud Computing Multiple Chapters
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
Prep: The Insider Threat in Cloud Computing
Cloud computing is still an emerging concept and reality for many businesses, though with the powerful, efficient, and highly cost-effective nature of many… read more
Multiple Chapters 4 pages (1097 words) Sources: 4 Topic: Computers / IT / Internet
Cloud Computing and the Insider Threats' Problems Literature Review
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
Cloud Computing and the Insider Threats' Problems
The adoption of cloud computing by several organizations in the recent past has led to a significant paradigm shift as far as information… read more
Literature Review 5 pages (1595 words) Sources: 5 Topic: Management / Organizations
Cloud Computing and Insider Threats Interpretive Framework Discussion Chapter
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
Cloud Computing and Insider Threats
Interpretive Framework for Research Exploring Cloud Computing and Insider Threats
"What people know and believe to be true about the world is constructed -- or… read more
Discussion Chapter 2 pages (797 words) Sources: 2 Style: APA Topic: Computers / IT / Internet
Cloud Computing Several Organizations Research Paper
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
Additionally, rampant misuse of cloud resources occurs due to technological vulnerability which spammers exploit by disclosing sensitive information greatly undermining data integrity. However, it is hypothesized that most users are… read more
Research Paper 8 pages (2396 words) Sources: 8 Style: APA Topic: Computers / IT / Internet
Worldview, Which Was Defined by Guba (1990) Creative Writing
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
worldview, which was defined by Guba (1990) as "a basic set of beliefs that guide action" (p.17) is very important in the context of research proposals (Creswell, 2008).In this paper,… read more
Creative Writing 2 pages (662 words) Sources: 4 Topic: Computers / IT / Internet
Wed, Jul 3, 2024
If you don't see the paper you need, we will write it for you!
We can write a new, 100% unique paper!