Literature Review on "Cloud Lit Rev Insider Threats"

Literature Review 5 pages (1418 words) Sources: 5

[EXCERPT] . . . .

Cloud Lit Rev

Insider Threats in Cloud Computing

The diversity of threats that loud networks face and the complexities involved in effectively countering these threats in a manner that allows companies to truly take advantage of such technologies without enormous security and control expenditures have made these networks and their security issues the subject of abundant research and literature in recent years. Numerous perspectives have been brought to bear on these problems and the means by which they can be addressed, from directly practical examinations of a technical nature to larger-scale theoretical understandings of the practicalities of cloud computing in the real world to a consideration of certain ethical considerations that exist amongst all of these practicalities. While the issue of cost feasibility as a direct measurement of risks and solutions presented by insider threats inherent to cloud computing networks has not been specifically addressed in the research, current literature does provide a comprehensive foundation upon which to build such an investigation.

Addressing insider threats to cloud computing networks is itself problematic, as there are many modes of external attack or unauthorized access that could be utilized by insiders perhaps more easily than by wholly external forces (Qaisar & Khawaja, 2012). Whether or not these would truly be considered insider threats is a matter of semantics, but the fact is an insider would be in a better position to launch a number of attacks, including a "man in the middle" attack (intercepting communication between two parties that was meant to be private and encrypted) and "network sniffing
Continue scrolling to

download full paper
" (gaining unauthorized access to a network via password hacking or retrieval) (Qaisar & Khawaja, 2012). These risks are not even specific to a cloud network as they exist for traditional networks as well, though greater vulnerabilities exit in cloud networks due to the remote access that is an inherent part of even authorized use of such networks (Qaisar & Khawaja, 2012; Reddy & Reddy, 2011). This limits the degree to which current security measures can be implemented against potential attacks on a cloud network, both internally and externally, and can make it extraordinarily more difficult to track where attacks are or might be coming from (Reddy & Reddy, 2011). Every element of a cloud computing network that makes it more vulnerable to external attacks also makes it more vulnerable to internal attacks, and makes it easier for internal attackers to hide their tracks and to gain broader access (Reddy & Reddy, 2011).

The many problems that are specific to cloud computing and to insider threats only adds to the complexity and the difficulty of dealing with these security problems in a manner that is effective and efficient for medium- to large-scale enterprises. Perhaps most importantly, the very architecture of a cloud computing network removes the actual hardware and software control from the organization that needs to maintain network security as a direct means of protecting its interests; this "abstracted infrastructure" typically means that even the type of hardware and software being used to protect their data is unknown to the organizations and individuals that utilize cloud computing networks (Durkee, 2010). This level of ignorance can make it much more difficult to develop and implement effective security measures on the user end of the network, and also creates an inherent dependence on an outside organization to maintain strict security protocols in its own processes and with its own personnel -- insider threats are not faced solely within the business organization, but also within the cloud computing service provider's organization (Durkee, 2010; Reddy & Reddy, 2011). Combine this with the fact that all substantially sized cloud computing service providers have different contractual obligations and perhaps different methodologies for every client organization whose data and processes they handle, and the threat of accidental security breaches or lapses, accidental data loss or process interruption, and a host of other malicious and accidental security threats emerge as a problem in cloud computing and the nature of insider threats in such networks (Reddy & Reddy, 2011).

Of course, the business and technology communities have not simply thrown their hands up in despair over the new security threats that have arise in cloud computing, and specifically in regards to insider threats in cloud computing networks. There have been a… READ MORE

Quoted Instructions for "Cloud Lit Rev Insider Threats" Assignment:

Brief Literature Review

A review of the literature is a written review of what has been published on a selected topic by scholars. This informs readers of the ideas that have emerged and the strengths and weaknesses of a topic. The review should relate to the research questions, summarize the results, generate questions for future research, and identify controversial questions.

Compose a Brief Literature Review

Create a brief literature review on your topic. The purpose of this activity is to integrate and synthesize the major and foundational literature on your topic from scholarly, peer-reviewed journals. Writing a review of the literature requires more than just listing and summarizing studies that relate to the dissertation. Your literature review should describe the key theories and findings related to the study topic. Ideally, the majority of work cited should be published within the last 5 years (with the exception of foundational literature).

*****

*****

How to Reference "Cloud Lit Rev Insider Threats" Literature Review in a Bibliography

Cloud Lit Rev Insider Threats.” A1-TermPaper.com, 2012, https://www.a1-termpaper.com/topics/essay/cloud-lit-rev-insider-threats/4266138. Accessed 3 Jul 2024.

Cloud Lit Rev Insider Threats (2012). Retrieved from https://www.a1-termpaper.com/topics/essay/cloud-lit-rev-insider-threats/4266138
A1-TermPaper.com. (2012). Cloud Lit Rev Insider Threats. [online] Available at: https://www.a1-termpaper.com/topics/essay/cloud-lit-rev-insider-threats/4266138 [Accessed 3 Jul, 2024].
”Cloud Lit Rev Insider Threats” 2012. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/cloud-lit-rev-insider-threats/4266138.
”Cloud Lit Rev Insider Threats” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/cloud-lit-rev-insider-threats/4266138.
[1] ”Cloud Lit Rev Insider Threats”, A1-TermPaper.com, 2012. [Online]. Available: https://www.a1-termpaper.com/topics/essay/cloud-lit-rev-insider-threats/4266138. [Accessed: 3-Jul-2024].
1. Cloud Lit Rev Insider Threats [Internet]. A1-TermPaper.com. 2012 [cited 3 July 2024]. Available from: https://www.a1-termpaper.com/topics/essay/cloud-lit-rev-insider-threats/4266138
1. Cloud Lit Rev Insider Threats. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/cloud-lit-rev-insider-threats/4266138. Published 2012. Accessed July 3, 2024.

Related Literature Reviews:

Insider Threat in the Cloud Computing Multiple Chapters

Paper Icon

Prep: The Insider Threat in Cloud Computing

Cloud computing is still an emerging concept and reality for many businesses, though with the powerful, efficient, and highly cost-effective nature of many… read more

Multiple Chapters 4 pages (1097 words) Sources: 4 Topic: Computers / IT / Internet


Cloud Computing and the Insider Threats' Problems Literature Review

Paper Icon

Cloud Computing and the Insider Threats' Problems

The adoption of cloud computing by several organizations in the recent past has led to a significant paradigm shift as far as information… read more

Literature Review 5 pages (1595 words) Sources: 5 Topic: Management / Organizations


Cloud Computing and Insider Threats Interpretive Framework Discussion Chapter

Paper Icon

Cloud Computing and Insider Threats

Interpretive Framework for Research Exploring Cloud Computing and Insider Threats

"What people know and believe to be true about the world is constructed -- or… read more

Discussion Chapter 2 pages (797 words) Sources: 2 Style: APA Topic: Computers / IT / Internet


Cloud Computing Several Organizations Research Paper

Paper Icon

Additionally, rampant misuse of cloud resources occurs due to technological vulnerability which spammers exploit by disclosing sensitive information greatly undermining data integrity. However, it is hypothesized that most users are… read more

Research Paper 8 pages (2396 words) Sources: 8 Style: APA Topic: Computers / IT / Internet


Worldview, Which Was Defined by Guba (1990) Creative Writing

Paper Icon

worldview, which was defined by Guba (1990) as "a basic set of beliefs that guide action" (p.17) is very important in the context of research proposals (Creswell, 2008).In this paper,… read more

Creative Writing 2 pages (662 words) Sources: 4 Topic: Computers / IT / Internet


Wed, Jul 3, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!