Multiple Chapters on "Insider Threat in the Cloud Computing"

Multiple Chapters 4 pages (1097 words) Sources: 4

[EXCERPT] . . . .

Prep: The Insider Threat in Cloud Computing

Cloud computing is still an emerging concept and reality for many businesses, though with the powerful, efficient, and highly cost-effective nature of many cloud computing services it will be an all-but-ubiquitous part of the business model for any medium or larger enterprise within the next decade (Joshi & Ahn, 2010; Subashini & Kavitha, 2011). As powerful and compelling as these tools and the opportunities they provide may be, there is a host of new concerns that is attached to this new technological capability. One of these problems is the insider security threat, which though a known and well-understood threat in traditional settings takes on new and dangerous dimensions in cloud computing (Jansen, 2011; Subashini & Kavitha, 2011). With off-site non-employees now responsible for maintaining the security of information stored in and/or transmitted through cloud computing services, new threats to business security are accompanying this new business opportunity.

This research will examine manners in which the risks associated with cloud computing can be appropriately assessed and used to inform business decisions. Weighting information risks has always been a complex and somewhat nebulous task, and the new details and intricacies of cloud computing render this task all the more difficult, however such assessment is necessary as business move forward and cloud computing becomes the normative mode of information technology procurement and utilization (Chow et al., 2009). The lack of clear risk assessment techniques and means of addressing these risks is the problem that will be addressed by this research.


Continue scrolling to

download full paper
>

Purpose Statement

The purpose of this research is two-fold, though the two different purpose are very closely related and mutually dependent in terms of achieving meaningful and relevant results from either research area. First, the research will attempt to establish a reliable framework and system of variables for quantitatively assessing the risk of insider threats when it comes to cloud computing and its use to procure and utilize various it services in standard business settings. Second, the research will attempt to identify means by which the specific concrete risks found to exist in cloud computing utilization can be countered or corrected through business entity controls. Establishing a clear framework for identifying and measuring risks is necessary in order to develop effective and proportional controls and counters to these risks, and this notion of control is what makes the framework itself practically useful.

Establishing a framework for assessing the risk of insider threats to cloud computing, while making up only part of the research purpose, will form a significant part of the research. This is a highly complex task, and will require a multitude of different service models and operations to be taken into account, along with a variety of different business needs (Chow et al., 2009; Jansen, 2011). The complexity of tackling this specific purpose in the proposed research is more than warranted by the importance of such a framework to the business community and to further studies of cloud computing risk, however, and is the primary reason that this research is being undertaken as specifically proposed.

The second purpose, though admittedly not the primary motive behind the undertaking of the research, is an equally vital piece of the completed research for the added concrete and practical usefulness that it provides, and… READ MORE

Quoted Instructions for "Insider Threat in the Cloud Computing" Assignment:

The Insider Threat in the Cloud computing

In developing the topic paper, review and, as necessary, update your problem statement, purpose statement, and research questions to reflect your current perspectives and understanding of the problem, purpose, and research questions. The topic paper should reflect a clear and logical linkage among the problem, purpose, and research questions.

1. Problem Statement (1 pages)

Your statement of the problem informs the reader of the particular problem you are examining in your dissertation. It needs to be limited and should influence business practice or theory in some capacity.

When written appropriately, your problem statement should explain and justify your envisioned research

2.Purpose Statement (2 pages)

The purpose statement will align with the problem statement reviewed. Conclude your paper by explaining and justifying your purpose statement.

3. Development of Research Questions (1 page)

Research questions generally follow the purpose statement within a study and tend to consist of multiple questions. In quantitative research, the research questions relate to characteristics of individuals or the characteristics of various organizations. Qualitative research, on the other hand, relates to the central concept of the study. Develop Research Questions

Develop and propose a set of research questions. For each research question, briefly explain why it was chosen and how the answer to this question will contribute to the literature in the field. Also comment on the expected outcome for each question you are proposing.

How to Reference "Insider Threat in the Cloud Computing" Multiple Chapters in a Bibliography

Insider Threat in the Cloud Computing.” A1-TermPaper.com, 2012, https://www.a1-termpaper.com/topics/essay/prep-insider-threat/987327. Accessed 6 Jul 2024.

Insider Threat in the Cloud Computing (2012). Retrieved from https://www.a1-termpaper.com/topics/essay/prep-insider-threat/987327
A1-TermPaper.com. (2012). Insider Threat in the Cloud Computing. [online] Available at: https://www.a1-termpaper.com/topics/essay/prep-insider-threat/987327 [Accessed 6 Jul, 2024].
”Insider Threat in the Cloud Computing” 2012. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/prep-insider-threat/987327.
”Insider Threat in the Cloud Computing” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/prep-insider-threat/987327.
[1] ”Insider Threat in the Cloud Computing”, A1-TermPaper.com, 2012. [Online]. Available: https://www.a1-termpaper.com/topics/essay/prep-insider-threat/987327. [Accessed: 6-Jul-2024].
1. Insider Threat in the Cloud Computing [Internet]. A1-TermPaper.com. 2012 [cited 6 July 2024]. Available from: https://www.a1-termpaper.com/topics/essay/prep-insider-threat/987327
1. Insider Threat in the Cloud Computing. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/prep-insider-threat/987327. Published 2012. Accessed July 6, 2024.

Related Multiple Chapterss:

Cloud Computing and the Insider Threats' Problems Literature Review

Paper Icon

Cloud Computing and the Insider Threats' Problems

The adoption of cloud computing by several organizations in the recent past has led to a significant paradigm shift as far as information… read more

Literature Review 5 pages (1595 words) Sources: 5 Topic: Management / Organizations


Cloud Computing Several Organizations Research Paper

Paper Icon

Additionally, rampant misuse of cloud resources occurs due to technological vulnerability which spammers exploit by disclosing sensitive information greatly undermining data integrity. However, it is hypothesized that most users are… read more

Research Paper 8 pages (2396 words) Sources: 8 Style: APA Topic: Computers / IT / Internet


Cloud Lit Rev Insider Threats Literature Review

Paper Icon

Cloud Lit Rev

Insider Threats in Cloud Computing

The diversity of threats that loud networks face and the complexities involved in effectively countering these threats in a manner that allows… read more

Literature Review 5 pages (1418 words) Sources: 5 Topic: Computers / IT / Internet


Cloud Computing and Data Security Term Paper

Paper Icon

Cloud Computing and Data Security

Cloud computing service providers have made their systems so inexpensive to use and easy to access, that there is little reason that companies should not… read more

Term Paper 18 pages (5196 words) Sources: 15 Topic: Computers / IT / Internet


Cloud Computing and Insider Threats Interpretive Framework Discussion Chapter

Paper Icon

Cloud Computing and Insider Threats

Interpretive Framework for Research Exploring Cloud Computing and Insider Threats

"What people know and believe to be true about the world is constructed -- or… read more

Discussion Chapter 2 pages (797 words) Sources: 2 Style: APA Topic: Computers / IT / Internet


Sat, Jul 6, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!