Multiple Chapters on "Insider Threat in the Cloud Computing"
Multiple Chapters 4 pages (1097 words) Sources: 4
[EXCERPT] . . . .
Prep: The Insider Threat in Cloud ComputingCloud computing is still an emerging concept and reality for many businesses, though with the powerful, efficient, and highly cost-effective nature of many cloud computing services it will be an all-but-ubiquitous part of the business model for any medium or larger enterprise within the next decade (Joshi & Ahn, 2010; Subashini & Kavitha, 2011). As powerful and compelling as these tools and the opportunities they provide may be, there is a host of new concerns that is attached to this new technological capability. One of these problems is the insider security threat, which though a known and well-understood threat in traditional settings takes on new and dangerous dimensions in cloud computing (Jansen, 2011; Subashini & Kavitha, 2011). With off-site non-employees now responsible for maintaining the security of information stored in and/or transmitted through cloud computing services, new threats to business security are accompanying this new business opportunity.
This research will examine manners in which the risks associated with cloud computing can be appropriately assessed and used to inform business decisions. Weighting information risks has always been a complex and somewhat nebulous task, and the new details and intricacies of cloud computing render this task all the more difficult, however such assessment is necessary as business move forward and cloud computing becomes the normative mode of information technology procurement and utilization (Chow et al., 2009). The lack of clear risk assessment techniques and means of addressing these risks is the problem that will be addressed by this research.
Continue scrolling to
download full paper ⤓
Purpose Statement
The purpose of this research is two-fold, though the two different purpose are very closely related and mutually dependent in terms of achieving meaningful and relevant results from either research area. First, the research will attempt to establish a reliable framework and system of variables for quantitatively assessing the risk of insider threats when it comes to cloud computing and its use to procure and utilize various it services in standard business settings. Second, the research will attempt to identify means by which the specific concrete risks found to exist in cloud computing utilization can be countered or corrected through business entity controls. Establishing a clear framework for identifying and measuring risks is necessary in order to develop effective and proportional controls and counters to these risks, and this notion of control is what makes the framework itself practically useful.
Establishing a framework for assessing the risk of insider threats to cloud computing, while making up only part of the research purpose, will form a significant part of the research. This is a highly complex task, and will require a multitude of different service models and operations to be taken into account, along with a variety of different business needs (Chow et al., 2009; Jansen, 2011). The complexity of tackling this specific purpose in the proposed research is more than warranted by the importance of such a framework to the business community and to further studies of cloud computing risk, however, and is the primary reason that this research is being undertaken as specifically proposed.
The second purpose, though admittedly not the primary motive behind the undertaking of the research, is an equally vital piece of the completed research for the added concrete and practical usefulness that it provides, and… READ MORE
Quoted Instructions for "Insider Threat in the Cloud Computing" Assignment:
The Insider Threat in the Cloud computing
In developing the topic paper, review and, as necessary, update your problem statement, purpose statement, and research questions to reflect your current perspectives and understanding of the problem, purpose, and research questions. The topic paper should reflect a clear and logical linkage among the problem, purpose, and research questions.
1. Problem Statement (1 pages)
Your statement of the problem informs the reader of the particular problem you are examining in your dissertation. It needs to be limited and should influence business practice or theory in some capacity.
When written appropriately, your problem statement should explain and justify your envisioned research
2.Purpose Statement (2 pages)
The purpose statement will align with the problem statement reviewed. Conclude your paper by explaining and justifying your purpose statement.
3. Development of Research Questions (1 page)
Research questions generally follow the purpose statement within a study and tend to consist of multiple questions. In quantitative research, the research questions relate to characteristics of individuals or the characteristics of various organizations. Qualitative research, on the other hand, relates to the central concept of the study. Develop Research Questions
Develop and propose a set of research questions. For each research question, briefly explain why it was chosen and how the answer to this question will contribute to the literature in the field. Also comment on the expected outcome for each question you are proposing.
How to Reference "Insider Threat in the Cloud Computing" Multiple Chapters in a Bibliography
“Insider Threat in the Cloud Computing.” A1-TermPaper.com, 2012, https://www.a1-termpaper.com/topics/essay/prep-insider-threat/987327. Accessed 6 Jul 2024.
Related Multiple Chapterss:
Cloud Computing and the Insider Threats' Problems Literature Review
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
Cloud Computing and the Insider Threats' Problems
The adoption of cloud computing by several organizations in the recent past has led to a significant paradigm shift as far as information… read more
Literature Review 5 pages (1595 words) Sources: 5 Topic: Management / Organizations
Cloud Computing Several Organizations Research Paper
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
Additionally, rampant misuse of cloud resources occurs due to technological vulnerability which spammers exploit by disclosing sensitive information greatly undermining data integrity. However, it is hypothesized that most users are… read more
Research Paper 8 pages (2396 words) Sources: 8 Style: APA Topic: Computers / IT / Internet
Cloud Lit Rev Insider Threats Literature Review
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
Cloud Lit Rev
Insider Threats in Cloud Computing
The diversity of threats that loud networks face and the complexities involved in effectively countering these threats in a manner that allows… read more
Literature Review 5 pages (1418 words) Sources: 5 Topic: Computers / IT / Internet
Cloud Computing and Data Security Term Paper
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
Cloud Computing and Data Security
Cloud computing service providers have made their systems so inexpensive to use and easy to access, that there is little reason that companies should not… read more
Term Paper 18 pages (5196 words) Sources: 15 Topic: Computers / IT / Internet
Cloud Computing and Insider Threats Interpretive Framework Discussion Chapter
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
Cloud Computing and Insider Threats
Interpretive Framework for Research Exploring Cloud Computing and Insider Threats
"What people know and believe to be true about the world is constructed -- or… read more
Discussion Chapter 2 pages (797 words) Sources: 2 Style: APA Topic: Computers / IT / Internet
Sat, Jul 6, 2024
If you don't see the paper you need, we will write it for you!
We can write a new, 100% unique paper!