I would take this opportunity to thank my research supervisor, family and friends for their support and guidance without which this research would not have been possible.
DECLARATION
I, [type your full first names and surname here], declare that the contents of this dissertation/thesis represent my own unaided work, and that the dissertation/thesis has not previously been submitted for academic examination towards any qualification. Furthermore, it represents my own opinions and not necessarily those of the University.
Signed __________________ Date _________________
Abstract
Cloud computing, which mentions to an emerging computing model where appliances in large data hubs can be utilized to consign services in a scalable kind, has become well liked for companies in require of cheap, large scale computing. Recently, the United States government has started to utilize cloud computing architectures, stages, and submissions to consign services and rendezvous the desires of their constituents. Surrounding the use of cloud computing are numerous risks that can have foremost influences on the information and services sustained by this technology. This paper talks about the present use of cloud computing in government and the risks-tangible and intangible-associated with its use. Examining exact situations of government cloud computing, this paper discovers the grade of comprehending of the risks by the agencies and bureaus that apply this technology. This paper contends that a characterized risk management program concentrated on cloud computing is an absolutely crucial part of the government IT environment.
Table of Contents
1. INTRODUCTION3
THESIS STATEMENT4
2. THE ENVIRONMENT OF RISK AND RISK MANAGEMENT4
Security matters in service models8
DATA SECURITY11
NETWORK SECURITY12
DATA LOCALITY13
3. WHAT IS CLOUD COMPUTING13
4. GOVERNMENT USE OF CLOUD COMPUTING15
4.1. EARLY USE15
4.2. FORMAL, STRATEGIC DIRECTION16
4.3. CURRENT SUBMISSIONS FOR DATA SHARING18
4.4. APPLICATIONS AND DATA PROCESSING19
5. RISKS EXACT TO GOVERNMENT USE OF CLOUD COMPUTING22
5.1. TANGIBLE/KNOWN RISKS23
5.1.1. ACCESS24
5.1.2. AVAILABILITY26
5.1.3. INFRASTRUCTURE29
5.1.4. INTEGRITY31
5.2. INTANGIBLE/UNKNOWN RISKS33
5.3 CURRENT SECURITY SOLUTIONS37
6. CONCLUSIONS41
REFERENCES44
Cloud Computing
1. Introduction
Cloud computing, which permits for highly scalable computing applications, storage, and stages, is expanding in significance all through government information technology (IT) strategy. Cloud computing providers offer a kind of services to persons, companies, and government bureaus, with users employing cloud computing for saving and distributing information, database management and excavation, and establishing world broad web services, which can variety from processing huge datasets for perplexing technical difficulties to using clouds to manage and supply get access to health notes (Hand, 2007). Recently, President Barack Obama and Chief Technology Officer (CTO) Vivek Kundra have both conveyed the dream to discover the cloud as a key constituent in the government IT transformation, and thus bureau use of cloud computing capabilities has expanded ([Jackson, 2009] and [Miller, 2009b]).
Although numerous advantages are described in cloud computing use, a large deal of risk is affiliated with the implementation, management, and use of cloud computing technologies. In a government context, both substantial risks (such as the risk of unauthorized get access to, infrastructure malfunction, or unavailability) and intangible risks (such as self-assurance in the technologies capabilities, and public access) are presented along with the functionality and advantages supplied by cloud applications. The government's proficiency to manage these risks will be a ...