Cyber Security Policies in the Private and Public Sector
Introduction1
Discussion2
Cloud Computing2
Cloud Computing Architecture3
Infrastructure-as-a-Service (IaaS)3
Platform-as-a-Service (PaaS)4
Software-as-a-service (SaaS)4
Cloud Computing and Cyber Security5
Cloud Computing Risks6
Cloud Computing Threats7
Cloud Computing Vulnerability7
Policies8
Cloud Computing Security Enablers8
Key Management9
Identity & Access Management9
Secure Software Development Lifecycle9
Security Management9
Multi-Clouds Federation Security10
Conclusion10
References11
Cyber Security Policies in the Private and Public Sector
Introduction
The vulnerabilities of the cyber security challenge the individuals, businesses and governments globally. By the individuals and countries, these cyber attacks have been started. The victims and targets of the cyber attacks incorporate the companies, military defenses, political organizations, and the government networks. All these were targeted in order to conduct the industrial or diplomatic intelligence, military intelligence, or the activities of politics. Additionally, the national limits of data mean nothing to the cyber attackers. The attributes of cyber attackers to particular locations can be intricate that also creates problematic response (Tehan, 2013).
As far as the usage and implementation, still the domain of cloud computing is in its early years. Moderately, this is because of the high promotion of the cloud computing through the advancement of technology and is so dependent on the resources that the researches have not had several chances to experiment and asses it. In the present world, the fundamental comprehending of cloud computing is meant to a number of concepts.
These concepts include the software as a service, utility computing, grid computing, and virtualization. These concepts are linked to a client, which uses a remote service of the providers, which is also identified in the cloud. If the debate should be initialized on the concepts that they should be dealt individually and separated in terms of definition, then the general consensus is that all these concepts should be summed up in the umbrella term of cloud computing.
Other than the recent updates and developments of the cloud computing, a number of discussions on the security and protection of the cloud services are discussed. The cyber security of cloud computing is becoming very intricate and requires effective approaches to control it. This paper discusses about the security risk and concerns of the cloud computing that incorporates its architecture, threats and vulnerabilities (Morsy, Grundy, & Muller, 2010).
Discussion
Cloud Computing
The cloud computing is the means of constructing the services of IT that utilizes the enhanced storage abilities and the improved power of computation. From the viewpoint of service provider, the main emphasis of cloud computing as an unconnected hardware is to support the downtime to any available network device. This is done without any change in the perspective of the user data.
In addition, the data of the user can be easily moved and shifted from one cloud to another without any data loss. It is been proposed that a mechanism of layering should happen among the back-end storage and servers, middle-ware networking, and the front-end software. Through this, each and every component of the cloud computing can be evaluated, implemented, ran, and designed accordingly and independently from the following layers (Bisong, & Rahman, 2011).
The concept and services of cloud computing are growing rapidly and there are ...