Monday, July 29, 2019

Emerging Technology Case Studay Study Example | Topics and Well Written Essays - 750 words

Emerging Technology Studay - Case Study Example Today, the major challenge of security officers is what to do with hypothetical attacks? Basically, these security attacks differ from using modern and innovative ways and tools of using standard weapons to making use of extraordinary technologies such as lasers to launch attacks. In this scenario, it is the responsibility of security planners to derive organized and justifiable ways to make a decision which hypothetical or unusual threats to worry about and how to prioritize among them (Jackson & Frelinger, 2009). This paper discusses some of the major security risks associated with cloud computing. This paper will also suggest the ways to deal with these issues. Cloud Computing Risks and Solutions Without a doubt, cloud computing is not only changing but also modernizing the way information technology (IT) is used in organizations today. Additionally, the acceptance and implementation of cloud computing are absolutely accelerating and much of this is being directed by always increa sing requirements for organizations to be more flexible and reliable in addressing varying IT needs (Cervone, 2010; Alter, & Harris). Thus, the idea of our medical organization to move its IT support functions to cloud computing is feasible and effective but there are certain risks associated with this transfer. In this scenario, the major problem that our medical organization can face is that clouds are hosted and maintained globally, hence, the tools, applications and data need to comply with the laws and regulations of the host country. For instance, a number of Canadian states have acknowledged it against the law for applications in their state to be hosted in the USA for the reason that the data would then put through laws of the Patriot Act. In the same way, many tools and applications in the USA cannot be hosted out of the country due to limitations in the export of computer system technology (Cervone, 2010; Alter, & Harris). In addition, due to this, the concern in which cou ntry the cloud is located and maintained is significant to take into consideration in the perspective of concerns associated with conformity, auditability, and eDiscovery. In view of the fact that the cloud computing is a distinction in computer outsourcing, our medical organization will need to have a high degree of self-assurance in the security actions, measures and protocols of their cloud computing supplier. Additionally, our medical organization can face a wide variety of issues related to HIPPA, FERPA, PCI, GLBA however it depends on the nature of the applications and hosted location of the cloud. In this scenario, technologists have already identified and categorized a wide variety of data protection and privacy risks that organizations face while using cloud computing. For instance, in case of our medical organization it is possible that its data can be accessed by hackers, released accidentally, mixed with data from their cloud suppliers’ other customers. Moreover, our medical organization must make sure that its cloud supplier can deal with any requests for information associated with authoritarian or constitutional issues (Cervone, 2010; Alter, & Harris). In order to deal with cloud computing risks our medical organ

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.