Submitted by: Submitted by clsneedster
Views: 268
Words: 1575
Pages: 7
Category: Science and Technology
Date Submitted: 03/30/2013 08:04 PM
Effective Risk Management of Cloud Computing
TABLE OF CONTENTS
Table of Content……………………………………….……………………..…2
Introduction………….…………………………………………………………..3
Cloud Computing…………………………………………………….………….3
Vulnerabilities: Cloud Computing…………………………………………........5
Policies and Procedures: Cloud Computing………………..……….….........…6
Conclusion…………………………………………………….….…….….…....8
References…………………..…………………………………….…….…...…10
I. Introduction
A. Objective
The purpose of this report is to discuss the vulnerabilities, policies, and procedures of cloud computing for effective risk management. It will also touch on how the private industry and government can find better ways to manage and improve cyber security and acknowledgement.
B. Organization and Subheading
Section II provides an overview of cloud computing, basically what cloud computing is. Section III covers vulnerabilities of effective risk management of cloud computing. Section IV provides details of the policies and procedures of effective risk management of cloud computing. Section V ends this report with the conclusion.
II. Cloud Computing
There seems to be some confusion to a majority of people about what is cloud computing. Cloud computing describes highly scalable computing resources provided as an external service via the internet on a pay-as-you-go basis (Armbrust, 2010). The cloud is simply a metaphor for the internet, based on the symbol used to represent the worldwide network in computer network diagrams. The unique appeal to customers about cloud computing is that, especially in economic times, that they are only charged fees for the services they use. Also another added benefit is the wide availability of resources at their fingertips which can be accessed from anywhere thru the internet. This new, web-based generation of computing utilities houses remote servers used for storage of data in several highly...