Case study on mitigating cloud computing risks

Assignment Help Management Information Sys
Reference no: EM13773494 , Length: 1200 words

Case Study On Mitigating Cloud Computing Risks

Imagine you are an Information Security Manager in a medium-sized organization. Your CIO has asked you to prepare a case analysis report and presentation on establishing internal controls in cloud computing. The CIO has seen several resources online which discuss the security risks related to Cloud based computing and storage. One that stood out was located at https://www.isaca.org/Journal/Past-Issues/2011/Volume-4/Pages/Cloud-Computing-Risk-Assessment-A-Case-Study.aspx. You are being asked to summarize the information you can find on the Internet and other sources that are available. Moving forward, the CIO wants to have a firm grasp of the benefits and risks associated with public, private, and hybrid cloud usage. There is also concern over how these systems, if they were in place, should be monitored to ensure not only proper usage, but also that none of these systems or their data have been compromised.

Write a three to four (3-4) page paper in which you:
1. Provide a summary analysis of the most recent research that is available in this area.
2. Examine the risks and vulnerabilities associated with public clouds, private clouds, and hybrids. Include primary examples applicable from the case studies you previously reviewed.
3. Suggest key controls that organizations could implement to mitigate these risks and vulnerabilities.
4. Develop a list of IT audit tasks that address a cloud computing environment based on the results from the analysis of the case studies, the risks and vulnerabilities, and the mitigation controls.
5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
• Describe the process of performing effective information technology audits and general controls.
• Describe the various general controls and audit approaches for software and architecture to include operating systems, telecommunication networks, cloud computing, service-oriented architecture and virtualization.
• Use technology and information resources to research issues in information technology audit and control.
• Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions

Reference no: EM13773494

Questions Cloud

Policy of stopping suspected drug users : Based on the problems of drug trafficking in Black communities by the Central Intelligence Agency and the policy of stopping suspected drug users purposefully in a school zone, what solutions would you suggest to effectively address drug abuse in ..
The ftc and the antitrust division-recent legal actions : The FTC and the antitrust division-recent legal actions Go to the FTC Web site, www.ftc.gov, to find press releases by selecting News. Briefly summarize two antitrust (not false advertising) actions taken by the FTC over the past 12 months. Next, go ..
How many moles of acetylene will be produced : If 4.20 mol of calcium carbide (CaC2) reacts with an excess of water, how many moles of acetylene (C2H2), a gas used in welding, will be produced?
Handle allowance for children and teens : 1) Which of the following is the smartest way to handle allowance for children and teens?
Case study on mitigating cloud computing risks : Imagine you are an Information Security Manager in a medium-sized organization. Your CIO has asked you to prepare a case analysis report and presentation on establishing internal controls in cloud computing. The CIO has seen several resources onli..
State the type i and type ii errors in complete sentences : The mean price of mid-sized cars in a region is $32,000. A test is conducted to see if the claim is true. State the Type I and Type II errors in complete sentences. Type I: _____________________________________________Type II: _______________________..
Is defontes bound to the terms and conditions agreement : Is DeFontes bound to the "Terms and Conditions Agreement?" Should the court grant Dell's request? Why or why not
Legitimate and necessary role of the federal government : It it the legitimate and necessary role of the federal government or the Federal Reserve System to provide "fiscal stimulus"? Under what Constitutional authority? If so, when should stimulus be provided, and how should we determine the size of the st..
What volume will the n2o2 occupy : Does the container containing 0.72 moles of helium follow EPA regulations - explain by determining the volume that 0.72 moles of helium gas would occupy if not pressurized.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Explain the impact of technology on a firm''s supply chain

Supply Chain Management: Identify appropriate technology tools for manufacturing, healthcare, and retail and Explain the impact of technology on a firm's supply chain.

  Discuss the cultural factors organizations

SCM Process: Discuss the cultural factors organizations must understand in order to do business on a global scale. Support your reasoning.

  Forward and reverse supply chain managementexplain in

forward and reverse supply chain managementexplain in detail how and why a company should manage both forward and

  A research paper about the field of project management and

a research paper about the field of project management and how it relates to purchasing and supply management.i need a

  Explain the need for supply chain management

Explain the need for supply chain management in your selected organization. Also, describe the elements of the supply chain

  Describe a test plan or script

Information technology : Describe a test plan or script that indentifies major software functionality and hardware to be tested along with the required outcomes.

  What do you meant by operations management

What do you meant by operations management? Why is it important? Is a good knowledge of operations management more important in service or manufacturing industries? Explain your answer.

  What professional development do your coders need

What professional development do your coders need or want in the areas of topics like HIM, electronic health records, general computer skills, or supervisory or interpersonal skills

  Describe virtual and augmented reality

Describe virtual and augmented reality. Suggest a way in which this technology could be used in the future; either to improve a current process / procedure or create a new process / procedure

  Show the html sample codebuilding a web page using

show the html sample codebuilding a web page using htmlpage-building software is a quick and easy way to design a web

  End-user development toolsthe pitfalls of the end-user

end-user development toolsthe pitfalls of the end-user development tools can sometimes outweigh its advantages. do you

  Ability to create new knowledge

How do you know that you have captured the right data - the nature of success is tied to the ability to create new knowledge, what skills are needed by the people in my organization to succeed?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd