Provide a summary analysis of the most recent research

Assignment Help Management Information Sys
Reference no: EM131832248 , Length: 3

Mitigating Cloud Computing Risks

Imagine you are an Information Security Manager in a medium-sized organization. Your CIO has asked you to prepare a case analysis report and presentation on establishing internal controls in cloud computing.

The CIO has seen several resources online which discuss the security risks related to Cloud based computing and storage.

 You are being asked to summarize the information you can find on the Internet and other sources that are available.

Moving forward, the CIO wants to have a firm grasp of the benefits and risks associated with public, private, and hybrid cloud usage. There is also concern over how these systems, if they were in place, should be monitored to ensure not only proper usage, but also that none of these systems or their data have been compromised.

Write a three to four (3-4) page paper in which you:

Provide a summary analysis of the most recent research that is available in this area.

Examine the risks and vulnerabilities associated with public clouds, private clouds, and hybrids. Include primary examples applicable from the case studies you previously reviewed.

Suggest key controls that organizations could implement to mitigate these risks and vulnerabilities.

Develop a list of IT audit tasks that address a cloud computing environment based on the results from the analysis of the case studies, the risks and vulnerabilities, and the mitigation controls.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Describe the process of performing effective information technology audits and general controls.

Describe the various general controls and audit approaches for software and architecture to include operating systems, telecommunication networks, cloud computing, service-oriented architecture and virtualization.

Use technology and information resources to research issues in information technology audit and control.

Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.

Reference no: EM131832248

Questions Cloud

Surface methodology : Can you think of a problem preferably in your own field, for which response surface methodology might be profitably used?
Discuss shifts that have occurred in managerial theories : Discuss two or three of the major shifts that have occurred in managerial theories and concepts pertaining to the evolution of human resources.
Find experimental conditions : When the object is to find experimental conditions produces a high level of response what techniques may be useful when the model that locally approximates
What checks might be employed to detect : What checks might be employed to detect (a) bad values, (b) an inadequate model, and (c) the failure of assumptions?
Provide a summary analysis of the most recent research : Develop a list of IT audit tasks that address a cloud computing environment based on the results from the analysis of the case studies.
Calculate the wait times for each patient : The latest quality report showed that the average (median) time from emergency department (ED) arrival to transfer to the inpatient unit at your facility.
Study on a chemical reaction system : The following data were obtained from a study- on a chemical reaction system:
Evaluate the deployment cost savings realized by cisco : Evaluate the deployment cost savings realized by Cisco, and determine if it was significant.Discuss how Cisco was able to achieve VPN scalability.
Particular sample of water : Her data consist of one BOD reading_ for each of several times t. She wants to estimate the parameters in the· equation.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Differentiate between security policies and standards

ITM 517- Module Discussion: Describe and differentiate between security policies, standards, and guidelines. Which of these three is more important to you and why?

  How you will obtain resources and cooperation

Imagine that you must collect and assess the quality and appropriateness of data held by a large, multi-national organization. What steps you would take?

  Explain the key principles of data security

Prepare database design documents using the data definition, data manipulation, and data control language components of the SQL language.Describe the basic mechanisms for accessing relational databases from various types of application development ..

  Show the benefits of supply chain management

Show the benefits of supply chain management. How does the implementation of supply chain management result in enhanced customer value?

  How crowdsourcing may affect the budget and timeline

Describe how crowdsourcing may affect the budget and timeline of a design project. Assess crowdsourcing in regard to the legal, societal, and ethical issues it raises, and suggest methods to alleviate these concerns.

  Describe line process vs. batch process

Line Process vs. Batch Process - Effect on Functions - What concerns might the following functions have about this proposed change?

  What are the risks involved

Which emerging IT trend is currently impacting your business or could impact your business in the future? Should your organization respond by being an early adopter or wait to see what transpires?

  Choose an organization delivering goods andor services

choose an organization delivering goods andor services globally.provide a background of the organization and fully

  Legal and technical challenges and issues

From the e-Activity, determine some of the legal and technical challenges and issues with the implementation of CIPA

  Can employees be considered to be of the utmost strategy

In terms of the criteria listed in Figure 5.6, can employees be considered to be of the utmost strategic importance?

  Description of computer crimeswrite an executive summary to

description of computer crimeswrite an executive summary to the board of directors that summarizes the following issues

  Discuss the optimizing database design

Many legacy systems require normalization. Identify at least two factors that should be considered in order to produce an optimal normalized set of tables.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd