Research risks associated with cloud adoption

Assignment Help Basic Computer Science
Reference no: EM132797552

As an IT analyst for BallotOnline, a company providing voting solutions to a global client base, you are working to convince the organization to move the current infrastructure to the cloud.

Your supervisor and the director of IT, Sophia, has asked you to summarize for the company executives the potential risks and compliance issues that BallotOnline will have to contend with in the transition to the cloud.

The final report will be seven to 10 pages that convey your understanding and management of risks associated with cloud computing, as well as ensuring compliance with legal requirements involved in moving BallotOnline systems to the cloud.

This project will take about four weeks. Check the Project 2 FAQ thread in the discussion area for any last-minute update or clarifications about the project.

Step 1: Research Risks Associated With Cloud Adoption

The first step in assessing risk in cloud computing will be to identify and describe risk concepts and cloud computing risk factors associated with cloud adoption. As a software as a service (SaaS) company considering an infrastructure as a service (IaaS) cloud service provider for your hosting needs, consider third party outsourcing issues and the generally accepted best practices for cloud adoption and review relevant cloud risk case studies. You should also consider best practices for cloud adoption.

As part of the risk management process, identify and describe other types of risk, such as risks associated with having a service-level agreement (SLA). An example of a potential risk could be if your company is obligated to protect personal information, and then the cloud provider that you use suffers a security breach exposing that personal information.

Here, identify and describe other types of risks or potential liability issues that apply to BallotOnline and discuss them with your colleagues in the Discussion: Risk forum.

Step 2: Identify the Most Appropriate Guidelines for Managing Risks

In order to identify guidelines applicable to your company's industry, you must have an understanding of the different types of risk management guidelines that exist and are frequently applicable in cloud environments.

There are several cybersecurity standards applicable to cloud computing environments such as the NIST Cybersecurity Framework, ISO standards, and US federal government standards (DoD/FIPS), as well as several major sets of risk guidelines for dealing with the risks involved. Also, there are organizations such as the Cloud Security Alliance (CSA) that recommend best practices for managing risks.

Review the different guidelines and determine which are most appropriate for BallotOnline. For example, NIST has responsibility for developing a number of elections industry guidelines within the United States.

Identify why those guidelines are most appropriate and compile these items into a brief (one page or less) recommendation and justification of your choice. Your recommendation will also be incorporated into your final report in the final step.

Step 3: Identify Potential Privacy Issues and Mitigation Measures

Now that you have identified the guidelines most applicable to your organization, it is time to discuss privacy protections that may apply.

BallotOnline is now a global organization and may need to contend with several sets of privacy laws since these laws vary from country to country.

Sophia has recommended that you focus on European Union (EU) privacy requirements for now, including the General Data Protection Regulation (GDPR), since those are considered to be the most challenging for compliance. Many companies opt to host data for their European customers entirely within facilities in the European Union, and the companies implement restrictions to prevent data for EU citizens from crossing borders into non-EU zones. This is the approach that you have been asked to take and where you should focus your efforts. Note that some cloud providers, such as Amazon, have received special approval from EU authorities to permit data transfer outside of the EU.

Research EU privacy requirements, identify the requirements that apply to your project and why they apply, and compile your recommendations for complying with these requirements. These will be incorporated into your final report.

Before moving on to the next step, discuss the material with your colleagues in the Discussion: Privacy Issues.

Reference no: EM132797552

Questions Cloud

Communication in group differs from individual communication : Analyze how communication in groups differs from individual communication. Are there unique challenges to communicating with groups?
Audience in business presentation : Describe how you would build rapport with your audience in a business presentation.
Significant principles of management communications : Comprehensive research review of the significant principles of management communications used to successfully achieve organizational objectives
Ethical hacking : Discussion topic on FOOTPRINTING, you now have an idea as to how to conduct a digital investigative project.
Research risks associated with cloud adoption : First step in assessing risk in cloud computing will be to identify and describe risk concepts and cloud computing risk factors associated with cloud adoption.
Technology-based security alerts : Noise is considered technology-based security alerts that distract from true security incidents.
Comparison of different frameworks : One of the readings this week provided an introduction and comparison of different frameworks.
Preparing for forensic investigation : What is the nature of the alleged crime, and how does the nature of the crime influence a prospective investigation?
Online and brick-and-mortar divisions of business : What factors affect competition between the online and brick-and-mortar divisions of the business?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Consider data mining from both global perspective

Consider data mining from both a global perspective in the management of big data and the impact of data mining on individual organizations.

  Develop comprehensive policy

You assume as role of project manager of project to develop comprehensive policy for managing pedestrian traffic flow in popular downtown metropolitan district.

  Complete physical security assessment

Complete a Physical Security Assessment (internal and external) of your place of work or living area.

  Treatment services to the countrys large aging population

To attract new patients, the Community health Hospital wants to diversify services by creating new oncology and chronic diseases wings that will offer.

  How to learn and implement web security in real life

How to learn and implement web security in real life?

  Recommend an ideal solution

Recommend an ideal solution/criterion that they should rather use for comparing algorithms.

  What is which an event viewer and performance monitor

What is which an event viewer and performance monitor? How can these tools improve the management of our network environment?

  Big data in radical platforms

Yyou are to search the Internet for other uses of Big Data in RADICAL platforms.

  What is an example of a er data model diagrams

What is an example of a ER data model diagrams that meet 3NF, must have at least 5 tables each, have accurate primary and foreign keys, accurate field types

  Wap that compares the running time with the routine

An alternative permutation algorithm is to fill the array a from a[0] to a[n-1], as follows. To fill a[i], generate random numbers until you get one.

  Sources of information security threats

Trojan horse attacks pose serious threats to computer security. There is specialized anti-Trojan software designed to detect Trojans

  Authentication system in demilitarized zone

What happens when we place the authentication system in our demilitarized zone (DMZ)-that is, in the layer closest to the Internet?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd