cybersecurity research proposalCLOUD COMPUTING SECURITYTable of Contents1.0 Title. 31.1 Overview.. 31.2 Problem Statement31.3 Research questions. 42.0 What are we investigating?. 42.1 Importance of the problem.. 53.0 Methods of Data collection and analysis. 53.1 Time frame. 63.2 Expected outcomes. 6 1.0 TitleImpact of the cloud computing in organization’s computer security1.1 OverviewCurrently,
...[Show More]
cybersecurity research proposal
CLOUD COMPUTING SECURITY
Table of Contents
1.0 Title
Impact of the cloud computing in organization’s computer security
1.1 Overview
Currently, Cloud computing have become the growing technology which most of the organization have put a lot of interest and thus, they use their resources in investing in it. Cloud computing refers the technology that practices use of the network of the remote servers that are hosted on the internet so that data or information can be stored, managed, and processed rather than in the personal computer or local server (Krutz & Vines, 2010). In addition, the cyber security and network security has become a major issue that many organization are fearing so much because once a cyber-threat or attack happens, this cost the organization dearly. For example, when we consider traditional IT infrastructure, the data centers which consisted of various components of hardware such as the desktop computer being connected to the network through a remote server. Moreover, we can consider the issue of the physical security issues and other effects such as deletion of data, network traffic, and attack of the data centers by the malware, viruses, worms etc. In addition, because of all kinds of computer insecurity the aims of this research proposal is to assess whether cloud computing will help in improving the computer and network security of the organization.
1.2 Problem Statement
Recently, many organization, firms and business security measures have been weakened due to lack of the cloud security especially the organization that uses traditional IT infrastructure. Moreover, we want also to compare the organization that uses the cloud computing and the one that use local server to assess the level of which of computer security measure both has. In addition, the aim of carrying out this research is to assess the importance of cloud computing security in enhancing computer and network security within an organization.
1.3 Research questions
This research proposal will help in evaluating how the cloud computing helps in improving the computer and network security of an organization. Therefore, at the end of this research one will be in a position of answering the questions listed below:
a. Which is the best way ensuring optimum computer and network security between cloud computing and Tradition IT infrastructure?
b. Is the computer security guaranteed when using cloud computing instead of traditional IT infrastructure?
c. How does the cloud computing offer computer security and in which ways?
d. Impact of the cloud computing security to the entire organization?
References
Krutz, R. L., & Vines, R. D. (2010). Cloud security : a comprehensive guide to secure cloud computing. Indianapolis, Ind.: Wiley Pub.
Sabr, S. F. (2012). Cloud computing security. Saarbrücken LAP LAMBERT Academic Publishing.
Tajts, T. (2012). Cloud computing security . Lexington, KY : CreateSpace.
[Show Less]