TAILIEUCHUNG - AN OVERVIEW OF THE SECURITY CONCERNS IN ENTERPRISE CLOUD COMPUTING

The Application Rules page lets you define which applications on the user computer should have access to the network and which should not. You can see the list of the most common network-enabled applications organized in groups by the type of their activity. While applying configuration, Outpost Network Security Client identifies the applications installed on the client computer with those specified in the configuration using the specified matching criteria and, if the match is found, creates the corresponding rules for the application. . | International Journal of Network Security Its Applications IJNSA January 2011 An overview of the Security Concerns in Enterprise Cloud Computing Anthony Bisong1 and Syed Shawon M. Rahman2 . Student Capella University 225 South 6th Street 9th Floor Minneapolis mN 55402 USA Email abisong@ 2Assistant Professor of Computer Science University of Hawaii-Hilo Hilo HI USA and Adjunct Faculty Capella University Minneapolis MN 55402 USA Email SRahman@ Abstract Deploying cloud computing in an enterprise infrastructure bring significant security concerns. Successful implementation of cloud computing in an enterprise requires proper planning and understanding of emerging risks threats vulnerabilities and possible countermeasures. We believe enterprise should analyze the company organization security risks threats and available countermeasures before adopting this technology. In this paper we have discussed security risks and concerns in cloud computing and enlightened steps that an enterprise can take to reduce security risks and protect their resources. We have also explained cloud computing strengths benefits weaknesses and applicable areas in information risk management. Introduction This paper discusses the cloud computing security concerns and the security risk associated with enterprise cloud computing including its threats risk and vulnerability. Throughout the years organizations have experienced and will continue to experience in this cloud computing era numerous system losses which will have a direct impact on their most valuable asset information Otero Otero Qureshi 2010 and its protection is utmost important to all organizations. There have been publicized attacks on cloud computing providers and this paper discusses recommended steps to handle cloud security issues to clarify before adopting cloud computing the need for a governance strategy and good governance technology cloud computing strengths weaknesses analyzes the .

TÀI LIỆU MỚI ĐĂNG
41    188    5    24-12-2024
11    163    2    24-12-2024
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.