Friday, June 21, 2019

Emerging Technology Case Studay Study Example | Topics and Well Written Essays - 750 words

Emerging Technology Studay - Case Study ExampleToday, the major gainsay of security officers is what to do with hypothetical attacks? Basically, these security attacks differ from using modern and innovative ways and tools of using standard weapons to making use of extraordinary technologies such as lasers to launch attacks. In this scenario, it is the responsibility of security planners to derive organized and justifiable ways to make a decision which hypothetical or preposterous threats to worry about and how to prioritize among them (Jackson & Frelinger, 2009). This paper discusses some of the major security risks associated with cloud computing. This paper will also suggest the ways to deal with these issues. fog Computing Risks and Solutions Without a doubt, cloud computing is not only changing but also modernizing the way information applied science (IT) is used in organizations today. Additionally, the word sense and implementation of cloud computing are absolutely acce lerating and much of this is being directed by always increasing requirements for organizations to be more flexible and safe in addressing varying IT needs (Cervone, 2010 Alter, & Harris). Thus, the idea of our medical organization to move its IT support functions to cloud computing is feasible and effective but there are certain risks associated with this transfer. In this scenario, the major problem that our medical organization can face is that clouds are hosted and maintained globally, hence, the tools, applications and data need to comply with the laws and regulations of the host country. For instance, a number of Canadian states have acknowledged it against the law for applications in their state to be hosted in the USA for the reason that the data would then put done laws of the Patriot Act. In the same way, many tools and applications in the USA cannot be hosted out of the country due to limitations in the export of computer system technology (Cervone, 2010 Alter, & Harris ). In addition, due to this, the concern in which country the cloud is located and maintained is significant to take into consideration in the perspective of concerns associated with conformity, auditability, and eDiscovery. In prognosis of the fact that the cloud computing is a distinction in computer outsourcing, our medical organization will need to have a high score of self-assurance in the security actions, measures and protocols of their cloud computing supplier. Additionally, our medical organization can face a wide variety of issues related to HIPPA, FERPA, PCI, GLBA however it depends on the nature of the applications and hosted location of the cloud. In this scenario, technologists have already identified and categorized a wide variety of data protection and privacy risks that organizations face spell using cloud computing. For instance, in case of our medical organization it is possible that its data can be accessed by hackers, released accidentally, mixed with data fr om their cloud suppliers other(a) customers. Moreover, our medical organization must make sure that its cloud supplier can deal with any requests for information associated with authoritarian or constitutional issues (Cervone, 2010 Alter, & Harris). In order to deal with cloud computing risks our medical organ

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.