Tuesday, May 14, 2019

Emerging Technology Case Studay Study Example | Topics and Well Written Essays - 750 words

Emerging Technology Studay - Case Study ExampleToday, the major challenge of credentials officers is what to do with hypothetical attacks? Basically, these security attacks differ from using modern and innovative ways and tools of using normal weapons to making use of extraordinary technologies such as lasers to launch attacks. In this scenario, it is the responsibility of security planners to earn pipe organized and justifiable ways to make a decision which hypothetical or unusual threats to business physical composition about and how to prioritize among them (Jackson & Frelinger, 2009). This paper discusses some of the major security risks associated with asperse computing. This paper will also suggest the ways to deal with these issues. Cloud Computing Risks and Solutions Without a doubt, cloud computing is not solo changing but also modernizing the way culture technology (IT) is used in fundamental laws today. Additionally, the acceptance and slaying of cloud computing are absolutely accelerating and much of this is being directed by always increase requirements for organizations to be more flexible and reliable in addressing varying IT directs (Cervone, 2010 Alter, & Harris). Thus, the idea of our checkup exam organization to move its IT support functions to cloud computing is feasible and effective but there are definite risks associated with this transfer. In this scenario, the major problem that our medical organization can face is that clouds are hosted and maintained globally, hence, the tools, applications and entropy need to comply with the laws and regulations of the host country. For instance, a number of Canadian states have acknowledged it against the law for applications in their state to be hosted in the USA for the reason that the information would then put through laws of the patriot Act. In the same way, many tools and applications in the USA cannot be hosted out of the country due to limitations in the export of computer s ystem technology (Cervone, 2010 Alter, & Harris). In addition, due to this, the concern in which country the cloud is located and maintained is significant to take into consideration in the perspective of concerns associated with conformity, auditability, and eDiscovery. In view of the position that the cloud computing is a distinction in computer outsourcing, our medical organization will need to have a high degree of self-assurance in the security actions, measures and protocols of their cloud computing supplier. Additionally, our medical organization can face a wide variety of issues related to HIPPA, FERPA, PCI, GLBA however it depends on the character of the applications and hosted location of the cloud. In this scenario, technologists have already identified and categorized a wide variety of data protection and privacy risks that organizations face while using cloud computing. For instance, in case of our medical organization it is possible that its data can be accessed by ha ckers, released accidentally, mixed with data from their cloud suppliers other customers. Moreover, our medical organization must make sure that its cloud supplier can deal with any requests for information associated with authoritarian or constitutional issues (Cervone, 2010 Alter, & Harris). In order to deal with cloud computing risks our medical organ

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.