Cyber Security

$19.95

Add to cart
Essay #: 067157
Total text length is 17,970 characters (approximately 12.4 pages).

Excerpts from the Paper

The beginning:
Cyber Security
A recent trend, many enterprises are moving information technology operations to an infrastructure whose connectivity is Internet dependent, typically referred to as cloud computing. Cloud computing offers a number of security advantages but, according to
Brodkin
, (2008) is “fraught with security risks.” The risks posed by cloud computing include: privileged user access by persons outside the enterprise; risk of a lack of compliance with regulations; not knowing where the enterprise’s data is stored; the possibility that the enterprise’s data isn’t appropriately segregated from that of other organizations; recovery in the case of a disaster; lack of support for the investigation of illegal or inappropriate activity; and...
The end:
.....dkin
, J. (2008, Jul. 2). Gartner: seven cloud-computing security risks. Network World. Retrieved Mar. 10, 2011, from http://www.networkworld.com/news/2008/070208-cloud.html
Caballero, A. (2009). Information security essentials for IT managers: protecting mission critical systems. In
Vacca
, J.R. (ed). Computer and information security handbook. Boston, MA: Morgan Kauffman Publishers.
Chen, T. & Walsh, P. J. (2009). Guarding against network intrusions. In
Vacca
, J.R. (ed). Computer and information security handbook. Boston, MA: Morgan Kauffman Publishers.
Nilsen
, K. (2010). Definition and standardization move Java into mission-critical applications. RTC Magazine. Retrieved Mar. 10, 2011 from http://rtcmagazine.com/articles/view/100068