Page 14 - Cyber Warnings
P. 14







third party to offer security. In each of these situations, organizations can see that when they
move to the cloud, no matter what industry, the organization must understand how transition to
the cloud and understand compliance issues prior to making the transition.


Solutions

Although cloud security has challenges, there are solutions that can impact the way in which
security is done that can decrease risk. Solutions begin with the enactment of the agreement.
For example, creating international agreements with subscribers in their country of origin that
promote and enforce compliance and regulation of the laws, is one way to start working on
solutions. Employees who work with IT security must also understand what is needed to
transition to the cloud before the transition begins. For example, treating the transition to cloud
as a project would assist the entire organization to understand the roles for the transition and
the planning that is necessary. For example, project management principles could be used from
start to finish so that roles could be identified, innovation could occur, and the process of
transition would be more smoothly completed.


Conclusion

Weakness in the public cloud environment presents hackers an opportunity to exploit the host
network to create loss of information or data across the network. To circumvent critical systems
of organizations residing on the same host, organizations using the cloud must understand what
this means and how to develop the process over time. Lack of intercontinental regulations,
compliance and laws for cloud computing violates HIPPA, GLBA and PII rules. To solve this
problem, governments and industry leaders must agree on technological standards, establish
universal compliance, implement a provision of cloud computing services to guarantee data
security and privacy, and understand that the organization is still vulnerable.




References


Buckman, J., & Gold, S. (2012). Privacy and data security under cloud computing. College and
University, 88(2), 10-22.

Dlodlo, N. (2011). Legal, privacy, security, access and regulatory issues in cloud computing.
International Conference on Information Management and Evaluation: 161-168.

Reading: Academic Conferences International Limited. Retrieved from ProQuest
database. Document ID: 1010335812





14 Cyber Warnings E-Magazine October 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   9   10   11   12   13   14   15   16   17   18   19