Respond agree or disagree
There is still an argument that whether the cloud system
provides better security or not. The author clearly states that,
the risk management depends on the deployment factors and
security infrastructure existing in the organization. The writer
also indicates about risk equation to evaluate the pros and cons
of cloud regarding risk management and vulnerability
(Lindstrom, 2015).
Pros of Cloud in Risk Management and Vulnerability
Scale and Flexibility: Since the need for cloud increases, the
importance of managing vulnerability, considering risk
management and other important factors also grows
dramatically (Zhang, 2017).
Coverage and Visibility: In cloud system, there is a high
possibility of coverage and visibility of assets, security and
polices and guidelines that will help to understand the risk
management and vulnerability of the cloud (Zhang, 2017)
Proactive Response: Security can be embedded during
deployment and will provide a better protection method
proactively (Zhang, 2017).
Cons of Cloud in Risk Management and Vulnerability
Change in Level of Threat: Due to the availability of the data to
more people, there is more activity going on. Attackers use this
opportunity to find vulnerability and make an attack. The threat
increases once the data is available in the internet (Lindstrom,
2015).
Attackers Cost Benefit: Attackers do not spend more time by
research and training. They always calculate their benefit. So,
when data is available in the cloud, hackers will get good
opportunity to attack the cloud (Lindstrom, 2015).
Deployment Risk: There is a high chance of vulnerability when
the application environment is moving from the legacy system
to highly distributed, virtualized architecture. The author also
explains the possibility of collateral damage simply because the
public cloud system is shared with others (Lindstrom, 2015).
Lindstrom, P. (2015). Better Cloud Security: Do the
Math. Information security, 12-16. Retrieved from
http://eds.a.ebscohost.com.lopes.idm.oclc.org/ehost/detail/detail
vid=0&sid=1ad4da93-9ce3-40be-a335-002e2cfe796d%40sdc-v-
sessmgr02&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1za
XRl#db=aci&AN=108883675
Zhang, E. (2017, August, 31). Cloud Computing Security
Benefits: InfoSec Pros Reveal the Top Benefits of the Cloud.
Retrieved from https://digitalguardian.com/blog/cloud
computing-security-benefits

More Related Content

DOCX
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
DOCX
Cloud computing risk assesment report
PPTX
Security overview of cloud computing.pptx
PDF
Reliable security in cloud computing environment 2-3-4-5-6
PDF
RAMEWORKS FOR CLOUD COMPUTING: A CRITICAL REVIEW
PDF
A SURVEY ON SECURITY RISK MANAGEMENT FRAMEWORKS IN CLOUD COMPUTING
PDF
A Survey on Security Risk Management Frameworks in Cloud Computing
PDF
Project 3
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
Cloud computing risk assesment report
Security overview of cloud computing.pptx
Reliable security in cloud computing environment 2-3-4-5-6
RAMEWORKS FOR CLOUD COMPUTING: A CRITICAL REVIEW
A SURVEY ON SECURITY RISK MANAGEMENT FRAMEWORKS IN CLOUD COMPUTING
A Survey on Security Risk Management Frameworks in Cloud Computing
Project 3

Similar to Respond agree or disagree There is still an argument that whet.docx (20)

PDF
Eb31854857
DOCX
Discussion 1Cloud computing offers the ability to share informat
PPT
How Adopting the Cloud Can Improve Your Security.
PDF
Cloud Computing and the Federal Government: Maximizing Trust Supporting the M...
PPTX
Cloud security
DOCX
Is Cloud Computing Secure - Everything Need to Know.docx
PDF
PPTX
Cloud-Computing-Risk-Management g4[1].pptx
PDF
A systematic mapping study of security, trust and privacy in clouds
PDF
Strategies for assessing cloud security
PDF
Strategies for assessing cloud security
PDF
Ast 0064255 strategies-for_assessing_cloud_security
PDF
Security and the cloud
PDF
A Survey on Cloud Computing Security – Challenges and Trust Issues
PPTX
Security issues in cloud computing.pptx
PPT
Rob livingstone Canberra Cloud Security Conference Nov 2011
PDF
Iaetsd cloud computing and security challenges
PPTX
cloud computer security fundamentals Unit-5.pptx
PPTX
Cloud Security: Risks and Recommendations for New Entrants
PPTX
Cloud security: Risks and Rewards for New Entrants
Eb31854857
Discussion 1Cloud computing offers the ability to share informat
How Adopting the Cloud Can Improve Your Security.
Cloud Computing and the Federal Government: Maximizing Trust Supporting the M...
Cloud security
Is Cloud Computing Secure - Everything Need to Know.docx
Cloud-Computing-Risk-Management g4[1].pptx
A systematic mapping study of security, trust and privacy in clouds
Strategies for assessing cloud security
Strategies for assessing cloud security
Ast 0064255 strategies-for_assessing_cloud_security
Security and the cloud
A Survey on Cloud Computing Security – Challenges and Trust Issues
Security issues in cloud computing.pptx
Rob livingstone Canberra Cloud Security Conference Nov 2011
Iaetsd cloud computing and security challenges
cloud computer security fundamentals Unit-5.pptx
Cloud Security: Risks and Recommendations for New Entrants
Cloud security: Risks and Rewards for New Entrants

More from peggyd2 (20)

DOCX
Respond 1For better detection of the specific fraud I wou.docx
DOCX
Respond to 1 peers Discussion 6200Choose a colleague’s post .docx
DOCX
Respond substantively to the initial posts of at least two of your p.docx
DOCX
Respond 1The AICPA Code of Conduct is based on six princi.docx
DOCX
Respond in the following waysAsk a probing question.Share a.docx
DOCX
Respond in a paragraph to the discussion board. In your response.docx
DOCX
Respond in a paragraph the discussion board. In your response,.docx
DOCX
RESPOND EACH STUDENT 200 WORDSRonnie Sims Week 4 Rodgers vs..docx
DOCX
Respond for this posting one paragraph  with two references and cita.docx
DOCX
Respond by Day 7 to at least one of your colleagues postings .docx
DOCX
Respond by providing at least two contributions for improving .docx
DOCX
Respond agree or disagreeVulnerabilities in system design can .docx
DOCX
Respond by Day 5 to at least one of your colleagues postings .docx
DOCX
Respond 250 Do you think IGOs create a convergence of state .docx
DOCX
Respiratory Attendance QuestionsDue 114 at 6pPlease an.docx
DOCX
Resource Page 69 of Managing Innovation and Entrepreneurship,.docx
DOCX
Respond & Disagree ! Try to choose a post that you respectfully disa.docx
DOCX
Respond to one of the following question using the lessons a.docx
DOCX
Respond 1Impetigo The purpose of this discussion is to revie.docx
DOCX
Respond to the following 2 prompts below..1. According to Maxw.docx
Respond 1For better detection of the specific fraud I wou.docx
Respond to 1 peers Discussion 6200Choose a colleague’s post .docx
Respond substantively to the initial posts of at least two of your p.docx
Respond 1The AICPA Code of Conduct is based on six princi.docx
Respond in the following waysAsk a probing question.Share a.docx
Respond in a paragraph to the discussion board. In your response.docx
Respond in a paragraph the discussion board. In your response,.docx
RESPOND EACH STUDENT 200 WORDSRonnie Sims Week 4 Rodgers vs..docx
Respond for this posting one paragraph  with two references and cita.docx
Respond by Day 7 to at least one of your colleagues postings .docx
Respond by providing at least two contributions for improving .docx
Respond agree or disagreeVulnerabilities in system design can .docx
Respond by Day 5 to at least one of your colleagues postings .docx
Respond 250 Do you think IGOs create a convergence of state .docx
Respiratory Attendance QuestionsDue 114 at 6pPlease an.docx
Resource Page 69 of Managing Innovation and Entrepreneurship,.docx
Respond & Disagree ! Try to choose a post that you respectfully disa.docx
Respond to one of the following question using the lessons a.docx
Respond 1Impetigo The purpose of this discussion is to revie.docx
Respond to the following 2 prompts below..1. According to Maxw.docx

Recently uploaded (20)

PDF
Environmental Education MCQ BD2EE - Share Source.pdf
PDF
Complications of Minimal Access-Surgery.pdf
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PPTX
Module on health assessment of CHN. pptx
PDF
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
PPTX
Core Concepts of Personalized Learning and Virtual Learning Environments
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PDF
Race Reva University – Shaping Future Leaders in Artificial Intelligence
PDF
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PPTX
Climate Change and Its Global Impact.pptx
PDF
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 2).pdf
PDF
English Textual Question & Ans (12th Class).pdf
PDF
Empowerment Technology for Senior High School Guide
PDF
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
PDF
Journal of Dental Science - UDMY (2021).pdf
PDF
LIFE & LIVING TRILOGY - PART - (2) THE PURPOSE OF LIFE.pdf
PPTX
DRUGS USED FOR HORMONAL DISORDER, SUPPLIMENTATION, CONTRACEPTION, & MEDICAL T...
PPTX
Share_Module_2_Power_conflict_and_negotiation.pptx
PDF
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
Environmental Education MCQ BD2EE - Share Source.pdf
Complications of Minimal Access-Surgery.pdf
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
Module on health assessment of CHN. pptx
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
Core Concepts of Personalized Learning and Virtual Learning Environments
Unit 4 Computer Architecture Multicore Processor.pptx
Race Reva University – Shaping Future Leaders in Artificial Intelligence
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
Climate Change and Its Global Impact.pptx
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 2).pdf
English Textual Question & Ans (12th Class).pdf
Empowerment Technology for Senior High School Guide
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
Journal of Dental Science - UDMY (2021).pdf
LIFE & LIVING TRILOGY - PART - (2) THE PURPOSE OF LIFE.pdf
DRUGS USED FOR HORMONAL DISORDER, SUPPLIMENTATION, CONTRACEPTION, & MEDICAL T...
Share_Module_2_Power_conflict_and_negotiation.pptx
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf

Respond agree or disagree There is still an argument that whet.docx

  • 1. Respond agree or disagree There is still an argument that whether the cloud system provides better security or not. The author clearly states that, the risk management depends on the deployment factors and security infrastructure existing in the organization. The writer also indicates about risk equation to evaluate the pros and cons of cloud regarding risk management and vulnerability (Lindstrom, 2015). Pros of Cloud in Risk Management and Vulnerability Scale and Flexibility: Since the need for cloud increases, the importance of managing vulnerability, considering risk management and other important factors also grows dramatically (Zhang, 2017). Coverage and Visibility: In cloud system, there is a high possibility of coverage and visibility of assets, security and polices and guidelines that will help to understand the risk management and vulnerability of the cloud (Zhang, 2017) Proactive Response: Security can be embedded during deployment and will provide a better protection method proactively (Zhang, 2017). Cons of Cloud in Risk Management and Vulnerability Change in Level of Threat: Due to the availability of the data to more people, there is more activity going on. Attackers use this opportunity to find vulnerability and make an attack. The threat increases once the data is available in the internet (Lindstrom, 2015). Attackers Cost Benefit: Attackers do not spend more time by research and training. They always calculate their benefit. So, when data is available in the cloud, hackers will get good opportunity to attack the cloud (Lindstrom, 2015). Deployment Risk: There is a high chance of vulnerability when the application environment is moving from the legacy system to highly distributed, virtualized architecture. The author also
  • 2. explains the possibility of collateral damage simply because the public cloud system is shared with others (Lindstrom, 2015). Lindstrom, P. (2015). Better Cloud Security: Do the Math. Information security, 12-16. Retrieved from http://eds.a.ebscohost.com.lopes.idm.oclc.org/ehost/detail/detail vid=0&sid=1ad4da93-9ce3-40be-a335-002e2cfe796d%40sdc-v- sessmgr02&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1za XRl#db=aci&AN=108883675 Zhang, E. (2017, August, 31). Cloud Computing Security Benefits: InfoSec Pros Reveal the Top Benefits of the Cloud. Retrieved from https://digitalguardian.com/blog/cloud computing-security-benefits