NEED A PERFECT PAPER? PLACE YOUR FIRST ORDER AND SAVE 15% USING COUPON:

Discussion and Response: how organizations have faced the challenges that incident handlers are challenged with in identifying incidents when resources hav

Discussion and Response: how organizations have faced the challenges that incident handlers are challenged with in identifying incidents when resources hav

Click here to Order a Custom answer to this Question from our writers. It’s fast and plagiarism-free.

Discussion and Response: how organizations have faced the challenges that incident handlers are challenged with in identifying incidents when resources have been moved to a cloud environment. Discussion Question

Search “scholar.google.com” or your textbook. Discuss how organizations have faced the challenges that incident handlers are challenged with in identifying incidents when resources have been moved to a cloud environment. 

– One original post at least 250 words response to the discussion question. Indicate at least one source or reference in APA 6 formatted, which means you MUST INCLUDE in-text citation.

– Two replies to the two attached posts at least 250 words each. by Jagruthi Gundeti

Security incident response procedures to address the new challenges cloud computing presents to cyber security. In this article, we consider cloud security challenges and propose a proactive approach to address them based on the concept of digital risk management. Cloud computing is a disruptive trend in the way companies do business. It is a “client–server computing environment that uses a computing model in which the client and the service provider share resources on a shared, pay-per-use basis.” The benefits of cloud computing for business owners are tremendous. It enables the cost savings associated with the use of off-the-shelf software, improves operational efficiency,(Davis & Jankow, 2019). enables remote business locations, and provides a secure environment to conduct business remotely. Cloud computing also provides an advantage to cyber security (the use of information systems to prevent security threats). Cloud computing helps reduce the cost of security operations, including incident response, investigation, and forensic analysis. This, in turn, enhances the overall protection of an organization’s confidential information. The potential threats to confidentiality, integrity, and availability associated with cloud computing were addressed in the 2012 Cloud Computing Report of the U.S. Chamber of Commerce. The report indicated that while organizations are exposed to the potential loss of sensitive data, the threats are mitigated when an organization works with cloud computing service providers to “develop and maintain a strategy for incident response and emergency planning.” With cloud computing, the use of hardware and software purchased and managed by a third-party service provider is generally much less expensive than traditional computing solutions, provided the organization has a good business relationship with the provider.

References
Davis, A. S., & Jankow, C. (2019). On why library workers are well-suited to serve during disasters. Collaborative Librarianship, 11(1), 5.
 
Nguyen, V. C., Dinh, N. T., & Kim, Y. (2018). A Distributed NFV-Enabled Edge Cloud Architecture for ICN-Based Disaster Management Services. Sensors, 18(12), 4136.

Place your order now for a similar assignment and have exceptional work written by one of our experts, guaranteeing you an A result.

Need an Essay Written?

This sample is available to anyone. If you want a unique paper order it from one of our professional writers.

Get help with your academic paper right away

Quality & Timely Delivery

Free Editing & Plagiarism Check

Security, Privacy & Confidentiality