Evaluating and Establishing Baseline Security Requirements in Cloud Computing: An Enterprise Risk Management Approach

Tunbosun Oyewale Oladoyinbo, Olubukola Omolara Adebiyi, Jennifer Chinelo Ugonnia, Oluwaseun Oladeji Olaniyi, Olalekan Jamiu Okunleye
{"title":"Evaluating and Establishing Baseline Security Requirements in Cloud Computing: An Enterprise Risk Management Approach","authors":"Tunbosun Oyewale Oladoyinbo, Olubukola Omolara Adebiyi, Jennifer Chinelo Ugonnia, Oluwaseun Oladeji Olaniyi, Olalekan Jamiu Okunleye","doi":"10.9734/ajeba/2023/v23i211129","DOIUrl":null,"url":null,"abstract":"In today's digital age, businesses use cloud services to boost their operations exponentially. While this trend presents excellent potential, it is marred by significant concerns over the safety of data stored in the cloud. As the demand for cloud computing increases, businesses face issues ranging from data breaches and provider security to service availability and regulatory compliance. It becomes crucial for organizations to enact stringent security protocols not only to protect user information but also to smoothen operational processes, enforce regulatory compliance, and delineate user behavior norms. To fortify cloud assets, businesses must adhere to foundational security guidelines covering confidentiality, risk analysis, e-discovery, business resilience, and third-party contract obligations. Therefore, while the cloud's advantages are manifold, they have intricate challenges. Businesses must prioritize impenetrable security, craft meticulous risk strategies, and fortify against potential threats to harness the full potential of cloud services while preserving their assets and reputation. These results show that most respondents have a confidence level of 7, indicating a relatively high level of trust in the current cloud security measures. Organizations must continuously assess and adapt their cloud security strategies to keep up with the dynamic digital environment and evolving threats for long-term security and operational efficacy.","PeriodicalId":433532,"journal":{"name":"Asian Journal of Economics, Business and Accounting","volume":"42 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Asian Journal of Economics, Business and Accounting","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.9734/ajeba/2023/v23i211129","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

In today's digital age, businesses use cloud services to boost their operations exponentially. While this trend presents excellent potential, it is marred by significant concerns over the safety of data stored in the cloud. As the demand for cloud computing increases, businesses face issues ranging from data breaches and provider security to service availability and regulatory compliance. It becomes crucial for organizations to enact stringent security protocols not only to protect user information but also to smoothen operational processes, enforce regulatory compliance, and delineate user behavior norms. To fortify cloud assets, businesses must adhere to foundational security guidelines covering confidentiality, risk analysis, e-discovery, business resilience, and third-party contract obligations. Therefore, while the cloud's advantages are manifold, they have intricate challenges. Businesses must prioritize impenetrable security, craft meticulous risk strategies, and fortify against potential threats to harness the full potential of cloud services while preserving their assets and reputation. These results show that most respondents have a confidence level of 7, indicating a relatively high level of trust in the current cloud security measures. Organizations must continuously assess and adapt their cloud security strategies to keep up with the dynamic digital environment and evolving threats for long-term security and operational efficacy.
评估和建立云计算中的基线安全需求:一种企业风险管理方法
在当今的数字时代,企业使用云服务以指数方式提升其运营。虽然这一趋势呈现出巨大的潜力,但人们对存储在云中的数据的安全性的严重担忧损害了它。随着对云计算需求的增加,企业面临着从数据泄露和提供商安全性到服务可用性和法规遵从性等一系列问题。对于组织来说,制定严格的安全协议变得至关重要,这不仅是为了保护用户信息,也是为了平滑操作流程、执行法规遵从性和描述用户行为规范。为了加强云资产,企业必须遵守基本的安全准则,包括机密性、风险分析、电子发现、业务弹性和第三方合同义务。因此,虽然云计算的优势是多方面的,但它们也面临着复杂的挑战。企业必须优先考虑不可渗透的安全性,制定细致的风险策略,并加强对潜在威胁的防范,以充分利用云服务的潜力,同时保护其资产和声誉。这些结果表明,大多数受访者的信心水平为7,表明对当前云安全措施的信任程度相对较高。组织必须不断评估和调整其云安全策略,以跟上动态的数字环境和不断变化的威胁,以实现长期安全和运营效率。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信