{"title":"利用安全风险方法管理云计算服务","authors":"D. Bernardo","doi":"10.1109/NBiS.2013.21","DOIUrl":null,"url":null,"abstract":"There is no doubt that Cloud Computing (CC) introduces opportunities that mobilize new strategic ICT agenda across organizations. Like the Internet when it was first introduced, the introduction of Cloud Computing unveils the creation of enormous possibilities in information sharing. Unlike the Internet, Cloud Computing allows organizations to transfer ICT assets externally to meet their cost reduction agenda in predefined contractual terms. However, both the Internet and Cloud Computing only highlight security challenges, prevalent undoubtedly, especially at the time when the popularity of Cloud Computing continues to mount. In this article, common security threats to Cloud Computing are explored. These threats are addressed through acceptable measures, through governance and effective risk management using a tailored Security Risk Approach (SRA).","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"39 4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Utilizing Security Risk Approach in Managing Cloud Computing Services\",\"authors\":\"D. Bernardo\",\"doi\":\"10.1109/NBiS.2013.21\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"There is no doubt that Cloud Computing (CC) introduces opportunities that mobilize new strategic ICT agenda across organizations. Like the Internet when it was first introduced, the introduction of Cloud Computing unveils the creation of enormous possibilities in information sharing. Unlike the Internet, Cloud Computing allows organizations to transfer ICT assets externally to meet their cost reduction agenda in predefined contractual terms. However, both the Internet and Cloud Computing only highlight security challenges, prevalent undoubtedly, especially at the time when the popularity of Cloud Computing continues to mount. In this article, common security threats to Cloud Computing are explored. These threats are addressed through acceptable measures, through governance and effective risk management using a tailored Security Risk Approach (SRA).\",\"PeriodicalId\":261268,\"journal\":{\"name\":\"2013 16th International Conference on Network-Based Information Systems\",\"volume\":\"39 4 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-09-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 16th International Conference on Network-Based Information Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NBiS.2013.21\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 16th International Conference on Network-Based Information Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NBiS.2013.21","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Utilizing Security Risk Approach in Managing Cloud Computing Services
There is no doubt that Cloud Computing (CC) introduces opportunities that mobilize new strategic ICT agenda across organizations. Like the Internet when it was first introduced, the introduction of Cloud Computing unveils the creation of enormous possibilities in information sharing. Unlike the Internet, Cloud Computing allows organizations to transfer ICT assets externally to meet their cost reduction agenda in predefined contractual terms. However, both the Internet and Cloud Computing only highlight security challenges, prevalent undoubtedly, especially at the time when the popularity of Cloud Computing continues to mount. In this article, common security threats to Cloud Computing are explored. These threats are addressed through acceptable measures, through governance and effective risk management using a tailored Security Risk Approach (SRA).