{"title":"评估和建立云计算中的基线安全需求:一种企业风险管理方法","authors":"Tunbosun Oyewale Oladoyinbo, Olubukola Omolara Adebiyi, Jennifer Chinelo Ugonnia, Oluwaseun Oladeji Olaniyi, Olalekan Jamiu Okunleye","doi":"10.9734/ajeba/2023/v23i211129","DOIUrl":null,"url":null,"abstract":"In today's digital age, businesses use cloud services to boost their operations exponentially. While this trend presents excellent potential, it is marred by significant concerns over the safety of data stored in the cloud. As the demand for cloud computing increases, businesses face issues ranging from data breaches and provider security to service availability and regulatory compliance. It becomes crucial for organizations to enact stringent security protocols not only to protect user information but also to smoothen operational processes, enforce regulatory compliance, and delineate user behavior norms. To fortify cloud assets, businesses must adhere to foundational security guidelines covering confidentiality, risk analysis, e-discovery, business resilience, and third-party contract obligations. Therefore, while the cloud's advantages are manifold, they have intricate challenges. Businesses must prioritize impenetrable security, craft meticulous risk strategies, and fortify against potential threats to harness the full potential of cloud services while preserving their assets and reputation. These results show that most respondents have a confidence level of 7, indicating a relatively high level of trust in the current cloud security measures. Organizations must continuously assess and adapt their cloud security strategies to keep up with the dynamic digital environment and evolving threats for long-term security and operational efficacy.","PeriodicalId":433532,"journal":{"name":"Asian Journal of Economics, Business and Accounting","volume":"42 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Evaluating and Establishing Baseline Security Requirements in Cloud Computing: An Enterprise Risk Management Approach\",\"authors\":\"Tunbosun Oyewale Oladoyinbo, Olubukola Omolara Adebiyi, Jennifer Chinelo Ugonnia, Oluwaseun Oladeji Olaniyi, Olalekan Jamiu Okunleye\",\"doi\":\"10.9734/ajeba/2023/v23i211129\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In today's digital age, businesses use cloud services to boost their operations exponentially. While this trend presents excellent potential, it is marred by significant concerns over the safety of data stored in the cloud. As the demand for cloud computing increases, businesses face issues ranging from data breaches and provider security to service availability and regulatory compliance. It becomes crucial for organizations to enact stringent security protocols not only to protect user information but also to smoothen operational processes, enforce regulatory compliance, and delineate user behavior norms. To fortify cloud assets, businesses must adhere to foundational security guidelines covering confidentiality, risk analysis, e-discovery, business resilience, and third-party contract obligations. Therefore, while the cloud's advantages are manifold, they have intricate challenges. Businesses must prioritize impenetrable security, craft meticulous risk strategies, and fortify against potential threats to harness the full potential of cloud services while preserving their assets and reputation. These results show that most respondents have a confidence level of 7, indicating a relatively high level of trust in the current cloud security measures. Organizations must continuously assess and adapt their cloud security strategies to keep up with the dynamic digital environment and evolving threats for long-term security and operational efficacy.\",\"PeriodicalId\":433532,\"journal\":{\"name\":\"Asian Journal of Economics, Business and Accounting\",\"volume\":\"42 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-10-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Asian Journal of Economics, Business and Accounting\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.9734/ajeba/2023/v23i211129\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Asian Journal of Economics, Business and Accounting","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.9734/ajeba/2023/v23i211129","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Evaluating and Establishing Baseline Security Requirements in Cloud Computing: An Enterprise Risk Management Approach
In today's digital age, businesses use cloud services to boost their operations exponentially. While this trend presents excellent potential, it is marred by significant concerns over the safety of data stored in the cloud. As the demand for cloud computing increases, businesses face issues ranging from data breaches and provider security to service availability and regulatory compliance. It becomes crucial for organizations to enact stringent security protocols not only to protect user information but also to smoothen operational processes, enforce regulatory compliance, and delineate user behavior norms. To fortify cloud assets, businesses must adhere to foundational security guidelines covering confidentiality, risk analysis, e-discovery, business resilience, and third-party contract obligations. Therefore, while the cloud's advantages are manifold, they have intricate challenges. Businesses must prioritize impenetrable security, craft meticulous risk strategies, and fortify against potential threats to harness the full potential of cloud services while preserving their assets and reputation. These results show that most respondents have a confidence level of 7, indicating a relatively high level of trust in the current cloud security measures. Organizations must continuously assess and adapt their cloud security strategies to keep up with the dynamic digital environment and evolving threats for long-term security and operational efficacy.