SlideShare a Scribd company logo
1 of 5
Discussion 300 words
Search "scholar.google.com" or your textbook. Discuss how
organizations have faced the challenges that incident handlers
are challenged with in identifying incidents when resources
have been moved to a cloud environment.
Reply to classmate 1: 275 words
Incident Handlers Challenges
The cloud computer helps the people to share their distributed
resources which are related to different business organizations.
Cloud computing helps business organizations in managing their
business around the globe. The cloud computing application
helps business organizations in expanding their business at a
large level. It can be assessed on web devices from anywhere.
Nowadays cloud computing helps the business organizations in
meeting the demands of their customers more efficiently. The
malicious cloud system has been noticed by the incident
handlers which is a core concern for the business organization.
Nowadays every business organization is using cloud computing
in order to manage their important data and information of the
business. The business organization is facing many incidents in
their organization which can directly affect the working of their
business. The main challenge that has been faced by the
incident handlers is the accuracy in identification (John W.
Rittinghouse, 2017).
The number of challenges that faced in the cloud environment
are as follows:-
1. Challenge of denial of services: - The first main challenge
that has been faced by the incident handler is the denial of
services. There are various incidents of service attacks which
can create a bogus request for preventing the system within the
stipulated time. Such physical attack creates a challenge of
service denial for the system.
2. Challenge of malicious code: - The second main challenge
which can be faced by the incident handler is the challenge of
malicious code. It can quickly affect the number of workstations
in the business organization. It effects the working of the
business organization.
3. Challenge of unauthorized access:- The third main
challenge which is being faced by the incident handler is the
unauthorized access of the system by the third party in the
business organization. It can affect important data and
information about the business. The attackers can access the
system by the unauthorized way and steal the important data of
the business organization.
4. Challenge of inappropriate use:- The fourth main
challenge which may be faced by the incident handlers is the
challenge of inappropriate use of the system. In the business
organization, any employee can provide the illegal copies of the
software to the other company employees. They can take
advantage of the data and can misuse it.
5. Cloud service provider challenge:- The fifth main
challenge that can be faced by the incident handler is the cloud
service providers. This situation occurs when there is no control
over the actions provided by cloud service providers. It can
affect the business infrastructure system of the business
organization.
All the above are the various challenges that can be faced by the
incident handlers in the business organization which can affect
the smooth functioning of the organization. All these challenges
can be faced in the cloud computing environment. The main
conclusion of these challenges is that if any business
organization has no control over its services, then there should
need to implement more flexibility to its virtual applications to
maintain their security of the network. The incident handlers
have to cope with these challenges in order to run their business
organization in a smooth manner (Ryan Ko, 2015).
Reply to classmate 2: 275 words
The cloud the environment has transformed how IT is used and
managed by firms in an innovative and cost-efficient manner.
Organizations are shifting to the cloud environment as they can
reach to their marketplace faster and scale up their operations as
per the growth. Since 2008 there has been a large shift in the
entire world where more and more organizations are using cloud
computing models and benefitting from them substantially.
However, incident management teams do find it extremely
challenging. There is regulatory, privacy as well as security
issues associated with a cloud environment.
Cloud Environment challenges
Loss of control of incident managers-
The enterprises usually lose their control when they attempt to
enhance the security of the networks, and this is the critical
drawback faced in a cloud environment. Responsibility of the
network security in a cloud environment is shared between the
CSP or the cloud service provider and the organizations. So the
model of server in use by the enterprise gives very less or
almost no control over the security of the cloud environment by
the employees. The IaaS or infrastructure as a service provides
organizations to gain some control as the cloud service provider
only offers an infrastructure to host the business on the cloud.
Their competency of security management is not proven. Hence
the main task of security responsibility still lies on the
organizational incident management team (Anonymous, 2018).
The stack which is given to the incident managers are built,
used and controlled by the cloud service providers. SaaS
environments get an incident handler lesser controlled. As a
result, security gaps are constantly evaluated.
Vendor lock-in situations-
If the SLA or policy document the cloud service provider is not
read properly then the firm can find it challenging when there is
a vendor lock-in the scenario. This is where switching from one
vendor to another is not allowed (SDxCentral, 2018).
Loss of crucial business data-
Another challenge witnessed is the loss of data if the company
makes an error or if there is a natural disaster. There is no
surety about the kind of disaster recovery plan the cloud service
providing firm has in place.
Theft from inside –
Employees of cloud service provider department with wrong
intentions can creep in and use data if the safety measures are
not rebutted. The threat from insider man-made anomalies is the
highest in a cloud environment (TaheriMonfared & Jaatun,
2018).
Breaches of data –
The cloud environment also at times suffer from data breaches.
Any kind of breach which becomes successful can lead to huge
financial loss, penalties, and customer confidence loss and
reputation loss for an organization.
Above challenges are faced when business functions are shifter
over the cloud environment. Numerous security-related issues
in the cloud can arise as the color covers networks,
technologies, OS, etc. it is a challenge to keep the enterprise
assets secured when total power is not in the hands of the
management. It is hence important to trust only reliable and
efficient cloud services providers who have robust security
protocols implemented.

More Related Content

Similar to Discussion 300 wordsSearch scholar.google.com or your textbook

CMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docx
CMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docxCMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docx
CMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docxmary772
 
Cloud Security Issues and Challenge.pptx
Cloud Security Issues and Challenge.pptxCloud Security Issues and Challenge.pptx
Cloud Security Issues and Challenge.pptxinfosec train
 
Ass3201 cyber securityassignment
Ass3201 cyber securityassignmentAss3201 cyber securityassignment
Ass3201 cyber securityassignmentharinathinfotech
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBookPablo Junco
 
Three Ways To Secure Cloud Migration.pdf
Three Ways To Secure Cloud Migration.pdfThree Ways To Secure Cloud Migration.pdf
Three Ways To Secure Cloud Migration.pdfEnterprise Insider
 
9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloud9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloudkairostech
 
Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterpriseinfra-si
 
The Anatomy of a Cloud Security Breach
The Anatomy of a Cloud Security BreachThe Anatomy of a Cloud Security Breach
The Anatomy of a Cloud Security BreachCloudLock
 
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Sarah Nirschl
 
ZSAH Security - Web
ZSAH Security - WebZSAH Security - Web
ZSAH Security - WebFahd Khan
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxsarah david
 
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfsarah david
 
Global Security Certification for Governments
Global Security Certification for GovernmentsGlobal Security Certification for Governments
Global Security Certification for GovernmentsCloudMask inc.
 
Security issues in cloud computing.pptx
Security issues in cloud computing.pptxSecurity issues in cloud computing.pptx
Security issues in cloud computing.pptxRishiSharma912314
 
private-cloud-white-paper
private-cloud-white-paperprivate-cloud-white-paper
private-cloud-white-paperDavid Gould
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar reportshafzonly
 
Why Cyber Security Is important?
Why Cyber Security Is important?Why Cyber Security Is important?
Why Cyber Security Is important?ManojAgrawal74
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfInfinityGroup5
 

Similar to Discussion 300 wordsSearch scholar.google.com or your textbook (20)

CMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docx
CMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docxCMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docx
CMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docx
 
Cloud Security Issues and Challenge.pptx
Cloud Security Issues and Challenge.pptxCloud Security Issues and Challenge.pptx
Cloud Security Issues and Challenge.pptx
 
Ass3201 cyber securityassignment
Ass3201 cyber securityassignmentAss3201 cyber securityassignment
Ass3201 cyber securityassignment
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBook
 
Three Ways To Secure Cloud Migration.pdf
Three Ways To Secure Cloud Migration.pdfThree Ways To Secure Cloud Migration.pdf
Three Ways To Secure Cloud Migration.pdf
 
9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloud9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloud
 
Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterprise
 
The Anatomy of a Cloud Security Breach
The Anatomy of a Cloud Security BreachThe Anatomy of a Cloud Security Breach
The Anatomy of a Cloud Security Breach
 
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
 
ZSAH Security - Web
ZSAH Security - WebZSAH Security - Web
ZSAH Security - Web
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
 
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
 
Global Security Certification for Governments
Global Security Certification for GovernmentsGlobal Security Certification for Governments
Global Security Certification for Governments
 
network-host-reconciliation
network-host-reconciliationnetwork-host-reconciliation
network-host-reconciliation
 
Safeguarding the Enterprise
Safeguarding the EnterpriseSafeguarding the Enterprise
Safeguarding the Enterprise
 
Security issues in cloud computing.pptx
Security issues in cloud computing.pptxSecurity issues in cloud computing.pptx
Security issues in cloud computing.pptx
 
private-cloud-white-paper
private-cloud-white-paperprivate-cloud-white-paper
private-cloud-white-paper
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
 
Why Cyber Security Is important?
Why Cyber Security Is important?Why Cyber Security Is important?
Why Cyber Security Is important?
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
 

More from huttenangela

Assignment 2 Using Motivation to Improve Performance Due Week 5.docx
Assignment 2 Using Motivation to Improve Performance Due Week 5.docxAssignment 2 Using Motivation to Improve Performance Due Week 5.docx
Assignment 2 Using Motivation to Improve Performance Due Week 5.docxhuttenangela
 
Assignment 2 Traumatic Brain Injury Jefferson’s CaseWhen new par.docx
Assignment 2 Traumatic Brain Injury Jefferson’s CaseWhen new par.docxAssignment 2 Traumatic Brain Injury Jefferson’s CaseWhen new par.docx
Assignment 2 Traumatic Brain Injury Jefferson’s CaseWhen new par.docxhuttenangela
 
Assignment 2 Telecommuting and the Mobile WorkerThe number of Ame.docx
Assignment 2 Telecommuting and the Mobile WorkerThe number of Ame.docxAssignment 2 Telecommuting and the Mobile WorkerThe number of Ame.docx
Assignment 2 Telecommuting and the Mobile WorkerThe number of Ame.docxhuttenangela
 
Assignment 2 The Application PaperBy Wednesday, February 3,.docx
Assignment 2 The Application PaperBy Wednesday, February 3,.docxAssignment 2 The Application PaperBy Wednesday, February 3,.docx
Assignment 2 The Application PaperBy Wednesday, February 3,.docxhuttenangela
 
Assignment 2 Telecommuting and the Mobile Worker The number of Am.docx
Assignment 2 Telecommuting and the Mobile Worker The number of Am.docxAssignment 2 Telecommuting and the Mobile Worker The number of Am.docx
Assignment 2 Telecommuting and the Mobile Worker The number of Am.docxhuttenangela
 
Assignment 2 Telecommuting and the Mobile WorkerDue Week 4 and wo.docx
Assignment 2 Telecommuting and the Mobile WorkerDue Week 4 and wo.docxAssignment 2 Telecommuting and the Mobile WorkerDue Week 4 and wo.docx
Assignment 2 Telecommuting and the Mobile WorkerDue Week 4 and wo.docxhuttenangela
 
Assignment 2 Romantic Attachment StylesThere are three primary .docx
Assignment 2 Romantic Attachment StylesThere are three primary .docxAssignment 2 Romantic Attachment StylesThere are three primary .docx
Assignment 2 Romantic Attachment StylesThere are three primary .docxhuttenangela
 
Assignment 2 Social Movements ExploredIndividuals use social move.docx
Assignment 2 Social Movements ExploredIndividuals use social move.docxAssignment 2 Social Movements ExploredIndividuals use social move.docx
Assignment 2 Social Movements ExploredIndividuals use social move.docxhuttenangela
 
Assignment 2 Significance of Major Discoveries in Modern BiologyP.docx
Assignment 2 Significance of Major Discoveries in Modern BiologyP.docxAssignment 2 Significance of Major Discoveries in Modern BiologyP.docx
Assignment 2 Significance of Major Discoveries in Modern BiologyP.docxhuttenangela
 
Assignment 2 Research ProjectLegal and Ethical Challenges in a Mu.docx
Assignment 2 Research ProjectLegal and Ethical Challenges in a Mu.docxAssignment 2 Research ProjectLegal and Ethical Challenges in a Mu.docx
Assignment 2 Research ProjectLegal and Ethical Challenges in a Mu.docxhuttenangela
 
Assignment 2 Required Assignment—Balancing Company Interests vs. th.docx
Assignment 2 Required Assignment—Balancing Company Interests vs. th.docxAssignment 2 Required Assignment—Balancing Company Interests vs. th.docx
Assignment 2 Required Assignment—Balancing Company Interests vs. th.docxhuttenangela
 
Assignment 2 Securing of Computer Forensics EvidencePreparing.docx
Assignment 2 Securing of Computer Forensics EvidencePreparing.docxAssignment 2 Securing of Computer Forensics EvidencePreparing.docx
Assignment 2 Securing of Computer Forensics EvidencePreparing.docxhuttenangela
 
Assignment 2 Revisions of Foundations of the Development and Functi.docx
Assignment 2 Revisions of Foundations of the Development and Functi.docxAssignment 2 Revisions of Foundations of the Development and Functi.docx
Assignment 2 Revisions of Foundations of the Development and Functi.docxhuttenangela
 
Assignment 2 Romantic Attachment StylesThere are three primary ro.docx
Assignment 2 Romantic Attachment StylesThere are three primary ro.docxAssignment 2 Romantic Attachment StylesThere are three primary ro.docx
Assignment 2 Romantic Attachment StylesThere are three primary ro.docxhuttenangela
 
Assignment 2 Reflections on Racial DiscriminationFranklin hears.docx
Assignment 2 Reflections on Racial DiscriminationFranklin hears.docxAssignment 2 Reflections on Racial DiscriminationFranklin hears.docx
Assignment 2 Reflections on Racial DiscriminationFranklin hears.docxhuttenangela
 
Assignment 2 Recognizing the Impact of Diversity on the Workplace.docx
Assignment 2 Recognizing the Impact of Diversity on the Workplace.docxAssignment 2 Recognizing the Impact of Diversity on the Workplace.docx
Assignment 2 Recognizing the Impact of Diversity on the Workplace.docxhuttenangela
 
Assignment 2 Punishment vs. Rehabilitation What Society Wants vs. .docx
Assignment 2 Punishment vs. Rehabilitation What Society Wants vs. .docxAssignment 2 Punishment vs. Rehabilitation What Society Wants vs. .docx
Assignment 2 Punishment vs. Rehabilitation What Society Wants vs. .docxhuttenangela
 
Assignment 2 Project PaperThe Project Paper focuses on a sugg.docx
Assignment 2 Project PaperThe Project Paper focuses on a sugg.docxAssignment 2 Project PaperThe Project Paper focuses on a sugg.docx
Assignment 2 Project PaperThe Project Paper focuses on a sugg.docxhuttenangela
 
Assignment 2 Project Paper – Comparative EssayDue Week 4 and .docx
Assignment 2 Project Paper – Comparative EssayDue Week 4 and .docxAssignment 2 Project Paper – Comparative EssayDue Week 4 and .docx
Assignment 2 Project Paper – Comparative EssayDue Week 4 and .docxhuttenangela
 
Assignment 2 Physical Development in Early AdulthoodDuring earl.docx
Assignment 2 Physical Development in Early AdulthoodDuring earl.docxAssignment 2 Physical Development in Early AdulthoodDuring earl.docx
Assignment 2 Physical Development in Early AdulthoodDuring earl.docxhuttenangela
 

More from huttenangela (20)

Assignment 2 Using Motivation to Improve Performance Due Week 5.docx
Assignment 2 Using Motivation to Improve Performance Due Week 5.docxAssignment 2 Using Motivation to Improve Performance Due Week 5.docx
Assignment 2 Using Motivation to Improve Performance Due Week 5.docx
 
Assignment 2 Traumatic Brain Injury Jefferson’s CaseWhen new par.docx
Assignment 2 Traumatic Brain Injury Jefferson’s CaseWhen new par.docxAssignment 2 Traumatic Brain Injury Jefferson’s CaseWhen new par.docx
Assignment 2 Traumatic Brain Injury Jefferson’s CaseWhen new par.docx
 
Assignment 2 Telecommuting and the Mobile WorkerThe number of Ame.docx
Assignment 2 Telecommuting and the Mobile WorkerThe number of Ame.docxAssignment 2 Telecommuting and the Mobile WorkerThe number of Ame.docx
Assignment 2 Telecommuting and the Mobile WorkerThe number of Ame.docx
 
Assignment 2 The Application PaperBy Wednesday, February 3,.docx
Assignment 2 The Application PaperBy Wednesday, February 3,.docxAssignment 2 The Application PaperBy Wednesday, February 3,.docx
Assignment 2 The Application PaperBy Wednesday, February 3,.docx
 
Assignment 2 Telecommuting and the Mobile Worker The number of Am.docx
Assignment 2 Telecommuting and the Mobile Worker The number of Am.docxAssignment 2 Telecommuting and the Mobile Worker The number of Am.docx
Assignment 2 Telecommuting and the Mobile Worker The number of Am.docx
 
Assignment 2 Telecommuting and the Mobile WorkerDue Week 4 and wo.docx
Assignment 2 Telecommuting and the Mobile WorkerDue Week 4 and wo.docxAssignment 2 Telecommuting and the Mobile WorkerDue Week 4 and wo.docx
Assignment 2 Telecommuting and the Mobile WorkerDue Week 4 and wo.docx
 
Assignment 2 Romantic Attachment StylesThere are three primary .docx
Assignment 2 Romantic Attachment StylesThere are three primary .docxAssignment 2 Romantic Attachment StylesThere are three primary .docx
Assignment 2 Romantic Attachment StylesThere are three primary .docx
 
Assignment 2 Social Movements ExploredIndividuals use social move.docx
Assignment 2 Social Movements ExploredIndividuals use social move.docxAssignment 2 Social Movements ExploredIndividuals use social move.docx
Assignment 2 Social Movements ExploredIndividuals use social move.docx
 
Assignment 2 Significance of Major Discoveries in Modern BiologyP.docx
Assignment 2 Significance of Major Discoveries in Modern BiologyP.docxAssignment 2 Significance of Major Discoveries in Modern BiologyP.docx
Assignment 2 Significance of Major Discoveries in Modern BiologyP.docx
 
Assignment 2 Research ProjectLegal and Ethical Challenges in a Mu.docx
Assignment 2 Research ProjectLegal and Ethical Challenges in a Mu.docxAssignment 2 Research ProjectLegal and Ethical Challenges in a Mu.docx
Assignment 2 Research ProjectLegal and Ethical Challenges in a Mu.docx
 
Assignment 2 Required Assignment—Balancing Company Interests vs. th.docx
Assignment 2 Required Assignment—Balancing Company Interests vs. th.docxAssignment 2 Required Assignment—Balancing Company Interests vs. th.docx
Assignment 2 Required Assignment—Balancing Company Interests vs. th.docx
 
Assignment 2 Securing of Computer Forensics EvidencePreparing.docx
Assignment 2 Securing of Computer Forensics EvidencePreparing.docxAssignment 2 Securing of Computer Forensics EvidencePreparing.docx
Assignment 2 Securing of Computer Forensics EvidencePreparing.docx
 
Assignment 2 Revisions of Foundations of the Development and Functi.docx
Assignment 2 Revisions of Foundations of the Development and Functi.docxAssignment 2 Revisions of Foundations of the Development and Functi.docx
Assignment 2 Revisions of Foundations of the Development and Functi.docx
 
Assignment 2 Romantic Attachment StylesThere are three primary ro.docx
Assignment 2 Romantic Attachment StylesThere are three primary ro.docxAssignment 2 Romantic Attachment StylesThere are three primary ro.docx
Assignment 2 Romantic Attachment StylesThere are three primary ro.docx
 
Assignment 2 Reflections on Racial DiscriminationFranklin hears.docx
Assignment 2 Reflections on Racial DiscriminationFranklin hears.docxAssignment 2 Reflections on Racial DiscriminationFranklin hears.docx
Assignment 2 Reflections on Racial DiscriminationFranklin hears.docx
 
Assignment 2 Recognizing the Impact of Diversity on the Workplace.docx
Assignment 2 Recognizing the Impact of Diversity on the Workplace.docxAssignment 2 Recognizing the Impact of Diversity on the Workplace.docx
Assignment 2 Recognizing the Impact of Diversity on the Workplace.docx
 
Assignment 2 Punishment vs. Rehabilitation What Society Wants vs. .docx
Assignment 2 Punishment vs. Rehabilitation What Society Wants vs. .docxAssignment 2 Punishment vs. Rehabilitation What Society Wants vs. .docx
Assignment 2 Punishment vs. Rehabilitation What Society Wants vs. .docx
 
Assignment 2 Project PaperThe Project Paper focuses on a sugg.docx
Assignment 2 Project PaperThe Project Paper focuses on a sugg.docxAssignment 2 Project PaperThe Project Paper focuses on a sugg.docx
Assignment 2 Project PaperThe Project Paper focuses on a sugg.docx
 
Assignment 2 Project Paper – Comparative EssayDue Week 4 and .docx
Assignment 2 Project Paper – Comparative EssayDue Week 4 and .docxAssignment 2 Project Paper – Comparative EssayDue Week 4 and .docx
Assignment 2 Project Paper – Comparative EssayDue Week 4 and .docx
 
Assignment 2 Physical Development in Early AdulthoodDuring earl.docx
Assignment 2 Physical Development in Early AdulthoodDuring earl.docxAssignment 2 Physical Development in Early AdulthoodDuring earl.docx
Assignment 2 Physical Development in Early AdulthoodDuring earl.docx
 

Recently uploaded

Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 

Recently uploaded (20)

OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 

Discussion 300 wordsSearch scholar.google.com or your textbook

  • 1. Discussion 300 words Search "scholar.google.com" or your textbook. Discuss how organizations have faced the challenges that incident handlers are challenged with in identifying incidents when resources have been moved to a cloud environment. Reply to classmate 1: 275 words Incident Handlers Challenges The cloud computer helps the people to share their distributed resources which are related to different business organizations. Cloud computing helps business organizations in managing their business around the globe. The cloud computing application helps business organizations in expanding their business at a large level. It can be assessed on web devices from anywhere. Nowadays cloud computing helps the business organizations in meeting the demands of their customers more efficiently. The malicious cloud system has been noticed by the incident handlers which is a core concern for the business organization. Nowadays every business organization is using cloud computing in order to manage their important data and information of the business. The business organization is facing many incidents in their organization which can directly affect the working of their business. The main challenge that has been faced by the incident handlers is the accuracy in identification (John W. Rittinghouse, 2017). The number of challenges that faced in the cloud environment are as follows:-
  • 2. 1. Challenge of denial of services: - The first main challenge that has been faced by the incident handler is the denial of services. There are various incidents of service attacks which can create a bogus request for preventing the system within the stipulated time. Such physical attack creates a challenge of service denial for the system. 2. Challenge of malicious code: - The second main challenge which can be faced by the incident handler is the challenge of malicious code. It can quickly affect the number of workstations in the business organization. It effects the working of the business organization. 3. Challenge of unauthorized access:- The third main challenge which is being faced by the incident handler is the unauthorized access of the system by the third party in the business organization. It can affect important data and information about the business. The attackers can access the system by the unauthorized way and steal the important data of the business organization. 4. Challenge of inappropriate use:- The fourth main challenge which may be faced by the incident handlers is the challenge of inappropriate use of the system. In the business organization, any employee can provide the illegal copies of the software to the other company employees. They can take advantage of the data and can misuse it. 5. Cloud service provider challenge:- The fifth main challenge that can be faced by the incident handler is the cloud service providers. This situation occurs when there is no control over the actions provided by cloud service providers. It can affect the business infrastructure system of the business organization. All the above are the various challenges that can be faced by the
  • 3. incident handlers in the business organization which can affect the smooth functioning of the organization. All these challenges can be faced in the cloud computing environment. The main conclusion of these challenges is that if any business organization has no control over its services, then there should need to implement more flexibility to its virtual applications to maintain their security of the network. The incident handlers have to cope with these challenges in order to run their business organization in a smooth manner (Ryan Ko, 2015). Reply to classmate 2: 275 words The cloud the environment has transformed how IT is used and managed by firms in an innovative and cost-efficient manner. Organizations are shifting to the cloud environment as they can reach to their marketplace faster and scale up their operations as per the growth. Since 2008 there has been a large shift in the entire world where more and more organizations are using cloud computing models and benefitting from them substantially. However, incident management teams do find it extremely challenging. There is regulatory, privacy as well as security issues associated with a cloud environment. Cloud Environment challenges Loss of control of incident managers- The enterprises usually lose their control when they attempt to enhance the security of the networks, and this is the critical drawback faced in a cloud environment. Responsibility of the network security in a cloud environment is shared between the CSP or the cloud service provider and the organizations. So the
  • 4. model of server in use by the enterprise gives very less or almost no control over the security of the cloud environment by the employees. The IaaS or infrastructure as a service provides organizations to gain some control as the cloud service provider only offers an infrastructure to host the business on the cloud. Their competency of security management is not proven. Hence the main task of security responsibility still lies on the organizational incident management team (Anonymous, 2018). The stack which is given to the incident managers are built, used and controlled by the cloud service providers. SaaS environments get an incident handler lesser controlled. As a result, security gaps are constantly evaluated. Vendor lock-in situations- If the SLA or policy document the cloud service provider is not read properly then the firm can find it challenging when there is a vendor lock-in the scenario. This is where switching from one vendor to another is not allowed (SDxCentral, 2018). Loss of crucial business data- Another challenge witnessed is the loss of data if the company makes an error or if there is a natural disaster. There is no surety about the kind of disaster recovery plan the cloud service providing firm has in place. Theft from inside – Employees of cloud service provider department with wrong intentions can creep in and use data if the safety measures are not rebutted. The threat from insider man-made anomalies is the highest in a cloud environment (TaheriMonfared & Jaatun, 2018). Breaches of data – The cloud environment also at times suffer from data breaches. Any kind of breach which becomes successful can lead to huge financial loss, penalties, and customer confidence loss and
  • 5. reputation loss for an organization. Above challenges are faced when business functions are shifter over the cloud environment. Numerous security-related issues in the cloud can arise as the color covers networks, technologies, OS, etc. it is a challenge to keep the enterprise assets secured when total power is not in the hands of the management. It is hence important to trust only reliable and efficient cloud services providers who have robust security protocols implemented.