Cloud Computing: Key IT-Related Risks and Mitigation Strategies for Consideration by IT Security Practitioners

dc.contributor.authorBetcher, Thomas J.
dc.date.accessioned2010-02-24T19:12:54Z
dc.date.available2010-02-24T19:12:54Z
dc.date.issued2010-02-24T19:12:54Z
dc.descriptionThis paper was completed as part of the final research component in the University of Oregon Applied Information Management Master's Degree Program [see htpp://aim.uoregon.edu].en_US
dc.description.abstractAlthough the benefits of cloud computing are well known, safety concerns have received less attention (Rash, 2009). This review of selected literature, published between 2007 and 2009, identifies key IT-related cloud computing risks that should be considered by security practitioners. Three types of cloud computing risks are examined: policy and organizational, technical, and legal. Risk mitigation strategies are also explored, and include audit controls, policies and procedures, service level agreements, and other forms of governance.en_US
dc.identifier.urihttps://hdl.handle.net/1794/10207
dc.language.isoen_USen_US
dc.relation.ispartofseriesAIM Capstone 2010;Thomas J. Betcher
dc.subjectCloud computing
dc.subjectSecurity risk mitigation
dc.subjectAudit controls
dc.subjectApplied Information Management
dc.subjectAIM
dc.subjectData
dc.titleCloud Computing: Key IT-Related Risks and Mitigation Strategies for Consideration by IT Security Practitionersen_US
dc.typeOtheren_US

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Betcher-2010.pdf
Size:
533.91 KB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
Name:
license.txt
Size:
2.21 KB
Format:
Item-specific license agreed upon to submission
Description: