Cloud Computing: Key IT-Related Risks and Mitigation Strategies for Consideration by IT Security Practitioners
dc.contributor.author | Betcher, Thomas J. | |
dc.date.accessioned | 2010-02-24T19:12:54Z | |
dc.date.available | 2010-02-24T19:12:54Z | |
dc.date.issued | 2010-02-24T19:12:54Z | |
dc.description | This paper was completed as part of the final research component in the University of Oregon Applied Information Management Master's Degree Program [see htpp://aim.uoregon.edu]. | en_US |
dc.description.abstract | Although the benefits of cloud computing are well known, safety concerns have received less attention (Rash, 2009). This review of selected literature, published between 2007 and 2009, identifies key IT-related cloud computing risks that should be considered by security practitioners. Three types of cloud computing risks are examined: policy and organizational, technical, and legal. Risk mitigation strategies are also explored, and include audit controls, policies and procedures, service level agreements, and other forms of governance. | en_US |
dc.identifier.uri | https://hdl.handle.net/1794/10207 | |
dc.language.iso | en_US | en_US |
dc.relation.ispartofseries | AIM Capstone 2010;Thomas J. Betcher | |
dc.subject | Cloud computing | |
dc.subject | Security risk mitigation | |
dc.subject | Audit controls | |
dc.subject | Applied Information Management | |
dc.subject | AIM | |
dc.subject | Data | |
dc.title | Cloud Computing: Key IT-Related Risks and Mitigation Strategies for Consideration by IT Security Practitioners | en_US |
dc.type | Other | en_US |