Get personal help with your studies from any of the 45,000 experienced experts on Studybay

  • No intermediaries
  • No plagiarism
  • Any Subject
  • Always on time

Here’s an example of project completed by our experts:

Mitigating Cloud Computing Risks (Example)

Document Preview:

INTERNAL CONTROLS IN CLOUD COMPUTING Name Institution Instructor Course Date Internal Controls in Cloud Computing Introduction Cloud computing refers to the use of virtual web resources which are utilized by developers to make the use of web systems simpler and cheaper. Cloud computing cuts down on the cost of processors and disk space by making it possible for payment of only the resources used (Jamsa 2013).Internal control refers to the process of instilling accountability and integrity in an organization’s management structure. Internal control promotes responsible accounting ethics which in turn increases an organization’s efficiency and effectiveness. Therefore Internal control in cloud computing is implementation of a set of standards aimed at protecting the interests of both the service provider and the consumer of the virtual web services. Cloud computing is very useful in that it requires little management and the resources are made available to the user when they Identity management Information media Sensitive data exchange Data integrity Security requirement for data management Logical trespassing security evaluation observation and checking Contractual compliance Positive assurance of compliance References Alani M. M. (2016). Elements of cloud computing security: A survey of key practicalities. Switzerland : Springer Cloud Computing Risk Assessment: A Case Study. (2017). Isaca.org. Retrieved 8 August 2017 from www.isaca.org Hoyle D. (2017). ISO 9000 Quality Systems Handbook-Updated for the ISO 9001: 2015 Standard: Increasing the Quality of an Organization's Outputs. Taylor & Francis. Information Systems Audit and Control Association. (2011). IT control objectives for cloud computing: Controls and assurance in the cloud. Rolling Meadows IL: ISACA. Jamsa K. (2013). Cloud computing: SaaS PaaS IaaS virtualization business models mobile security and more. Burlington MA: Jones & Bartlett Learning Kudriashov D. & Montes K. (2015). Mastering Next Generation IT: Executive Guide to Enterprise Technology Transformation & the Business of Cloud Services. BookBaby. [...]

Order Description:

• Imagine you are an Information Security Manager in a medium-sized organization. Your CIO has asked you to prepare a case analysis report and presentation on establishing internal controls in cloud computing. The CIO has seen several resources online which discuss the security risks related to Cloud based computing and storage. One that stood out was located at www.isaca.org You are being asked to summarize the information you can find on the Internet and other sources that are available. Moving forward, the CIO wants to have a firm grasp of the benefits and risks associated with public, private, and hybrid cloud usage. There is also concern over how these systems, if they were in place, should be monitored to ensure not only proper usage, but also that none of these systems or their data have been compromised. Write a three to four (4-5) page paper in which you: 1. Provide a summary analysis of the most recent research that is available in this area. 2. Examine the risks and vulnerabilities associated with public clouds, private clouds, and hybrids. Include primary examples applicable from the case studies you previously reviewed. 3. Suggest key controls that organizations could implement to mitigate these risks and vulnerabilities. 4. Develop a list of IT audit tasks that address a cloud computing environment based on the results from the analysis of the case studies, the risks and vulnerabilities, and the mitigation controls. 5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: • Describe the process of performing effective information technology audits and general controls. • Describe the various general controls and audit approaches for software and architecture to include operating systems, telecommunication networks, cloud computing, service-oriented architecture and virtualization. • Use technology and information resources to research issues in information technology audit and control. • Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions

Subject Area: Information Technology

Document Type: Dissertation

This project has already been completed by one of the Studybay experts. The client rated this project:

Project's rating is 5/5

Price $25

Words 825

Pages 3

Completed in 7 days

Expert ROGERS KIMATHI

Client Review

work was well done

Positive
08.09.2017

Similar projects

Subject of the project is Information Technology   Type of the project is Dissertation

IT Management Case Study

Subject of the project is Information Technology   Type of the project is Dissertation

Mister Network Engineer

Subject of the project is Information Technology   Type of the project is Dissertation

System recommendation report

Need Help With a Project on This or Another Topic?

Cooperate with seasoned experts directly — create your project now and start getting help in 2 minutes.

Studybay top experts

Reviews from Studybay Community

  • Our Studybay rating is:
    4.9
  • Our ReviewCentre rating is:
    4.8
  • Our SiteJabber rating is:
    4.5