$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

Characterization Of Security Threats In Cloud Computing

tag 0 Download8 Pages / 1,940 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT
Discuss about the Characterization Of Security Threats In Cloud Computing.




For the cyberspace, there is a significant increase in the feature of information-age today. Data breaches are growing continuously in many organization and the current IS Manager could understand this problem and are able to get into the area to which the concern is growing rapidly for the senior IT Manager. Data breaches has now become an everyday issue for most of the organization. Several literature were review for this particular article to understand the most current security data breaches that has taken place in an organization. In the report two current data breaches has been critically identified, analyzed, evaluated and argued for the aspects of IS Management.  

Key issues face by IS Managers in the Organization

According to Liu et al. (2015, pp. 1009-1024) the issues that the IS Mangers of the organization were facing are mainly associated with the cloud computing. The challenges that they were facing was numerous. This issues were discussed below:

Data Segregation: The process of sharing in cloud computing makes it easy for the client to make the data available from one client to the other. The data therefore can be easily accessible to more than one client.

Data Location: The condition of the cloud computing indicates that the client could be ignore for the cloud that have information in the storage area.

Recovery: The cloud provider generally utilizes the data farm or the server were customer information are put away which usually get flopped and get disappointed by the catastrophes or the framework. Here the cloud provider takes the responsibility to advice the information of the customer status.

Regulatory Compliance: For the cloud systems and the processes, some internal audit was performed by the cloud provider. However, the process through external audit was never permitted. The cloud provider later drops the process of installing some new certificates of the security to the network.

Privileged the access from the user: When the unauthorized user could access client information that are most confidential then it became important that a new membership has been acquired by the client which could easily verify the unauthorized access. If this could not be accessed then it increase the leakage of information. The data owner have full rights to store data. Only those users that have certain privilege or the right to access the data can get this rights.

Investigation Support: The concern with the unlawful access could request exactly about the information of the customer which is troublesome in the cloud computing. The access that was unapproved could be finish either by the external client or the internal client.


Familiarity with research in the area of IS Management 

In one of the literature, Mello (2018) has provided classification of data breaches in various place over the world. As per the research 75 % of the data breaches has come from the external parties. The data breaches had fraud detection which were either discovered by third parties or by the agencies of law enforcement. Islam, Manivannan & Zeadally (2016, 7(1)) has focused on the problem in security that could protest against the data breaches. There are types of security breaches that are found to drive abnormal returns. It has unauthorized access to confidential data. Study shows incident that has privacy and negative impact could keep the value of the market low. There are no confidential information that are involve in breaching the data. The result of Ramachandran & Chang, (2016, pp.618-625) suggest that the breaching of data leads to litigation. The laws of disclosing the data breaches could reduce the identity theft. It does not mitigate the data breach which may lead to long-term impacts.

Conversely, most of the firms needs valuable assets for information which they could get through breaching the data. Across various discipline the information gets vary and handle the data personally. If intrusion is without the theft of data, then the data could be viewed by the intruder as no damage or modification is possible by the intruder. The intruder cannot steal the data were identifying the intrusion attack is difficult. If intrusion is with the theft of the data were damage could be serious and get the system access.

Development of Critical thinking skills 

Identify the aspects of IS Management 

None of the organization would like to have a tough time for disclosing data breaches. The company have faced both long-term and immediate consequences along with its customers. The value and reputation of the company get damage, fines in potential regulatory, recompense of victim and lawsuits. The experience could be very painful who either get involved or affected. The data breach source are if shared to other organization then they will make sure that such similarity does not occur to them again. The most recent data breaches that had been identified in the organization like Orbit and Panera are discussed below:

Data Breaches in Orbit: The incident took place in the month of March 1st were some unauthorized user able to access the platforms of legacy travel booking. The fare service aggregator of the travel believes that permissions were available for the attacker as they could view some sensitive and confidential information in which they include the name of the customer, phone number, billing addresses, date of birth, gender, email addresses and information of the payment card. The incident had no evidence for the exposer of Social Security Numbers, customers’ passport and travel itineraries. In the month of October 1st, 2017 till December 22nd, 2017 around 880,000 details of the breach get exposed form the customers’ payment cards. The incident made them realize that they need to replace the outdated system and software legacy. The security risk could significantly present especially there is no support and when they do not receive the latest patches and updates of the security. Funding was provided for the legacy systems that could replace and point out the system with hidden dangers and it put a risk on the dollar amount. With every 1 % of spending, the legacy systems could be maintaining by the organization shift that could get the new system. There would be 5% reduction in the security incidents.

Data Breaches in Panera: The incident took place in the month of April 2nd, in which Brain Krebs reveal that the website of Panera Bread Chain for the restaurants had a flaw. Dylan Houlihan, the security researcher discussed about the issue it has leaked the data in the form of plaintext of the customers who had created an account to make purchase by once sign up with the website (Bisson 2018). Later they can anytime purchase online food items by using the website of From the website they could expose all the information from the name of the customers’, date of birth, physical and email addresses, and the details of the payment cards that contain the last four digits. The company later insinuated that the actual scammer was Houlihan who was the team members of Panera’s security. He took the vulnerability and did nothing for eight months. With further investigation Krebs could not patched the flaw and it could affect 37 million customers. From the breaches of the Panera Bread’s website, the value for regular penetration tests was conducted for the web-based assets. The bugs could disclose frameworks of the vulnerability that also include disclosing the bugs. This indicate that security is very much important for the organization as it contain the information of the customers and strengthen the work of the external researchers.


Analyse the aspects of IS Management

In an article the annual dataset were analysed that have strived to identify the public, private, large, small, international, domestic which could engage the external collaboration. Over the year the number of contributor increases and every year changes have been realized. The area of focus is difficult to identify as changes were seen in the contributors that focus on difficulties and identify the trends over time. There are several component of the data breaches that leverage the actions and has a closer look on the specific results were dataset are included. Data breaches are still their behind the threat actor. The internal actor has a steady percentage as shown in the figure. The variance is shown in the last two years and the breaches were removed by taking down the botnet associated with it.

Evaluate the aspects of IS Management

The notification of security breaches is related to transparency of the challenges face by the organization. This improve the efficacy that are develop by the environmental laws. The field of data protection is important for the public that could breach the data immediately from the individual. There are ethical and legal obligation that explains the internal and external implementation of stakeholders. The organization accountability could be enhancing by improving the respond time, incidents and the security risks. The notification of data breach has negative impact on the loyalty of the customer. Rao & Selvamani (2015, pp.204-209) report that the breaches in the security of data involve information of the credit card. For an organization, notification becomes costlier as there is a need to give service to the customer along with the operations. Moreover, the notification for the data breach could cause risk mitigation and result into an organization that could mitigate the own expected cost of the organization.


Argue the aspects of IS Management

A data breach is taken as an incident that could risk about the potential data which results in preliminary analysis. The medical and educational organizations have intrusions that could target with malicious activity. There is a requirement of extensive update about the employees that could provide the training on handling the data when any kind of mistake occur. Possibility over here is that mistakes can be happen at any time. And eventually it could get corrected one by one. The breaching in the data could increase a system hack, mishandling of papers, devices that are portable. The system could breach the notification law which is for shorter durations which could enact the notification of the legislation and the government officials. The risk could get mitigated by the organization and could briefly mention that the breaches could result in damaging the reputation, stolen of the credit cards and loss in the values of the firm are the countermeasure against the data threats of the future credit card.



From the study that has been done on different literature, the result of the data breaches that has been identified, analyzed, evaluated and argued provide a better understanding about the unexpected attack from the data breaches. The report also has provided with some familiarity in the research area that could provide the IS Management information. From the study in it clear that the notification of data breach could provide a security awareness about the organization. The evaluation is performed in a better manner about the security risk.



Bisson, D. (2018). 6 Big Data Breaches in 5 Weeks, 4 Critical Security Lessons Learned. [online] Available at: [Accessed 18 Aug. 2018].

Islam, T., Manivannan, D. & Zeadally, S., 2016. A classification and characterization of security threats in cloud computing. Int. J. Next-Gener. Comput, 7(1).

Liu, Y., Sarabi, A., Zhang, J., Naghizadeh, P., Karir, M., Bailey, M. & Liu, M., 2015, August. Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents. In USENIX Security Symposium (pp. 1009-1024).

Mello, S., 2018. Data Breaches in Higher Education Institutions.

Ramachandran, M. & Chang, V., 2016. Towards performance evaluation of cloud service providers for cloud data security. International Journal of Information Management, 36(4), pp.618-625.

Download Sample

Get 100% money back after download, simply upload your unique content* of similar no. of pages or more. We verify your content and once successfully verified 100% value credited to your wallet within 7 days.

Upload Unique Document

Document Under Evaluation

Get Credits into Your Wallet

*The content must not be available online or in our existing Database to qualify as unique.

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2019). Characterization Of Security Threats In Cloud Computing. Retrieved from

"Characterization Of Security Threats In Cloud Computing." My Assignment Help, 2019,

My Assignment Help (2019) Characterization Of Security Threats In Cloud Computing [Online]. Available from:
[Accessed 05 July 2020].

My Assignment Help. 'Characterization Of Security Threats In Cloud Computing' (My Assignment Help, 2019) <> accessed 05 July 2020.

My Assignment Help. Characterization Of Security Threats In Cloud Computing [Internet]. My Assignment Help. 2019 [cited 05 July 2020]. Available from: makes buy assignments online easier for students in Melbourne, Brisbane, Adelaide, Perth, Sydney. Students can get highest quality Assignment Help in Brisbane, Perth, Sydney and other cities of Australia only by completing three steps. Students only need to convey their requirements and our experts craft the assignment in an exact manner that our customers want. In case, they need CDR writing services, they can hire our professional CDR writers for strengthening their chances against other applicants.

Latest Networking Samples

CO4509 Computer Security Assignment

Download : 0 | Pages : 14
  • Course Code: CO4509
  • University: University Of Central Lancashire
  • Country: United Kingdom

Answer: Introduction: Computer security is a major concern for every organisation and most importantly to safe guard the data stored on the system from any loss. It is important to secure the information from data loss or inception of viruses or malware in the system. Security completely deals with securing the data stored on the network from any unauthorized loss. Every organisation is dependent on computer for performing certain tasks thus ...

Read More arrow

HS1011 Data Communication And Networks Methodology

Download : 0 | Pages : 5
  • Course Code: HS1011
  • University: Victoria University
  • Country: Australia

Answer: Introduction The given three scenario are analyzed for the selection of the network management tool. With the increase in the complexity of the network it is crucial to select a robust network monitoring solution and thus the Manage Engine network monitoring tool is selected for analyzing the data flow in the network. It can be used for monitoring the network activities and get the status of each of the network devices connected with ...

Read More arrow

CS2S562 Secure Software Development

Download : 0 | Pages : 2

Answer: Introduction: Internet of things is simply network of  any physical computing devices. The IoT devices are used literary in day to day activities. So many devices are constructed emulating the internet of things.  Since there are so many devices of internet of things, i simulated a home automation system using C sharp programming language, visual studio 2015 IDE. From the requirement of the console system application of th...

Read More arrow

COIT20261 Network Routing And Switching 2

Download : 0 | Pages : 4

Answer: A 1: a)                           b)                   c)   Here /27 is the subnet mask, ie)   Binary Format of Given Address is,         --->10011010.01001110.10110001.000 00011   2...

Read More arrow

CI7130 Network And Information Security

Download : 0 | Pages : 13
  • Course Code: CI7130
  • University: Kingston University London
  • Country: United Kingdom

Answer: Introduction: The aim of this report is to address the issues and challenges being faced by the AO world plc organization considering the last IT installation and the operations involved within the activities of the organization. Since the organization is based on online services, it has become a considerable factor for addressing the vulnerabilities related to the challenges and issues in the security of the network. The organization...

Read More arrow

Save Time & improve Grade

Just share Requriment and get customize Solution.

We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits




Overall Rating



Our Amazing Features


On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.


Plagiarism Free Work

Using reliable plagiarism detection software, only provide customized 100 percent original papers.


24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.


Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.


Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

134 Order Completed

95% Response Time

Thomas Nelson

MS in Information Systems Technology with Specialization in Database Administration

New Jersey, United States

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

1592 Order Completed

96% Response Time

Jane Sima

Ph.D in Psychology with Specialization in Industrial-Organizational Psychology

Singapore, Singapore

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 4/5

248 Order Completed

100% Response Time

Lloyd Bernabe

MSc in Accounting

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

154 Order Completed

97% Response Time

Harold Alderete

PhD in Economics

London, United Kingdom

Hire Me

FREE Tools


Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.


Essay Typer

Get different kinds of essays typed in minutes with clicks.


GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.


Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.


Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability




Your Approx Earning

Live Review

Our Mission Client Satisfaction

Quick turn-around. Easy to understand. All requirements covered. I will be using MAH again!


User Id: 383727 - 04 Jul 2020


student rating student rating student rating student rating student rating

Fast rectification and minor grammar editing needed. Thank you for the help again I knew I could count on you guys. The report was delivered wayyyy before deadline and I\'m so pleased with the work. I only have to submit it on the 29 so I have more t...


User Id: 310628 - 04 Jul 2020


student rating student rating student rating student rating student rating

I received a high quality summary of a long document containing many interviews I conducted. The expert has succeeded in capturing the ideas in the interviews in a concise summary.


User Id: 400556 - 04 Jul 2020


student rating student rating student rating student rating student rating

The essay is well-written and it answered the question fully. Not much editing has to be done after receiving the solution.


User Id: 228634 - 04 Jul 2020


student rating student rating student rating student rating student rating
callback request mobile
Have any Query?