Introduction
The organisations are adopting the cloud technology to facilitate their business operations. There are challenges which the incident handlers must adapt while moving to the cloud environment. The report will highlight all the challenges that must be analysed.
The challenges that incident handlers face in identifying incidents when resources have been moved to a cloud environment
It is the duty of the incident handler of an organization to look after the organisations’ security issues. The incident handlers generally assess the cyber attacks that invade the network and put one organisation’s security at stake (Latif et al., 2014). The incident handler manages security incidents when any organisation faces any kind of security issues. The incident handlers understand the attack techniques, vectors and the tools.
When any organization move their assets to the cloud the organization and the incident handlers face various kinds of threats and challenges. The legal and regulatory issues and the broken down of perimeter security model are the challenges the organization faces. The data loss, the account hijacking, the service and traffic hijacking are the other challenges that the incident handlers face. The malicious insiders hack one’s system and install a virus, in this way the intruders steal important information from the cloud database (Oliveira, Thomas & Espadanal, 2014). Thus the malicious intruders can be a serious challenge for the incident handlers.
The organisation while moving resources to the cloud must be knowledgeable about how the cloud computing transmits data and manages data. The incident handlers must act actively and should acknowledge them about the security implications otherwise they can face security breaches. The cloud vendors’ internal security structure must be strongly built upon and must be secured otherwise that can prove to be a threat to the enterprise. The incident handler may face challenges if the cloud vendors’ internal structure is weak. The incident handlers will have to consider the legal implications while moving resources to the cloud (Chang, Walters & Wills, 2016). The incident handlers will have to look at the confidentiality, availability and confidentiality of the organisation data, if those data gets compromised, the organisation can face heavy loss. The incident handlers will also to have to consider the customers’ assets and data well. The incident handlers must safeguard the customer data, the customers’ computing devices and the customer applications.
Adopting the cloud computing, the organization may face any kind of disaster due to the cyber attacks, the incidents handler may face challenges due to this and so they must prepare a disaster plan ready (Avram, 2014). The incident handlers may face issues while applying encryption schemes to the organisation's data. Thus the incident handlers must segregate the organisations’ in an efficient manner. The data loss or data leakage can be disastrous for the organisations, so the incident handlers must be ready so that they can acquire the lost data.
Conclusion
It can be concluded from the above discourse that there are various challenges the organisation can face as a result of adopting cloud technology and the incident handlers must assess this and must take actions accordingly. The challenges related to security has been discussed in the report.
References
Avram, M. G. (2014). Advantages and challenges of adopting cloud computing from an enterprise perspective. Procedia Technology, 12, 529-534.
Available at: https://www.sciencedirect.com/science/article/pii/S221201731300710X
Chang, V., Walters, R. J., & Wills, G. B. (2016). Organisational sustainability modelling—An emerging service and analytics model for evaluating Cloud Computing adoption with two case studies. International Journal of Information Management, 36(1), 167-179.
Available at: https://eprints.soton.ac.uk/381770/1/VC_ijim_osm_case_studies_accepted.pdf
Latif, R., Abbas, H., Assar, S., & Ali, Q. (2014). Cloud computing risk assessment: a systematic literature review. In Future Information Technology (pp. 285-295). Springer, Berlin, Heidelberg.
Available at: https://www.researchgate.net/profile/Haider_Abbas8/publication/259221049_Cloud_Computing_Risk_Assessment_A_Systematic_Literature_Review/links/0a85e53328b478e2cb000000/Cloud-Computing-Risk-Assessment-A-Systematic-Literature-Review.pdf
Oliveira, T., Thomas, M., & Espadanal, M. (2014). Assessing the determinants of cloud computing adoption: An analysis of the manufacturing and services sectors. Information & Management, 51(5), 497-510.
Available at: https://s3.amazonaws.com/academia.edu.documents/39509432/Assessing_the_determinants_of_cloud_comp20151028-21449-1g8z4nk.pdf?AWSAccessKeyId=AKIAIWOWYYGZ2Y53UL3A&Expires=1510987437&Signature=sTg2alzdRr%2B39R3i016ab%2F3fYBM%3D&response-content-disposition=inline%3B%20filename%3DAssessing_the_determinants_of_cloud_comp.pdf