You are the principal consultant for a community based Charity. The Charity is involved in locating and providing accommodation, mental health services, training and support services to disadvantaged people in the community.
The Charity currently runs a small data centre that has some 50 x86 64 bit servers running mainly Windows Server 2008 R2 for desktop services, database and file services. It also has 10 Red Hat Enterprise Linux 5 servers to service public facing Web pages, Web services and support.
The Charity is considering joining a community cloud provided by a public cloud vendor in order to provide a number of applications to all 500 support staff and administrative users. A small number of the Charity's applications are mission critical and the data that those applications use is both confidential and time sensitive.
The community cloud would also be used to store the Charity's 200TB of data. The data would be held in a SaaS database run by the public cloud vendor. The Charity's data contains a considerable amount of confidential information about the people to whom the Charity provides services.
The Charity collects PII data on the clients who use its services so that it can assist them to manage their different service requirements. This PII data also includes holding some digital identity data for some of the more disadvantaged clients, particularly if they also have mental health issues.
The cloud vendor has made a presentation to management that indicates that operational costs will drop dramatically if the cloud model is adopted. However, the Board of the Charity is concerned with the privacy and security of the data that it holds on the people that it provides services to in the community. It is concerned that a data breach may cause considerable damage to substantially disadvantaged people in the community.
The Board asks that you prepare a report that proposes appropriate privacy and security policies for the Charity's data.
The charity has also decided to:
You have been engaged to provide a risk assessment for the planned moves to SaaS application offerings.
You are to write a report that assesses the risks to the charity for just their planned moves in the HR area:
Community based charity locates and provides training services, support services, mental health services and accommodation to the people suffering from various disadvantages. The community has decided to join a community cloud provided by a public cloud vendor for providing a number of applications to their support staffs as well as administrative users. The data contained in the applications are time sensitive and confidential. The community can also be used for storing the data possessed by charity. A database working on the SaaS model of cloud computing can be used to hold the data. The charity has selected me as their Principal consultant. I am supposed to prepare this report, which would propose the security and privacy policies for the usage of the charity. This report would also contain the risks that charity might face while planning moves in the field of HR.
Cloud computing is of great use to various organizations. The charity has decided to implement SaaS to their operations. SaaS, also known as Software as services allows users to use various applications by accessing internet. These applications are supposed to be cloud-based. SaaS is used on the policy of Pay-as-you-go (Rittinghouse & Ransome, 2016). In this policy, the users only pay for service they use, neither less nor more. Organization rents the service from a local service provider and users utilize them by connecting it by accessing internet. One of the most important advantages provided by SaaS is that it allows the employees of an organization to mobilize their work. They can connect with these applications from any device that has the ability to access internet. Along with providing advantages, SaaS also provide some risks to the organizations. These threats are mentioned below the discussion part of the report.
Risks on employee data in HR database: HR is one of the heads of an organization who has a huge amount of data saved in database. The data is regarding, employees, how employees work, various departments in the organization, number of people needed to be recruited, the recruitment process and many more (Botta, De Donato & Persico, 2016). This data is of much importance to the HR as well as organization. The data in HR database of great importance and should be secured from cyber criminals who might steal the data and use it for bad purposes. Every organization invests a huge lump sum of money to secure the data from criminals but they find some or the other to hack accounts and steal the desired data (Botta, De Donato & Persico, 2016). Securing data in HR database is no easy task. It results in various threats to the organization. These threats are mentioned below.
Risks to employee data on migration to SaaS application: nowadays data security is the main concern of the companies. Most of the organizations move their applications into SaaS and some are still in the run to integrate it to their business (Rao & Selvamani, 2015). Every SaaS provide offers various set of capabilities to secure data. The capabilities are useful to the organization depending on its requirements. The organizations can customize the platform by adding the desired requirement. Integration of business with SaaS provides various advantages to the organization, along with that it also provide some threats to the employee data. The major disadvantage of SaaS is that it connects all the systems together. As a result, if some issue occurs in one part of the system, the whole system breaks down along with the systems connected to it. The charity might lose data while it migrates its system to SaaS. This would not allow the organizations to transfer the sensitive data (Zhang, Chen & Wong, 2017). Most of the service providers assure that the data of the organization would not be lost, but in case it is lost for any reason, they would not be held responsible for it. A proper research has to be carried out by the organization before integrating their systems with SaaS.
Consequences of the risks: data regarding employees might be lost for some reason. This creates a problem for the organization as well as its operation. The consequences of the lost data on organizations are as follows.
Threats on data in HR database: HR database contains huge number of information, which is useful for organization as well as employees. Various risks can be occurred to the employee data present in the HR database. These threats are as follows:
Risks to employee data after migrating to SaaS: migrating the system to SaaS would be very helpful for the charity. Most of the organization has integrated their business with SaaS. SaaS service providers assure that the data would be safe. There are means by which employee data might get lost or stolen. The risks to employee data after migrating to SaaS are in huge number. They are mentioned below
Consequences of the risks: the risks occurred to the employee data would have various consequences on the employees and the organization. These consequences are as follows
Digital identity is very useful for various organizations. It helps in securing the personal data of a user. It helps the user create a fake identity with the help of that identity the user would be able to use various applications without any fear of personal data getting lost (Chang, Benantar & Chang, 2014). The department of organization that deals with financial transactions carried out by users and the company itself attracts the hackers. The actual threat in using digital identity is that it might be hacked similar to the real identity. Identity theft is the major threat imposed by digital identity. Hackers might use a digital identity in order to mislead the digital identity of the user. Phishing is a very common threat among organizations. In this kind of threat, a particular website is attacked and users using that website are invited to log in to the website using their digital identities (Li, Li & Chen, 2015). Data theft is a dangerous threat faced by people using digital identity.
The migration to SaaS can be done without the identified threats by following various steps. These steps are as follows
Some issues of ethics, jurisdiction or data sensitivity should be followed by the charity. They are as follows
From this report, it can be concluded that if the charity integrates cloud computing into its business it would be beneficial for the charity but it would also impose serious threats to the company. Some disadvantages are data theft, security issues, hijacking of employee data, no control over the data and many more. These threats can be prevented by following various steps such as two-step verification process, considering some ethical issues and many more.
Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and challenges. Information sciences, 305, 357-383.
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107.
Baek, J., Vu, Q. H., Liu, J. K., Huang, X., & Xiang, Y. (2015). A secure cloud computing based framework for big data information management of smart grid. IEEE transactions on cloud computing, 3(2), 233-244.
Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud computing and internet of things: a survey. Future Generation Computer Systems, 56, 684-700.
Chang, D. Y., Benantar, M., Chang, J. Y. C., & Venkataramappa, V. (2014). U.S. Patent No. 8,769,622. Washington, DC: U.S. Patent and Trademark Office.
Chang, V., & Ramachandran, M. (2016). Towards achieving data security with the cloud computing adoption framework. IEEE Trans. Services Computing, 9(1), 138-151.
Chang, V., Kuo, Y. H., & Ramachandran, M. (2016). Cloud computing adoption framework: A security framework for business clouds. Future Generation Computer Systems, 57, 24-41.
Inukollu, V. N., Arsi, S., & Ravuri, S. R. (2014). Security issues associated with big data in cloud computing. International Journal of Network Security & Its Applications, 6(3), 45.
Li, J., Li, J., Chen, X., Jia, C., & Lou, W. (2015). Identity-based encryption with outsourced revocation in cloud computing. Ieee Transactions on computers, 64(2), 425-437.
Li, J., Zhang, Y., Chen, X., & Xiang, Y. (2018). Secure attribute-based data sharing for resource-limited users in cloud computing. Computers & Security, 72, 1-12.
Manuel, P. (2015). A trust model of cloud computing based on Quality of Service. Annals of Operations Research, 233(1), 281-292.
Novotny, H. M., DePaul, K. E., Sankalia, A., Nta, P., & Larsen, R. (2015). U.S. Patent No. 9,137,304. Washington, DC: U.S. Patent and Trademark Office.
Oliveira, T., Thomas, M., & Espadanal, M. (2014). Assessing the determinants of cloud computing adoption: An analysis of the manufacturing and services sectors. Information & Management, 51(5), 497-510.
Pasupuleti, S. K., Ramalingam, S., & Buyya, R. (2016). An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing. Journal of Network and Computer Applications, 64, 12-22.
Rao, R. V., & Selvamani, K. (2015). Data security challenges and its solutions in cloud computing. Procedia Computer Science, 48, 204-209.
Rasheed, H. (2014). Data and infrastructure security auditing in cloud computing environments. International Journal of Information Management, 34(3), 364-368.
Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud computing: implementation, management, and security. CRC press.
Samanthula, B. K., Elmehdwi, Y., Howser, G., & Madria, S. (2015). A secure data sharing and query processing framework via federation of cloud computing. Information Systems, 48, 196-212.
Shen, J., Zhou, T., He, D., Zhang, Y., Sun, X., & Xiang, Y. (2017). Block design-based key agreement for group data sharing in cloud computing. IEEE Transactions on Dependable and Secure Computing, (1), 1-1.
Sookhak, M., Gani, A., Talebian, H., Akhunzada, A., Khan, S. U., Buyya, R., & Zomaya, A. Y. (2015). Remote data auditing in cloud computing environments: a survey, taxonomy, and open issues. ACM Computing Surveys (CSUR), 47(4), 65.
Sun, Y., Zhang, J., Xiong, Y., & Zhu, G. (2014). Data security and privacy in cloud computing. International Journal of Distributed Sensor Networks, 10(7), 190903.
Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., & Vasilakos, A. V. (2014). Security and privacy for storage and computation in cloud computing. Information Sciences, 258, 371-386.
Zhang, Y., Chen, X., Li, J., Wong, D. S., Li, H., & You, I. (2017). Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Information Sciences, 379, 42-61.
Zhao, F., Li, C., & Liu, C. F. (2014, February). A cloud computing security solution based on fully homomorphic encryption. In Advanced Communication Technology (ICACT), 2014 16th International Conference on (pp. 485-488). IEEE.
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2021). Cloud Privacy And Security. Retrieved from https://myassignmenthelp.com/free-samples/itc568-cloud-privacy-and-security/moves-to-saas-application-in-the-hr-area.html.
"Cloud Privacy And Security." My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/itc568-cloud-privacy-and-security/moves-to-saas-application-in-the-hr-area.html.
My Assignment Help (2021) Cloud Privacy And Security [Online]. Available from: https://myassignmenthelp.com/free-samples/itc568-cloud-privacy-and-security/moves-to-saas-application-in-the-hr-area.html
[Accessed 18 April 2021].
My Assignment Help. 'Cloud Privacy And Security' (My Assignment Help, 2021) <https://myassignmenthelp.com/free-samples/itc568-cloud-privacy-and-security/moves-to-saas-application-in-the-hr-area.html> accessed 18 April 2021.
My Assignment Help. Cloud Privacy And Security [Internet]. My Assignment Help. 2021 [cited 18 April 2021]. Available from: https://myassignmenthelp.com/free-samples/itc568-cloud-privacy-and-security/moves-to-saas-application-in-the-hr-area.html.
Are you aware of the enchantment that you can cast upon your professors with just exciting topics? Selecting expository essay topics or research paper topics is not an easy task. You need to conduct extensive research in order to choose a compelling topic that is relatively less known to people. Moreover, good research paper should have a wide scope of investigation options so that you can provide validations. Experts at MyAssignmenthelp.com provide valuable insight into choosing interesting topics to write about. Years of experience have provided them with the efficiency of retrieving the necessary details to make an offbeat topic stand out.
Answer: Introduction In this modern era, the use of mobile communication and advanced networking is growing rapidly and many consumers are using this technology to transfer data or information from one person to another. The aim of this report is to review the journal article in the field of advanced networking and communication system and understand the views of different researchers. Wireless is an advanced communication technology which is...
Read MoreAnswer: Introduction: Patterns in the program design and in system development are very much important for the present time. Application of the patterns was first used for designing the programs. Now, the patterns are used in the data analysis, system architecture and project management (Bonfè, Fantuzzi and Secchi 2013). Patterns are a part of the Unified Modeling Language which is a commonly occurring reusable piece which can pro...
Read MoreAnswer: Introduction The internet is an open platform which allows its users to share their ideas and content on the platform. Due to its openness and independence, the amount of content shared on the internet is substantial which also include explicit content that is not beneficial for the society (Curran, Fenton & Freedman, 2016). It raises the significance of internet censorship to govern data sharing on the internet in order to ensure...
Read MoreAnswer: Introduction: A file system refers to the different methods as well as the structures of data that are used by the operating system in order to monitor the files and keep a track of the data on a disk partition. It defines the way in which the data and the files a restored on a disk partition[1]. A file system can also be defined as the partition or a disk that is required to store the files of a particular file system. In every ...
Read MoreAnswer: A performance evaluation. EURASIP Journal on Wireless Communications and Networking, 2014(1), p.89. The title of this journal paper is LTE and IEEE 802.11p for vehicular networking: a performance evaluation that was written by Zeeshan Hameed Mir and Fethi Filali in the year 2014. The main objective of this journal is to describe the con concept of LTE and IEE 802.11 and evaluate their performance. In this modern era informa...
Read MoreJust share requirement and get customized Solution.
Orders
Overall Rating
Experts
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat. If you are unable to calculate word count online, ask our customer executives.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
I got a very high mark and I am satisfied with the service provided this time. Thank you!
Australia
It was great. The paper got the details and the information I needed. It was good effort.
Australia
It was good. The assignment provided good details and I got the information I needed.
Australia
GOOD! The tutor is professional, responsible and patient. The reply was timely...................
Australia