Chat with us, powered by LiveChat Case Study: Mitigating Cloud Computing Risks Imag - Writemia

Case Study: Mitigating Cloud Computing Risks Imag

Case Study: Mitigating Cloud Computing Risks Imagine you are an Information Security Manager in a medium-sized organization. Your CIO has asked you to prepare a case analysis report and presentation on establishing internal controls in cloud computing. The CIO has seen several resources online which discuss the security risks related to Cloud based computing and storage. One that stood out was located at http://www.isaca.org/Journal/Past-Issues/2011/Volume-4/Pages/Cloud-Computing-Risk-Assessment-A-Case-Study.aspx. You are being asked to summarize the information you can find on the Internet and other sources that are available. Moving forward, the CIO wants to have a firm grasp of the benefits and risks associated with public, private, and hybrid cloud usage. There is also concern over how these systems, if they were in place, should be monitored to ensure not only proper usage, but also that none of these systems or their data have been compromised. Write a three to four (3-4) page paper in which you: Provide a summary analysis of the most recent research that is available in this area.Examine the risks and vulnerabilities associated with public clouds, private clouds, and hybrids. Include primary examples applicable from the case studies you previously reviewed. Suggest key controls that organizations could implement to mitigate these risks and vulnerabilities.Develop a list of IT audit tasks that address a cloud computing environment based on the results from the analysis of the case studies, the risks and vulnerabilities, and the mitigation controls.Use at least four (4) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA. Check with your professor for any additional instructions.Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: Describe the process of performing effective information technology audits and general controls.Describe the various general controls and audit approaches for software and architecture to include operating systems, telecommunication networks, cloud computing, service-oriented architecture and virtualization.Use technology and information resources to research issues in information technology audit and control.Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric. Points: 125 Case Study 1:Mitigating Cloud Computing Risks Criteria Unacceptable Below 70% F Fair 70-79% C Proficient 80-89% B Exemplary 90-100% A 1. Provide a summary analysis of the most recent research that is available in this area. Weight: 20% Did not submit or incompletely provideda summary analysis of the most recent research that is available in this area. Partially provided a summary analysis of the most recent research that is available in this area. Satisfactorily provided a summary analysis of the most recent research that is available in this area. Thoroughly provided a summary analysis of the most recent research that is available in this area. 2. Examine the risks and vulnerabilities associated with public clouds, private clouds, and hybrids; include primary examples applicable from the case studies you previously reviewed. Weight: 25% Did not submit or incompletely examined the risks and vulnerabilities associated with public clouds, private clouds, and hybrids; did not submit or incompletely included primary examples applicable from the case studies you previously reviewed. Partially examined the risks and vulnerabilities associated with public clouds, private clouds, and hybrids; partially included primary examples applicable from the case studies you previously reviewed. Satisfactorily examined the risks and vulnerabilities associated with public clouds, private clouds, and hybrids; satisfactorily included primary examples applicable from the case studies you previously reviewed. Thoroughly examined the risks and vulnerabilities associated with public clouds, private clouds, and hybrids; thoroughly included primary examples applicable from the case studies you previously reviewed. 3. Suggest key controls that organizations could implement to mitigate these risks and vulnerabilities. Weight: 20% Did not submit or incompletely suggested key controls that organizations could implement to mitigate these risks and vulnerabilities. Partially suggested key controls that organizations could implement to mitigate these risks and vulnerabilities. Satisfactorily suggested key controls that organizations could implement to mitigate these risks and vulnerabilities. Thoroughly suggested key controls that organizations could implement to mitigate these risks and vulnerabilities. 4. Develop a list of IT audit tasks that address a cloud computing environment based on the results from the analysis of the case studies, the risks and vulnerabilities, and the mitigation controls. Weight: 20% Did not submit or incompletely developed a list of IT audit tasks that address a cloud computing environment based on the results from the analysis of the case studies, the risks and vulnerabilities, and the mitigation controls. Partially developed a list of IT audit tasks that address a cloud computing environment based on the results from the analysis of the case studies, the risks and vulnerabilities, and the mitigation controls. Satisfactorily developed a list of IT audit tasks that address a cloud computing environment based on the results from the analysis of the case studies, the risks and vulnerabilities, and the mitigation controls. Thoroughly developed a list of IT audit tasks that address a cloud computing environment based on the results from the analysis of the case studies, the risks and vulnerabilities, and the mitigation controls. 5. 3 references Weight: 5% No references provided Does not meet the required number of references; some or all references poor quality choices. Meets number of required references; all references high quality choices. Exceeds number of required references; all references high quality choices. 6. Clarity, writing mechanics, and formatting requirements Weight: 10% More than 6 errors present 5-6 errors present 3-4 errors present 0-2 errors present

Do you need an answer to this or any other questions?

About Writemia

We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.

How It Works

To make an Order you only need to click on “Place Order” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Are there Discounts?

All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.

Hire a tutor today CLICK HERE to make your first order