Security Threats to Cloud–Based Systems

Security Threats to Cloud–Based Systems Threats to both cloud-based and on-site solutions should be evaluated with an additional focus directed towards security issues specific to cloud services. Cloud security threats can come from internal or external sources, and can originate as human or software based attacks. Threat agents are as follows; anonymous attackers, malicious service agents, trusted attackers,… Read More »

Greg Palmer

Virtualization of IT Resources. Advantages & Disadvantages

Virtualization of IT resources Virtualization of IT resources has become a popular the past few years but has been around in some form for many years. Example;  thirty years ago IBM had virtual operating systems that allowed multiple copies of an operating system to run simultaneously on mainframe computers. Virtualization is the use of hardware and software to… Read More »

Greg Palmer

IDaaS, Cloud Data Storage, and Cloud Collaboration

IDaaS, Cloud Data Storage, and Cloud Collaboration The emergence of wide-spread Internet access combined with the development of cloud based infrastructure, platform, and Software as a Service (SaaS), has created an environment where organizations and normal everyday users have access to vast amounts of computing resources and applications at the click of a button. These cloud resources are… Read More »

Greg Palmer

Cloud Computing Models -SaaS, PaaS, IaaS

Cloud Computing Models -SaaS, PaaS, IaaS Software as a Service (SaaS) SaaS is a cloud model in which users access software, programs, and data in the cloud. SaaS services are commonly accessed with a web browser. SaaS allows organizations an affordable way to access a wide variety of applications while eliminating the requirement for in-house hosted applications, hosting… Read More »

Greg Palmer

The Cloud Paradigm and its Effect on Computing

The Cloud Paradigm and its Effect on Computing The NIST SP 800-145 states that cloud computing is a model for “enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources” (Grance, & Mell, 2011, pg.2). Combined with wide expansion of the internet, this concept has created a paradigm where computer resources and applications can… Read More »

Greg Palmer

Cloud Computing Model – Benefits and Disadvantages

Cloud Computing Model, Benefits and Disadvantages The NIST SP 800-145 states that cloud computing is a model for “enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources”. These resources include networks, servers, storage, applications, and services that can be quickly configured and deployed with minimal management or service provider actions. The cloud model… Read More »

Greg Palmer

Cloud Computing and System Fault Tolerance

Cloud Computing and System Fault Tolerance Cloud computing use has risen in direct correlation with the development of web 2.0 technologies, as well as the development and increased availability of high-speed communications infrastructure and internet access. Well known advantages of cloud computing include; cost savings, reliability, manageability, and competitive edge (Levelcloud.net, n.d.). One aspect of cloud computing related… Read More »

Greg Palmer

Risk management is essential to the success of every company

Risk management is essential to the success of every company In business, risk is the likelihood that a loss will occur if a threat exposes a vulnerability. An organization must take risks to thrive, but must also recognize that risk cannot be ignored. The key is to understand threats and vulnerabilities, and then mitigate the threat to vulnerabilities… Read More »

Greg Palmer

Certified Information Systems Security Professional (CISSP)

 ISC2 CISSP Certification Requirements ISC2 CISSP provides the following requirements and recommendations to earn and maintain  a Certified Information Systems Security Professional (CISSP) certification. Candidates must have a minimum of 5 years cumulative paid full-time work experience in two or more of the 8 domains of the (ISC)2 CISSP CBK. Candidates may receive a one year experience waiver… Read More »

Greg Palmer

Ethics Related to the Collection of Information. Who Benefits?

Ethics Related to the Collection of Information The following are ethics that must be addressed when information systems are designed, and how they relate to the Confidentiality, Integrity, Availability (CIA) security concept. The first concern related to ethics is; who benefits from the information collected? The applicable area of the CIA security triad is confidentiality. Information collected for… Read More »

Greg Palmer