0% found this document useful (0 votes)
82 views

Running Head: CLOUD COMPUTING 1

This document discusses challenges faced by incident handlers in cloud computing environments. It notes that in cloud computing, resources are shared publicly between many customers, making it difficult for incident handlers to identify the source of issues. Specifically, it is challenging for incident handlers to identify relevant data sources, determine the location of lost data for customer resources/systems, and deal with issues related to virtual machine images and network applications without full knowledge of the underlying operating systems. The document provides references on cloud computing, security incident responses, and applications of case-based reasoning for IT security incidents.

Uploaded by

Vinay Wadhwa
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
82 views

Running Head: CLOUD COMPUTING 1

This document discusses challenges faced by incident handlers in cloud computing environments. It notes that in cloud computing, resources are shared publicly between many customers, making it difficult for incident handlers to identify the source of issues. Specifically, it is challenging for incident handlers to identify relevant data sources, determine the location of lost data for customer resources/systems, and deal with issues related to virtual machine images and network applications without full knowledge of the underlying operating systems. The document provides references on cloud computing, security incident responses, and applications of case-based reasoning for IT security incidents.

Uploaded by

Vinay Wadhwa
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Running head: CLOUD COMPUTING 1

Cloud Computing

Student Name

Course Name

April 9, 2019
CLOUD COMPUTING 2

Cloud Computing

“The cloud environment”, related resources are public between an extensive of

customers; receiving the resources allowed also not disbursing for them is irritating for “incident

handlers”. In the incident that resources are existence shared among a wide- ranges of customers

may create effects increasingly “mind-boggling”. Through the ‘cloud environment”, incident

handlers must identify the cracked and secures of anything cloud process is objective like the

proposal and basis of the cloud (Choudhary, 2018). There are various security restrictions of

cloud managements are a different test for the incident handlers. Cloud processing has numerous

security problems aimed at cloud assuming as it includes many progress including systems, load

adjusting virtualization, OS, simultaneousness control, discussion the board, databases, asset

booking, and memory the executives. This can place a load of burden on (Incident Handlers)

while attempting to recognize incidents when resources take remained moved to a “cloud

environment” (Zakaria, 2015).

There are different types of challenges. Identification of relevant data sources: it is

problematic to choose, which data bases are essential for incident location mainly for PaaS

besides SaaS. Client obvious classification for charitable customer’s contact to event causes, the

CSP must represent systems and ideas that agreement 2 purposes: all appropriate event data must

be open, yet one client ought not to have the capacity to see occasion data with respect to

different clients. Location regardless of lost data around client resources/ framework This

problem is maximum expressed by IaaS for instance while charitable interval location to virtual

device images without information in concerns to the announced operating system however

moreover occurs through PaaS e.g., the problem of interval identification for network

applications without learning about the request (Ahmad, Maynard, & Shanks, 2015).
CLOUD COMPUTING 3

References

Ahmad, A., Maynard, S. B., & Shanks, G. (2015). A Case Analysis of Information Systems and

Security Incident Responses. International Journal of Information Management, 35(6),

717-723. Retrieved from

https://www.researchgate.net/publication/281212310_A_Case_Analysis_of_Information_

Systems_and_Security_Incident_Responses

Choudhary, V. K. (2018). Cloud Computing and its Applications: A Review. International

Journal of Emerging Trends & Technology in Computer Science, 5(4), 20-27. Retrieved

from

https://www.researchgate.net/publication/325359863_Cloud_Computing_and_its_Applic

ations_A_Review

Zakaria, W. Z. (2015). Application of Case Based Reasoning in IT Security Incident Response.

International Conference Recent treads in Engineering and Technology, 2(3), 106-109.

Retrieved from

https://www.researchgate.net/publication/282266878_Application_of_Case_Based_Reas

oning_in_IT_Security_Incident_Response

You might also like