Cybersecurity and the limitations of cloud-computing system
Limitation of Cloud-Computing System
Joseph O. Esin
Introduction
Most organizations are rapidly moving toward cloud computing as a reliable source of
secured storage center and easily accessible through the Internet. Traditional hard drive
storage containing organization vital data, information and resources is often vulnerable
to untimely breakdowns, low service utilization, gross inefficiency, and inflexibility
especially at a time when organizations desire stable and continued network operations.
As such, cloud-computing system is apparently a promising and attractive secured
storage center for vital data, information and intellectual property. Furthermore, cloud-
computing operation is designed to store multiple organizations’ vibrant data and
functions with the great flexibility; it also provides accommodations for organizations’
treasured data and resources. Unfortunately, these vital functions are sometimes undercut
the vulnerability of could-computing to hacking
Breach
Cloud-computing is designed to relieve organizations from extensive operational
pressure by moving substantial portion of data, information and resources to cloud-
computing to minimize budget constraint, data breach and cyber-threat, relieve
information technology (IT) team from labor-intensive activities, auditing and updating
software programs. Cloud computing is reliable with ability to store and retrieve data
faster than the traditional IT unit. Cloud-computing providers often operate by taking
control of sensitive data and information against data breach; thereby, holding
perpetrators of cyber-attacks at bay. In fact, culprits often respond to cyber-threats prior
to cyber-attack on any organization’s data security facility. The breach on organization
vital data and information is the utmost serious and destructive cyber-threat and
constitutes prime vulnerability access points on target facility. Data and information
breach often occur within a few minutes with no reverberation by perpetrators.
Notifications
Most organizations are comfortable with adopting cloud-computing as part of security operation.
Undeniably, cloud computing is scalable, flexible, accessible, apparently self-content and
thought provoking. However, cloud-computing is slightly inadequate and unstable in terms of
system security operations. Private and public organizations and higher education enterprises are
turning to cloud-computing as proactive solutions against cyber-attacks, loss of data, information
and intellectual property. Today, cloud-computing is enabling ever-present, convenient and on-
demand network access to a shared pool of configurable computing resources such as network
servers, security storage, system software and applications software with minimal administrative
and supervisory activities.
Mitigation
Nowadays, cloud-computing is a functioning platform for outsourcing any organization’s
secured data and information; thereby, reducing cost of hardware and software upgrading and
reducing the number of information technology (IT) supporting staff. Cloud-computing
operations are not infallible and waterproof but tend to provide protective and secured
measurable mechanism. Cloud-computing is designed to assist organizations in combatting
challenges related to the chasm created between vital data and information stored in the local
hard drive and making cloud computing a host of vital data and information in a foreign and far-
off data storage.
Questions
ï‚· If cloud providers file for bankruptcy and are coerced to hand over an
organization’s data and information to competitors, what will the service
providers do? The organization will be in distress.
ï‚· If the forthcoming, yet to be provider, fails to accept and honor the former clients-
providers contractual agreements, what will the organization do. The organization
will be confronted with operational problem.
ï‚· Should organizations continue to retain large members of information technology
(IT) employees?
ï‚· Should organizations totally rely on cloud-computing provider or retain few
members of information technology (IT) team to protect he organizations’ data,
information and intellectual property in case of insolvency, financial
mismanagement, and unexpected data server breakdown? The organization will
be confronted with operational problem.
ï‚· Should a contractual agreement allow data backup tapes to be given to the
organizations’ IT unit on a quarterly or annual basis in case of data breach? The
organization will with operate with limited data and information to make
informed mission-driven decision.
Lessons Learned
1. Cloud-computing is intended to alleviation information technology (IT) team
from hardware and software maintenance, upgrading, configuration,
management and backup activities. The nucleus of organizations rests entirely
on the well-being of consumers’ information and data, regardless of the
location. The advantage of cloud-computing consists of configuring and
managing network file servers, protection against hardware malfunction,
power outages, system failure, floods, hurricane, extreme cold and heat,
ongoing upgrades, hardware and software installations, troubleshooting and
regular system maintenance.
Most organizations are rapidly moving toward cloud-computing as a reliable source of secured storage accessible only through the Internet connection from remote location. However, organizations are urged to refrain from total reliance on cloud-computing and retain information technology (IT) experienced team to protect against data breach relative to impartial internet access. The total reliance on the outsourced cloud computing keeps the organization in total dependence of and a hostage to an external entity for security. Although cloud-computing is Internet-based system and currently on- demand, most organizations are encouraged to avoid total dependent access through remote servers; they are strongly urge to store much needed organizations’ vital data and information in a secured local security center controlled by their on trained (IT) teams.
About the author – Dr. Joseph O. Esin is Professor of Computer Information Systems at Jarvis Christian College, Hawkins, Texas USA and Visiting Professor of Research University of Calabar, Nigeria