top of page

Cybersecurity and the limitations of cloud-computing system

Limitation of Cloud-Computing System

Joseph O. Esin

Introduction

Most organizations are rapidly moving toward cloud computing as a reliable source of

secured storage center and easily accessible through the Internet. Traditional hard drive

storage containing organization vital data, information and resources is often vulnerable

to untimely breakdowns, low service utilization, gross inefficiency, and inflexibility

especially at a time when organizations desire stable and continued network operations.

As such, cloud-computing system is apparently a promising and attractive secured

storage center for vital data, information and intellectual property. Furthermore, cloud-

computing operation is designed to store multiple organizations’ vibrant data and

functions with the great flexibility; it also provides accommodations for organizations’

treasured data and resources. Unfortunately, these vital functions are sometimes undercut

the vulnerability of could-computing to hacking

Breach

Cloud-computing is designed to relieve organizations from extensive operational

pressure by moving substantial portion of data, information and resources to cloud-

computing to minimize budget constraint, data breach and cyber-threat, relieve

information technology (IT) team from labor-intensive activities, auditing and updating

software programs. Cloud computing is reliable with ability to store and retrieve data

faster than the traditional IT unit. Cloud-computing providers often operate by taking

control of sensitive data and information against data breach; thereby, holding

perpetrators of cyber-attacks at bay. In fact, culprits often respond to cyber-threats prior

to cyber-attack on any organization’s data security facility. The breach on organization

vital data and information is the utmost serious and destructive cyber-threat and

constitutes prime vulnerability access points on target facility. Data and information

breach often occur within a few minutes with no reverberation by perpetrators.

Notifications

Most organizations are comfortable with adopting cloud-computing as part of security operation.

Undeniably, cloud computing is scalable, flexible, accessible, apparently self-content and

thought provoking. However, cloud-computing is slightly inadequate and unstable in terms of

system security operations. Private and public organizations and higher education enterprises are

turning to cloud-computing as proactive solutions against cyber-attacks, loss of data, information

and intellectual property. Today, cloud-computing is enabling ever-present, convenient and on-

demand network access to a shared pool of configurable computing resources such as network

servers, security storage, system software and applications software with minimal administrative

and supervisory activities.

Mitigation

Nowadays, cloud-computing is a functioning platform for outsourcing any organization’s

secured data and information; thereby, reducing cost of hardware and software upgrading and

reducing the number of information technology (IT) supporting staff. Cloud-computing

operations are not infallible and waterproof but tend to provide protective and secured

measurable mechanism. Cloud-computing is designed to assist organizations in combatting

challenges related to the chasm created between vital data and information stored in the local

hard drive and making cloud computing a host of vital data and information in a foreign and far-

off data storage.

Questions

 If cloud providers file for bankruptcy and are coerced to hand over an

organization’s data and information to competitors, what will the service

providers do? The organization will be in distress.

 If the forthcoming, yet to be provider, fails to accept and honor the former clients-

providers contractual agreements, what will the organization do. The organization

will be confronted with operational problem.

 Should organizations continue to retain large members of information technology

(IT) employees?

 Should organizations totally rely on cloud-computing provider or retain few

members of information technology (IT) team to protect he organizations’ data,

information and intellectual property in case of insolvency, financial

mismanagement, and unexpected data server breakdown? The organization will

be confronted with operational problem.

 Should a contractual agreement allow data backup tapes to be given to the

organizations’ IT unit on a quarterly or annual basis in case of data breach? The

organization will with operate with limited data and information to make

informed mission-driven decision.

Lessons Learned

1. Cloud-computing is intended to alleviation information technology (IT) team

from hardware and software maintenance, upgrading, configuration,

management and backup activities. The nucleus of organizations rests entirely

on the well-being of consumers’ information and data, regardless of the

location. The advantage of cloud-computing consists of configuring and

managing network file servers, protection against hardware malfunction,

power outages, system failure, floods, hurricane, extreme cold and heat,

ongoing upgrades, hardware and software installations, troubleshooting and

regular system maintenance.

Most organizations are rapidly moving toward cloud-computing as a reliable source of secured storage accessible only through the Internet connection from remote location. However, organizations are urged to refrain from total reliance on cloud-computing and retain information technology (IT) experienced team to protect against data breach relative to impartial internet access. The total reliance on the outsourced cloud computing keeps the organization in total dependence of and a hostage to an external entity for security. Although cloud-computing is Internet-based system and currently on- demand, most organizations are encouraged to avoid total dependent access through remote servers; they are strongly urge to store much needed organizations’ vital data and information in a secured local security center controlled by their on trained (IT) teams.

About the author – Dr. Joseph O. Esin is Professor of Computer Information Systems at Jarvis Christian College, Hawkins, Texas USA and Visiting Professor of Research University of Calabar, Nigeria

Featured Posts
Check back soon
Once posts are published, you’ll see them here.
Recent Posts
Archive
Search By Tags
No tags yet.
Follow Us
  • Facebook Basic Square
  • Twitter Basic Square
  • Google+ Basic Square
bottom of page