Professional Documents
Culture Documents
Although cloud computing and the emerging mobile digital platform have the potential to deliver powerful
benefits, they pose new challenges to system security and reliability. We now describe some of these
challenges and how they should be addressed.
The dispersed nature of cloud computing makes it difficult to track unauthorized activity. Virtually all cloud
providers use encryption, such as Secure Sockets Layer, to secure the data they handle while the data are
being transmitted. But if the data are stored on devices that also store other companies’ data, it’s important to
ensure these stored data are encrypted as well. Companies expect their systems to be running 24/7, but cloud
providers haven’t always been able to provide this level of service. On several occasions over the past few
years, the cloud services of Amazon.com and Salesforce.com experienced outages that disrupted business
operations for millions of users
.
Cloud users need to confirm that regardless of where their data are stored, they are protected at a level that
meets their corporate requirements. They should stipulate that the cloud provider store and process data in
specific jurisdictions according to the privacy rules of those jurisdictions. Cloud clients should find how the
cloud provider segregates their corporate data from those of other companies and ask for proof that encryption
mechanisms are sound .It’s also important to know how the cloud provider will respond if a disaster strikes,
whether the provider will be able to completely restore your data, and how long this should take. Cloud users
should also ask whether cloud providers will submit to external audits and security certifications. These kinds of
controls can be written into the service level agreement (SLA) before signing with a cloud provider.
Companies should encrypt communication whenever possible. All mobile device users should be required to
use the password feature found in every smartphone. Mobile security products are available from Kaspersky,
Lookout, android Security. Some companies insist that employees use only company-issued smartphones.
BlackBerry devices are considered the most secure because they run within their own secure system.