Security Risks And Concerns In Cloud Computing For Accounting Software Providers

Background of Cloud Computing

Discuss about the Security Risks and Concerns in Cloud Computing.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

The purpose of making this report is to analyze and evaluate risks and security concerns with cloud computing in context of company that provides accounting software. In business organizations, cloud computing is used for various purposes and it has become an essential way to access information from remote system easily and quickly over internet. There are various other benefits of cloud computing that makes it useful for IT users. As we know that use of cloud computing is increasing among people, then it has become necessary for them to know about risk and security concerns of cloud computing. The major topics that we will discuss here in this report are background of cloud computing, risk and security concerns in cloud in context of accounting and applicant service providers.

XYZ Pvt. Ltd. is a company that provides account software. People are satisfied with products and services of this company. This company is using cloud computing services for running its business among people worldwide. While providing cloud computing services what kind of risks and security concerns are faced by this company, we will evaluating here in this report. Before moving towards discussion of risks and security concerns of cloud computing, here is requirement to emphasize on background of cloud and its literature concepts. (Journal of Accountancy, 2016)

Cloud computing has evolved through number of phases that consists of grid and utility computing, application service provision and software as a service (SaaS). But this primary concept of delivering computing resources was rooted in sixties. This was developed with the vision that everyone on the globe must be inter-connected to access programs and data at any site. This vision is actually related to cloud computing. With this vision, further amendments and improvements, this latest concept of cloud computing was introduced. Amazon EC2/S3 was the first widely accessible cloud computing. If at one side, advancements in cloud computing are increasing, then on other side, security and privacy concerns of cloud computing was also encountered by its users and it is still going on. In next segment of this report we will discuss that how XYZ Pvt. Ltd. Company is facing these problems. (ComputerWeekly, 2016)

For business organizations like given accounting company way of doing business has changed. It is commonly arguing that cloud computing is gaining a great deal of energy worldwide. According to analysis, revenue of cloud services is forecast to reach $68.3 billion in 2010. Most of the account base and other business organizations are running their businesses by using web cloud based applications. Cloud platform has eliminated the need for in-house technology infrastructure that includes servers and software to purchase, execute and maintain. Besides this, there are various other benefits available of cloud computing for business organizations and those benefits include quick implementation of business processes, less upfront costs that consists of cost of hardware and IT employees those are not required to be in-house and no hardware and maintenance cost is required in case of cloud computing. (Abraham, A., Muda, A., & Choo, 2016 )

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Risk and Security Concerns in Cloud in Context of Accounting Service Providers

With these benefits, risks and security concerns put influence over business organizations. XYZ Pvt. Ltd. Company will face following risk and security concerns of cloud computing.

  • Breaches of Important Information
  • Credentials Compromise and Broken Authentication
  • Hacking Interfaces and APIs
  • Exploitation of system vulnerabilities.
  • Hijacking Accounts
  • Malicious Insiders
  • Permanent Data Loss
  • Denial of Service Attack (Skyhigh Networks, 2015)

Breaches of essential information is a common security issue that is encountered by cloud users. This is happened because cloud networks face threats like traditional networks. Due to this data breach, confidential information of organizations and their customers, that is stored into their databases may get lost. In this case, if XYZ Pvt. Ltd. Company is giving account software services to its customers through cloud computing then they need to be careful about personal information of its customers. Besides this, after selling of account software, customers will also pay online and in this case, credit card information of customers can be breached from company’s database by hackers. (Rashid, 2016)

Data breaches and other kind of attacks basically occur due to lax authentication, weak passwords and poor certificate management. These are some weak points of security management that must be seriously taken into consideration. In case of XYZ Company. if they will not manage security of  databases and login credentials, then it is definitely possible hackers can easily guess passwords and can access confidential information. Precisely, compromise in login credentials directly leads to breakage in authentication. (Academia.edu, 2016)

In every cloud service and application, APIs are offered. Interfaces and APIs are used by IT teams to manage and interact with cloud services. In cloud computing, from authentication and access to controlling and monitoring of encryption and other activities, are depend upon security of API. Company XYZ also uses APIs to provide account software by cloud computing services. Therefore it is responsibility of technical department of this company to keep security of APIs. (SearchCloudComputing, 2016)

System vulnerabilities and other exploited bugs in programs are mostly encountered by users of cloud computing. This problem is becoming bigger with advent of multitenancy in cloud computing. When databases, memory and other resources are shared by business organizations then they create new surfaces for hackers for accessing this information. XYZ company also do this while using cloud services, so it will be better for them to be careful about their activities and actions. Otherwise heavy loss of information can occur. The practices like regular vulnerability scanning, prompt patch management and quick follow up regarding system threats are helpful for controlling system vulnerabilities. For regulated industries, it is necessary to patch quickly as possible. (incapsula.com, 2016)

Hacking, phishing, malware attacks and other network frauds are so much popular among IT users and cloud computing has enhanced these vulnerable activities. This is because attackers can spy on activities, manipulate transactions and can make modifications in data. Cloud applications may also use by them to perform their harmful attacks. Sharing of confidential information by organizations also lead to hijacking of accounts, because in this sharing, personal and business information is accessed by hackers. If company XYZ is sharing its information over internet without any security then it is possible that account can be hijacked by hackers. Accounts should be monitored properly so that online payment transactions can be done securely without any problem. The main thing is to protect credentials of account from hackers.

Breaches of Important Information

Malicious insiders is also a big problem for business organizations and it has many faces such as a current or former employee, a system administrator, a contractor or a business partner. The main agenda of malicious attack is from data theft to revenge. In cloud services it is also happened by hellbent insider that can destroy whole infrastructures and manipulation of data. All systems those depend solely on cloud service provider for security like encryption, they are considered at risk. That is XYZ Company should also have awareness about this concerning factor and it is recommended to XYZ Company to control encryption process and keys and minimizing access to users. These are some crucial factors to consider by this organization.

Permanent data loss is a big problem for all cloud computing users. Cloud is a matured service but still data loss occur due to provider error. When attack is conducted by malicious hackers then then they always try to permanently delete data which is difficult to recover if you don’t have any backup and recovery software. This can also be happened with XYZ Company and their confidential information may get lost. In this case, it is responsibility of this company to be carefully maintained its important information over network. Permanent data loss is not easy to perform by hackers, if cloud service providers will encrypt data on cloud database, then prevention is possible.

Denial of service attack is also a vulnerable attack that is also faced by cloud users. In this attack, hackers break the server access from all users who are connected with it and they cannot access any website from that server. DoS attack is not a new problem that is facing by cloud users and this problem has very bad impact. Denial of Service attack gets large amount of processing power. High volume DDoS attack is very common and main target of this attack is web server and database vulnerabilities.

For XYZ and other business organizations must be careful about this denial of service attack which is vulnerable for cloud database and its information.

These are some essential risks and security concerns of cloud computing that are commonly faced by business organizations like XYZ Pvt. Ltd. Company. After this whole discussion about risk and security concerns of cloud platform, further we will emphasize on protection mechanism that are discussed in theory and literature for security and privacy of cloud platform.

This is an important segment of this report and here we will emphasize that how security and privacy of cloud computing can be maintained. According to literature review of Al-Anzi, Tadav & Soni (2014), suggest that there is requirement to follow security model for cloud computing and this model should include governance, risk management and compliance. Today cloud security requirements are varied dynamically due to its dynamic nature and ownership of customer. This security model must be applied to each type of cloud such as private, hybrid and public. (Digital Guardian, 2014)

In cloud security model, security governance, risk management and compliance refers to fundamental responsibility of the organization for identifying and implementation of various important processes and control organizational structure to provide effective security to cloud users. Governance is set of policies, laws and technologies that are required in business organizations to achieve security objectives. (BlackStratus, 2015)

Credentials Compromise and Broken Authentication

In case of people and identity management, only authorized users should be able to access information. This is known as authorization and authorized access of data. In case of cloud computing, authorized access is required to get rid of security issues and risks that we have already discussed above.( Chang, 2016)

According to Al-Anzi, Yadav and Soni (2014), Application security is also an essential way to maintain privacy and security into cloud platform. In this case, XML encryption and XML signature will be better to use. These are actually helpful to provide prevention from XML attacks and other web services attacks. (Chorafas, 2011)

Data and information security are also most important in cloud computing. For achieving data and information security, cloud computing management must focus on how data should be stored, processed and audited. Besides this, here recommendation to implement intrusion detection and protection system is also provided.

In every kind of web service, its infrastructure plays an important role. Similarly in cloud environment, its infrastructure needs to be secured and reliable. For physical measurements of structure there is requirement to use biometric access controls and computer access controls.

According to literatures’ review, above listed protection mechanism will definitely provide help to get prevention from risky cloud environment. These protection mechanism can be implemented in cloud environment and in case of other network technologies.

Conclusion and Future Trends

After this whole discussion we can say that it is necessary for XYZ Pvt. Ltd. Company to consider above discussed cloud computing issues, if it wants to provide better outcomes to its services. If this company is facing any kind of above discussed problem then it will be better to implement above discussed protection mechanisms. It is responsibility of technical department of this company to be careful about these issues of cloud computing security. If we talk about future of XYZ Company then this company is doing efforts to run advanced security tools in organization and they also providing better training to their employees for using cloud services properly and with appropriate security. To satisfy customers with quality results is responsibility of every business organization.

References

ComputerWeekly. (2016). A history of cloud computing. Retrieved 24 September 2016, from https://www.computerweekly.com/feature/A-history-of-cloud-computing

Journal of Accountancy.(2016). Cloud Computing: What Accountants Need to Know. Retrieved 24 September 2016, from https://www.journalofaccountancy.com/issues/2010/oct/20102519.html

Abraham, A., Muda, A., & Choo, Y. Pattern analysis, intelligent security and the internet of things.

Skyhigh Networks. (2015). 9 Cloud Computing Security Risks Every Company Faces. Retrieved 24 September 2016, from https://www.skyhighnetworks.com/cloud-security-blog/9-cloud-computing-security-risks-every-company-faces/

Rashid, F. (2016). The dirty dozen: 12 cloud security threats. InfoWorld. Retrieved 24 September 2016, from https://www.infoworld.com/article/3041078/security/the-dirty-dozen-12-cloud-security-threats.html

Academia.edu.(2016). Cloud Computing Security Challenges (Literature Review). Retrieved 24 September 2016, from https://www.academia.edu/20333158/Cloud_Computing_Security_Challenges_Literature_Review_

Digital Guardian.(2014). 27 Data Security Experts Reveal The #1 Information Security Issue Most Companies Face With Cloud Computing & Storage. Retrieved 24 September 2016, from https://digitalguardian.com/blog/27-data-security-experts-reveal-1-information-security-issue-most-companies-face-cloud

BlackStratus.(2015). How to Overcome Security Issues in Cloud Computing.  Retrieved 24 September 2016, from https://blackstratus.com/overcome-security-issues-cloud-computing/

SearchCloudComputing. (2016). Cloud computing and application security: Issues and risks. Retrieved 24 September 2016, from https://searchcloudcomputing.techtarget.com/tip/Cloud-computing-and-application-security-Issues-and-risks

 incapsula.com.(2016). Top 10 Security Concerns for Cloud based Services.  Retrieved 24 September 2016, from https://www.incapsula.com/blog/top-10-cloud-security-concerns.html

Chorafas, D. (2011). Cloud computing strategies. Boca Raton, Fla.: CRC Press.

Chang, V. A proposed cloud computing business framework.

What Will You Get?

We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.

Premium Quality

Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.

Experienced Writers

Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.

On-Time Delivery

Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.

24/7 Customer Support

Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.

Complete Confidentiality

Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.

Authentic Sources

We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.

Moneyback Guarantee

Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.

Order Tracking

You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.

image

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

image

Trusted Partner of 9650+ Students for Writing

From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.

Preferred Writer

Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.

Grammar Check Report

Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.

One Page Summary

You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.

Plagiarism Report

You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.

Free Features $66FREE

  • Most Qualified Writer $10FREE
  • Plagiarism Scan Report $10FREE
  • Unlimited Revisions $08FREE
  • Paper Formatting $05FREE
  • Cover Page $05FREE
  • Referencing & Bibliography $10FREE
  • Dedicated User Area $08FREE
  • 24/7 Order Tracking $05FREE
  • Periodic Email Alerts $05FREE
image

Services offered

Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.

  • On-time Delivery
  • 24/7 Order Tracking
  • Access to Authentic Sources
Academic Writing

We create perfect papers according to the guidelines.

Professional Editing

We seamlessly edit out errors from your papers.

Thorough Proofreading

We thoroughly read your final draft to identify errors.

image

Delegate Your Challenging Writing Tasks to Experienced Professionals

Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!

Check Out Our Sample Work

Dedication. Quality. Commitment. Punctuality

Categories
All samples
Essay (any type)
Essay (any type)
The Value of a Nursing Degree
Undergrad. (yrs 3-4)
Nursing
2
View this sample

It May Not Be Much, but It’s Honest Work!

Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.

0+

Happy Clients

0+

Words Written This Week

0+

Ongoing Orders

0%

Customer Satisfaction Rate
image

Process as Fine as Brewed Coffee

We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.

See How We Helped 9000+ Students Achieve Success

image

We Analyze Your Problem and Offer Customized Writing

We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.

  • Clear elicitation of your requirements.
  • Customized writing as per your needs.

We Mirror Your Guidelines to Deliver Quality Services

We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.

  • Proactive analysis of your writing.
  • Active communication to understand requirements.
image
image

We Handle Your Writing Tasks to Ensure Excellent Grades

We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.

  • Thorough research and analysis for every order.
  • Deliverance of reliable writing service to improve your grades.
Place an Order Start Chat Now
image

Order your essay today and save 30% with the discount code ESSAYHELP