Chat with us, powered by LiveChat Research post topic and submit 260 word post on the | Writedemy

Research post topic and submit 260 word post on the

Research post topic and submit 260 word post on the

Research post topic and submit 260 word post on the given topic, indicate at least two source or reference in your original post. This assignment is to be scholarly; it is not enough for you to simply post your article and add cursory reviews. CITED REFERENCES ARE REQUIRED. Also create replies for given 3 posts, each reply should be separate (with separate REFERENCES but not necessarily different references) and should be 260 words without references. Include at least 260 words in your posting and at least 260 words in your reply excluding references.

Post Topic:

Search “scholar.google.com” or your textbook. Discuss how organizations have faced the challenges that incident handlers are challenged with in identifying incidents when resources have been moved to a cloud environment.

Reply to following posts with at least 260 words and at least 1 cited reference

Post 1:

Handling incidents in the cloud

Authorities in an organization face a lot of severe issues when it comes to dealing with security incidents whenever resources get moved to cloud servers. Most of the problems arrive from the fact that a joint response plan can never be established with the cloud providers due to the lack of a well-structured communication plan. In the words of Ab Rahman & Choo (2015), the roles and responsibilities do not remain defined properly leading to high grounds of issues and complicacies during the arrival of an intrusion attack. Cloud providers also remain unclear at instances regarding the practical procedures followed when it comes to dealing with security incidents in the cloud.

Cloud servers and the entire infrastructure can turn out to be very complicated because virtualization is utilized extensively. As stated by Krutz & Vines (2010), sensitive information also remains scattered on various devices that remain interconnected with one particular network. It can be extremely difficult to identify threats and manage incidents whenever such a matrix infrastructure arrives at the forefront. Cloud providers understand how the system remains configured but the CSIRT team in an organization along with the IT experts will not be able to identify the exact measures if training along with better clearance levels is not provided to them. It can be against the policy of the cloud provider when it comes to revealing industry secrets and the manners in which the systems remain configured.

Lack of transparency turns out to be another distinctive problem that authorities face whenever resources get moved to the cloud environment because the providers try to handle situations on their own without opting for cooperative behavior or even collaboration at the same instance as well. A lot of forensic tools also remain in the hands of the cloud providers and they do not delegate authority to the IT experts present in an organization. During the advent of an intrusion attack, the cloud providers might not be able to ensure control in a definitive manner. They might also stand incapable of identifying these threats and this is the reason why control the forensic tools is extremely important.

While drafting a security policy and an agreement, managers often forget to include the clauses that state clearly how the security tools and other equipment should be shared in a definitive manner when it comes to controlling incidents present in the cloud environment. Often managers in an organization fail to reach out to the cloud providers and they try to handle the situation on their own by severing networks and initiating a local server at the same instance as well. These procedures can also turn out to be extremely complicated and even dangerous to some extent because the nature of the threat is not understood in a proper manner (Whitman, Mattord & Green, 2013). The lack of collaboration is the central problem that authorities in an organization encounter and cloud providers also fail to conduct appropriate drills and training sessions through which the IT experts can understand the various ways in which incidents should be handled in the cloud environment.

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

Do you need an answer to this or any other questions?

About Writedemy

We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.

How It Works

To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Are there Discounts?

All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.

Hire a tutor today CLICK HERE to make your first order