UC Issues and Risks Associated with Cloud Storage Discussion 1. Write 300-350 words. APA format According to your readings, cloud computing represents one

UC Issues and Risks Associated with Cloud Storage Discussion 1. Write 300-350 words. APA format

According to your readings, cloud computing represents one of the most significant paradigms shifts in information technology (IT) history, due to an extension of sharing an application-hosting provider that has been around for many years, and was common in highly regulated vertical industries like banks and health care institutions. The author’s knowledge from their research continue to assert that, the impetus behind cloud computing lies on the idea that it provides economies of scale by spreading costs across many client organizations and pooling computing resources while matching client computing needs to consumption in a flexible, real-time version.

Don't use plagiarized sources. Get Your Custom Essay on
UC Issues and Risks Associated with Cloud Storage Discussion 1. Write 300-350 words. APA format According to your readings, cloud computing represents one
Just from $13/Page
Order Essay

Identify the issues and risks that pose concern to organizations storing data in the cloud – briefly support your discussion.


A Comparative Study of Data Deduplication Strategies. (2018). 2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC), Secure Cyber Computing and Communication (ICSCCC), 2018 First International Conference On, 68. Retrieved from https://ieeexplore.ieee.org/document/8703363?arnumber=8703363
Patricia C. Franks. (2015). New Technologies, New Challenges: Records Retention and Disposition in a Cloud Environment, 39(2), 191–209. Retrieved from: http://eds.a.ebscohost.com/eds/pdfviewer/pdfviewer?vid=18&sid=73312ccd-f875-4af5-9c62-d1adf1d7c39c%40sessionmgr4008

2. Reply 50-100 words

Cloud computing, by its very definition, represents a technological milestone in the history of information technology advancement over the years. While this is so, the facilitation of storage, management, and processing of data on networks of remote servers over the internet is not without its issues and risks. From this understanding, it is noteworthy to acknowledge that the most common issue or rather a threat resonates around data security. In this line of this thought, there are other notable threats that cloud-stored data is faced with.

The first treat that has always been even before the cloud computing technology is data breaches. According to the Ponemon Institute’s study “Data Breach: The Cloud Multiplier Effect” (2014), a significant percentage of IT professionals believe that data protection on cloud services is inherently flawed. From the findings, it was reported that there were three times more breaches on organizations that store data in the cloud as opposed to those that store data on their premises. This fact presents an inherent risk to organizations storing data in the cloud.

The second issue that poses a concern to organizations storing data in the cloud is an insider threat. This vulnerability is identified as a form of insecurity that originates from within a targeted organization. This security issue is made worse once an employee gets to access intellectual property such as virtual machines and confidential information such as financial forms and customer accounts (Angeles, 2015). And this is what is identified by entrusting a third party to look after one’s data; there will always be an individual who tries to impersonate the rightful owner (Angeles, 2015). Just as data breaches, insider threats are mainly characterized by misuse of information for malicious intent.

The third risk that poses a concern to organizations storing data in the cloud is insufficient due diligence. This risk arises from a human factor where organizations migrate to the cloud without understanding and acknowledging the services to expect (Morrow, 2018). In this manner, their incomprehension of the security measures as well as their responsibility is negated. In the end, such hasty actions expose their respective organizations to attack by numerous threats.

In conclusion, numerous avenues may be used to exploit the data stored in the cloud. While most of these issues present technical attributes, it is worth noting that human errors are factored in. From this understanding, it is worth acknowledging that organizations ought to engage in a strategic iterative approach that captures an all-round appreciation of the technical and human factors surrounding data storage on the cloud. With this approach, issues and risks that pose a concern to organizations storing data in the cloud would be mitigated.


Angeles, S. (2015). 8 Reasons to Fear Cloud Computing. Retrieved from https://www.businessnewsdaily.com/5215-dangers-clo…

Morrow, T. (2018). 12 Risks, Threats, & Vulnerabilities in Moving to the Cloud. Retrieved from https://insights.sei.cmu.edu/sei_blog/2018/03/12-r…

Ponemon Institute. (2014). Data Breach: The Cloud Multiplier Effect. Ponemon Institute© Research Report. Retrieved from http://go.netskope.com/rs/netskope/images/Ponemon-…

3. Reply 50-100 words

Cloud computing is portrayed as it is a common resource which gives dynamic access to figuring organizations which covers all system to completely operational and maintained applications. which can be developed by excommunicating by methods for web and VPN which will give more noteworthy security. which will take out the server hardware and sending whole establishment. Some instance of conveyed figuring are AWS and Azure. we do have not many flaws using conveyed processing they are a part of the security threats are:

1) Information misfortune: at whatever point our information is eradicated or invigorated then it can’t be recovered until with the exception of on the off chance that it has support information setback may occur because of like losing encoding key, ranking it from records and taking care of it in dangerous media. Basically providers of cloud organizations have the a larger number of benefits accessible to them than singular clients. Model is a couple of times drives/circle mishaps prompts information disaster. (Bhowmik, 2017)

2) Information breaks: So a couple of times our information is hurt coincidental deu to the nonattendance of awerness, by chance it can deal sensitive data, forsook that affiliation must be proactive for this circumstance with IG game plans to fight what kind of beach is that. This kind of damages, generally, happens in cloud computing due to architectural or operation; Eucharistic of cloud condition. Like having lacking check, endorsement and survey controls.

3) Hacking and maverick interruptions: So it is basic to fathom for your cloud providers security process for agents like how they are screening and does their background check completed how they got physical access and server ranch yielded and monitered when we have this security, privacy are not totally investigated which makes an importunity for developer to abuse this workplaces even nation state upheld interference. considering the level of access yielded to agents to control over cloud organizations with little or in no way peril of area. (Audette, 2011)

4. Insecure purposes of cloud association: So here information will move from the workstation in your framework to cloud and the other way around further advances information can be moved thus from application to cloud you have inside and the other way around like we should be cautious while masterminding API’s it is standardize the association between applications. which has security like by using auth2.0 it will make token every time it made affirmation. like this we can confirm our affiliation.


Bhowmik, S. (2017). Cloud computing. Cambridge, United Kingdom: Cambridge University Press.

Datardina, M., & Audette, Y. (2011). Cloud computing. Toronto: Canadian Institute of Chartered Accountants.

Homework Writings Pro
Calculate your paper price
Pages (550 words)
Approximate price: -

Why should I choose Homework Writings Pro as my essay writing service?

We Follow Instructions and Give Quality Papers

We are strict in following paper instructions. You are welcome to provide directions to your writer, who will follow it as a law in customizing your paper. Quality is guaranteed! Every paper is carefully checked before delivery. Our writers are professionals and always deliver the highest quality work.

Professional and Experienced Academic Writers

We have a team of professional writers with experience in academic and business writing. Many are native speakers and able to perform any task for which you need help.

Reasonable Prices and Free Unlimited Revisions

Typical student budget? No problem. Affordable rates, generous discounts - the more you order, the more you save. We reward loyalty and welcome new customers. Furthermore, if you think we missed something, please send your order for a free review. You can do this yourself by logging into your personal account or by contacting our support..

Essay Delivered On Time and 100% Money-Back-Guarantee

Your essay will arrive on time, or even before your deadline – even if you request your paper within hours. You won’t be kept waiting, so relax and work on other tasks.We also guatantee a refund in case you decide to cancel your order.

100% Original Essay and Confidentiality

Anti-plagiarism policy. The authenticity of each essay is carefully checked, resulting in truly unique works. Our collaboration is a secret kept safe with us. We only need your email address to send you a unique username and password. We never share personal customer information.

24/7 Customer Support

We recognize that people around the world use our services in different time zones, so we have a support team that is happy to help you use our service. Our writing service has a 24/7 support policy. Contact us and discover all the details that may interest you!

Try it now!

Calculate the price of your order

Total price:

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.

Our Services

Our reputation for excellence in providing professional tailor-made essay writing services to students of different academic levels is the best proof of our reliability and quality of service we offer.


Essay Writing Service

When using our academic writing services, you can get help with different types of work including college essays, research articles, writing, essay writing, various academic reports, book reports and so on. Whatever your task, homeworkwritingspro.com has experienced specialists qualified enough to handle it professionally.


Admission Essays & Business Writing Help

An admission essay is an essay or other written statement by a candidate, often a potential student enrolling in a college, university, or graduate school. You can be rest assurred that through our service we will write the best admission essay for you.


Editing Support

Our professional editor will check your grammar to make sure it is free from errors. You can rest assured that we will do our best to provide you with a piece of dignified academic writing. Homeworkwritingpro experts can manage any assignment in any academic field.


Revision Support

If you think your paper could be improved, you can request a review. In this case, your paper will be checked by the writer or assigned to an editor. You can use this option as many times as you see fit. This is free because we want you to be completely satisfied with the service offered.