Page 271 - Using MIS
P. 271

AnonNews.org. To put that into perspective, there are about   APIs, denial of service attacks, malicious insiders, abuse of
            315 million people currently living in the United States. This   cloud services, insufficient due diligence, and shared tech-
            qualifies as one of the largest data breaches in U.S. history.  nology vulnerabilities. 11
               Shifting  to  cloud-based  services  may  make  busi-  Consider each of these threats carefully. Cloud-based
            ness sense. It may even be necessary in some businesses.   services bring a unique set of problems with them that
            Admittedly, the list of benefits from using cloud-based ser-  may not be immediately apparent. Some of these prob-
            vices is long. But it’s wise to contemplate potential costs of   lems may be security issues. Others may include dissatisfied
            cloud-based solutions as well.                       customers, the need to hire additional technical person-
               The Cloud Security Alliance lists nine threats you   nel, changes in internal processes, and upgrades to existing
            should think about when considering a cloud-based solu-  infrastructure.
            tion of any type. These include data breaches, data loss,   Not all clouds are puffy white pillows; some are dark
            account or service traffic hijacking, insecure interfaces and   stormy cyclones.















                        DisCussion Questions


            1.  List some of the benefits you see from corporations offer-  5.  How would a network outage affect users of cloud-based
              ing cloud-based services to their customers.         services? Would network outages also affect corpora-
            2.  List some of the costs you see from corporations offering   tions? How?
              cloud-based services to their customers.           6.  How could a denial of service (DOS) attack be used to
            3.  Name one cloud-based service you use (e.g., email, so-  harm a corporation providing a cloud-based service?
              cial media, etc.). If this service was involved in a data   Could this be done from another country?
              breach, what data would you lose?
            4.  Why would cloud-based service providers be an attrac-
              tive target for attackers?









            11
             Cloud Security Alliance, “The Notorious Nine: Cloud Computing Top Threats in 2013,” 2013, accessed May 8, 2014, https://downloads
            .cloudsecurityalliance.org/initiatives/top_threats/The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf.
                                                                                                                 239
   266   267   268   269   270   271   272   273   274   275   276