The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Applying Security Policies in Small Business Utilizing Cloud Computing Technologies
Abstract
Over a decade ago, cloud computing became an important topic for small and large businesses alike. The new concept promises scalability, security, cost reduction, portability, and availability. While addressing this issue over the past several years, there have been intensive discussions about the importance of cloud computing technologies. Therefore, this paper reviews the transition from traditional computing to cloud computing and the benefit for businesses, cloud computing architecture, cloud computing services classification, and deployment models. Furthermore, this paper discusses the security policies and types of internal risks that a small business might encounter implementing cloud computing technologies. It addresses initiatives towards employing certain types of security policies in small businesses implementing cloud computing technologies to encourage small business to migrate to cloud computing by portraying what is needed to secure their infrastructure using traditional security policies without the complexity used in large corporations.
Related Content
Muath AlShaikh, Waleed Alsemaih, Sultan Alamri, Qusai Ramadan.
© 2024.
19 pages.
|
Anna M. Segooa, Billy M. Kalema.
© 2024.
27 pages.
|
Utsav Upadhyay, Alok Kumar, Gajanand Sharma, Ashok Kumar Saini, Varsha Arya, Akshat Gaurav, Kwok Tai Chui.
© 2024.
30 pages.
|
Yuan Ren.
© 2024.
8 pages.
|
Jon A. Chilingerian, Mitchell P. V. Glavin.
© 2024.
27 pages.
|
Hadeel Al-Obaidy, Aysha Ebrahim, Ali Aljufairi, Ahmed Mero, Omar Eid.
© 2024.
19 pages.
|
Ahmad Althunibat, Bayan Alsawareah, Siti Sarah Maidin, Belal Hawashin, Iqbal Jebril, Belal Zaqaibeh, Haneen A. Al-khawaja.
© 2024.
19 pages.
|
|
|