全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

Cloud Computing Security, Protecting University Information

DOI: 10.4236/oalib.1110925, PP. 1-10

Subject Areas: Online social network computing, Information Management, Technology, Cloud Computing, Information and Communication: Security, Privacy, and Trust

Keywords: Privacy, Cloud Computing, Cybersecurity, Higher Education, NIST, Risk Framework

Full-Text   Cite this paper   Add to My Lib

Abstract

Cybersecurity is the study of protecting information and systems. One of the most secure ways of protecting information online is through cloud services when used appropriately. In St. Mary’s university, cloud computing adaption has rapidly grown and evolved over the years. However, the protection and safety of students and staff’s information is still unsteady, which prompted the evaluation and survey of this research. In this paper, a risk analysis is performed on one of the university’s cloud portal (canvas) to identify and mitigate potential security vulnerabilities found in the portal. Once the vulnerabilities have been identified, the university’s existing controls, risks, likelihood, and impact levels are then mapped to a risk register. Suggested and reliable security controls according to NIST SP 800-53A are then implemented to mitigate these vulnerabilities. The last phase of the analysis, risk monitoring is implemented using the NIST 800-39 risk monitoring plan.

Cite this paper

Eluwa, A. C. (2023). Cloud Computing Security, Protecting University Information. Open Access Library Journal, 10, e925. doi: http://dx.doi.org/10.4236/oalib.1110925.

References

[1]  Mell, P. and Tim, G. (2011) The NIST Definition of Cloud Computing. Special Publication 800-145. https://doi.org/10.6028/NIST.SP.800-145
[2]  Tout, S., William, S. and Lawver, G.S. (2009) Cloud Computing and Its Security in Higher Education. Proceedings of ISECON, 26, No. 2314.
[3]  Kalaiprasath, R., Elankavi, R. and Udayakumar, R. (2017) Cloud Security and Compliance—A Semantic Approach in End-to-End Security. International Journal on Smart Sensing & Intelligent Systems, 10, 482-494. https://doi.org/10.21307/ijssis-2017-265
[4]  Mladen, V.A. (2008) Cloud Computing-Issues, Research and Implementations. Journal of Computing and Information Technology, 16, 235-246. https://doi.org/10.2498/cit.1001391
[5]  Metheny, M. (2017) Chapter 7—Comparison of Federal and International Security Certification Standards. In: Federal Cloud Computing (Second Edition), The Definitive Guide for Cloud Service Providers, 211-237. https://doi.org/10.1016/B978-0-12-809710-6.00007-X

Full-Text


comments powered by Disqus

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133

WeChat 1538708413