Untitled document edited 4

Many businesses being run in the world are shifting most of their efforts and workloads to the
cloud because they want to make their efficiency move higher and increase from the initial level
they are to another better level. Moreover, those businesses want to streamline their workloads
since there is a lot of workload under operation. However, some risks come along as a result of
cloud adoption, and therefore, businesses should not rush into adopting its strategy without
having a better understanding. There are five common security risks of cloud computing: limited
visibility into network operations, malware, compliance, loss of data, and inadequate
diligence(Chaves, 2011). Nonetheless, since every challenge has a solution, there are ways in
which an organization makes efforts to ensure that security is maintained, which includes risk
assessment, users control tool, automation, and continuous monitoring. Ideally, with all that,
firms have the power and ability to test their cloud security infrastructure is well maintained.
There are five basic risks that organizations should consider when moving to adopt cloud
computing. Ideally, these risks include, first and foremost, the visibility network operations
whereby the organization should forfeit given level visibility that is mostly involved with
network operations when the organization is moving assets and workloads to the cloud. Ideally,
considerations on this are important because some responsibilities of ensuring maintenance of
some systems and policies move to cloud service providers. Moreover, the shift of the service
may be in scope depending on the service model used. Therefore, as a result, firms should be
frontline to ensure that they monitor their infrastructure networks, not relying upon most
loggings and network-based monitoring.
Moreover, through organizations shifting most of their data and information to an internetconnected cloud environment, the organization is increasing additional cyber threats chances to
themselves, hence malware. Malware attacks are the most known types of threats to most
organizations’ cloud security. Most organizational data become unsecured hence making the
organization experience data breaches. Also, it’s well known that cybercriminal is increasing day
by day, making a lot of organization lose trust in their clients; hence the rate of their profits goes
down, which may cause a business to collapse.
Furthermore, data privacy is increasing in many organizations making compliance regulations
more stringent. Ideally, organizations face the risk of their clients moving from their companies
and going to other companies where informational data is highly secured from loss, theft, and
information security. Also, proper security measures are significant for any growing
organization, and therefore, cloud security ensures that all this is maintained.
In addition, another form of risk involved in cloud computing is the loss of data. Many
organizations face the challenge of data leakage after the cloud service providers undergo some
issues of attack or breach. As a result, the organization will be held responsible for any chance of
damages alongside losing its data. Therefore, its evident data loss is an issue that is commonly
involved with cloud computing, and organizations may lose their clients and capital.
What’smore, inadequate due diligence is another form of risk involved in cloud computing.
Many organizations lack adequate knowledge of how much work is involved in the transition.
In light of every challenge facing the organization, there are alternative ways of solving the
That said, there are ways of bolstering security in cloud computing, including a risk assessment
to identify any potential gaps so that the organization can make informed decisions and ensure
security improvement. Also, users should have access control whereby the organization
considers various methods such as zero-trust security. Another key factor is continuous
monitoring to ensure cyber hygiene and determine security posters (Garg and Rathi, 2019)s. That
said, it’s evident that the article provided has proposed viable solutions to cloud-based risk
management since it ensures that there is maintenance monitoring and management application,
report services, transport partners who ensure data security, and a confidential reporting service.
In conclusion, organizations should have adequate knowledge of cloud security to move towards
achieving their goals. That said, organizations should have adequate knowledge of the basic
security needs, including malware, limited visibility into network operations, compliance, loss of
data, and inadequate diligence. With that in mind, organizations can avoid issues leading to their
downfall. However, there are some guidelines that organizations should consider to ensure that
they avoid the downfall that comes as a result of cloud computing which includes risk
management, user access controls, and continuous monitoring.
Chaves, S., 2011. The Risks Issue in Cloud Computing. SSRN Electronic Journal,
Garg, A. and Rathi, R., 2019. A Survey on Cloud Computing Risks and Remedies. International
Journal of Computer Applications, 178(29), pp.35-37.

Calculate the price
Make an order in advance and get the best price
Pages (550 words)
*Price with a welcome 15% discount applied.
Pro tip: If you want to save more money and pay the lowest price, you need to set a more extended deadline.
We know how difficult it is to be a student these days. That's why our prices are one of the most affordable on the market, and there are no hidden fees.

Instead, we offer bonuses, discounts, and free services to make your experience outstanding.
How it works
Receive a 100% original paper that will pass Turnitin from a top essay writing service
step 1
Upload your instructions
Fill out the order form and provide paper details. You can even attach screenshots or add additional instructions later. If something is not clear or missing, the writer will contact you for clarification.
Pro service tips
How to get the most out of your experience with StudyAcademia.com
One writer throughout the entire course
If you like the writer, you can hire them again. Just copy & paste their ID on the order form ("Preferred Writer's ID" field). This way, your vocabulary will be uniform, and the writer will be aware of your needs.
The same paper from different writers
You can order essay or any other work from two different writers to choose the best one or give another version to a friend. This can be done through the add-on "Same paper from another writer."
Copy of sources used by the writer
Our college essay writers work with ScienceDirect and other databases. They can send you articles or materials used in PDF or through screenshots. Just tick the "Copy of sources" field on the order form.
See why 20k+ students have chosen us as their sole writing assistance provider
Check out the latest reviews and opinions submitted by real customers worldwide and make an informed decision.
Customer reviews in total
Current satisfaction rate
3 pages
Average paper length
Customers referred by a friend
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat