Evaluating and Establishing Baseline Security Requirements in Cloud Computing: An Enterprise Risk Management Approach

Oladoyinbo, Tunbosun Oyewale and Adebiyi, Olubukola Omolara and Ugonnia, Jennifer Chinelo and Olaniyi, Oluwaseun Oladeji and Okunleye, Olalekan Jamiu (2023) Evaluating and Establishing Baseline Security Requirements in Cloud Computing: An Enterprise Risk Management Approach. Asian Journal of Economics, Business and Accounting, 23 (21). pp. 222-231. ISSN 2456-639X

[thumbnail of Oladoyinbo23212023AJEBA107828.pdf] Text
Oladoyinbo23212023AJEBA107828.pdf - Published Version

Download (349kB)

Abstract

In today's digital age, businesses use cloud services to boost their operations exponentially. While this trend presents excellent potential, it is marred by significant concerns over the safety of data stored in the cloud. As the demand for cloud computing increases, businesses face issues ranging from data breaches and provider security to service availability and regulatory compliance. It becomes crucial for organizations to enact stringent security protocols not only to protect user information but also to smoothen operational processes, enforce regulatory compliance, and delineate user behavior norms. To fortify cloud assets, businesses must adhere to foundational security guidelines covering confidentiality, risk analysis, e-discovery, business resilience, and third-party contract obligations. Therefore, while the cloud's advantages are manifold, they have intricate challenges. Businesses must prioritize impenetrable security, craft meticulous risk strategies, and fortify against potential threats to harness the full potential of cloud services while preserving their assets and reputation. These results show that most respondents have a confidence level of 7, indicating a relatively high level of trust in the current cloud security measures. Organizations must continuously assess and adapt their cloud security strategies to keep up with the dynamic digital environment and evolving threats for long-term security and operational efficacy.

Item Type: Article
Subjects: Academic Digital Library > Social Sciences and Humanities
Depositing User: Unnamed user with email info@academicdigitallibrary.org
Date Deposited: 26 Oct 2023 04:20
Last Modified: 26 Oct 2023 04:20
URI: http://publications.article4sub.com/id/eprint/2552

Actions (login required)

View Item
View Item