Sie sind auf Seite 1von 2

1

Information Literacy
Jake Willis

1. Practical steps towards securing the enterprise cloud.
2. Summary
Rises in the number of criminals attacking online platforms, such as the cloud, are causing many
threats to the infrastructure of corporates. New attacks have become very difficult to detect with
modern antivirus securities. Three ways to limit the chance of these viruses are client security,
establishing API level controls and protecting the datacenter. A single password to access
something is no longer adequate. The cloud requires sophisticated authentication, like SSO.
Combine SSO with a two factor authentication and security will remain at a low risk for cloud
users. This causes much more difficulty to the attacker to get in rather than a password. The next
form of security is through service gateways. This allows interaction within cloud users.
Gateways authenticate APIs to ensure they are secure and internal infrastructure consumes
them. The final security feature for cloud based applications are hardware layers that use Intel
Technology (TXT). This enables a cloud environment to communicate with a strong root of trust
in the software layers that can quickly respond to threats. Protection of cloud enterprises is vital
and always changing to strengthen security of software/hardware and to minimize risk.
3. I used duckduckgo.com, and bing.com to search steps for cloud security. I found the article
Six Steps for Cloud Security through duckduckgo.com and also 7 Steps To Developing A
Cloud Security Plan through bing.com
The search results from both search engines gave multiple sources on my search, but
duckduckgo.com provided sources on all aspects of the topics and more adequate information.
Also bing.com had too many distracting ads and was harder to locate specific information I was
looking for.
4. Six Steps for Cloud Security
1. Written on September 25, 2013. It hasnt been updated since.
2. Yes it relates to my topic because it provides 6 steps for cloud security.
3. The author is Abhishek Ghosh. He is a surgical doctor so I think he may not be
qualified to write this article.
4. The information he provides in this article is trustworthy because he supports all of his
writing with evidence of his knowledge on the cloud and backs his reasoning. It hasnt
1

been tested for accuracy, but it can be validated by information on this topic in other
articles.
5. He wrote this article to inform all cloud users of potential threats and risks on ways to
protect and secure their cloud. He provided detailed information on ways to protect ones
data and ways to recognize/control threats.
5. I found the journal articles Tips on security for cloud accounts and How do you keep your
data secure? through the LexisNexis Academic database. I chose this database because my topic
best fit the description for this and the others werent related to my topic. .I searched steps for
cloud security, the same search for internet articles, to find these two articles.
6. Both the internet articles and the scholarly journal articles provide in depth information on my
topic, steps for cloud security. However, the process of locating and finding the correct topic
article were very different. The internet article was much easier to find and I was able to pinpoint
my specific topic quickly. The database search journal articles needed many more steps to locate
my topic and were more difficult and slower to find articles. The internet article is more timely
because it is more recent and discusses the most up-to-date information regarding cloud security.
The database journal article has a stronger authority because the author studies it and has more
knowledge on this specific topic then authors who have other professions and write about it.
7. MLA Format
Ghosh, Abhishek. Six Steps for Cloud Security. The Customize Windows, 25 September 2013.
Web. 21 September 2014

Grimes, David. 7 Steps to Developing a Cloud Security Plan. Cloud Security Alliance, 10
September 2012. Web. 21 September 2014

How do you keep your data secure? Edmonton Journal (Alberta), May 7, 2014 Wednesday,
NEWS; Pg. C7

Lakshminarayanan, Ram. Practical steps towards securing the enterprise cloud. ZDNet, 21
September 2014. Web. 21 September 2014

Tips on security for cloud accounts. Los Angeles Times, September 3, 2014 Wednesday.
Business Desk; Part B; Pg. 3, Salvador Rodriguez and Richard Winton

Das könnte Ihnen auch gefallen