I need help with this. Using various Internet sources, find an article or websit
ID: 3548960 • Letter: I
Question
I need help with this.
Using various Internet sources, find an article or website on an information security topic that is of interest to you.
Prepare a 1-2 page paper evaluating the article or website. Refer to the note on Evaluative Writing below.
Click the link below: This is the website article I have chosen to do the paper on. I need help with the paper not help finding a website.
http://www.infoworld.com/d/cloud-computing/cloud-computing-2014-moving-zero-trust-security-model-233274
Evaluative Writing
Explanation / Answer
The article chosen is about the status of Cloud Computing in 2014. It gives an in-depth accounting about the recent changes in cloud computing brought about by the hugely controversial NSA surveillance programs leaks by Edward Snowden. I firmly stand with the article which says that instead of people shying away from cloud, service providers will take leaps and bounds towards increasing its security.
Right after the NSA leaks, business began to slow down for the US-based Cloud Computing seriveces. Firms like Information Technology and Innovation Foundation and Cloud Security Alliance began to report a decrease in sales. But this impact was not to stay for long. As the article points out, "The business benefits of cloud-based services continue to supersede enterprise fears of government snooping."
Simultaneously, cloud service providers have taken an interest in encrypting all the data using latest techniques like end-to-end encryprtion. The biggies like Google and Microsoft have already started looking into it and are positive that by the end of this year, they would have successfully encrypted and protected all their cloud-based data.
Another breakthrough in securing one's data might be clients acquiring the ownership of the key of encryption. I think this is an excellent idea to propagate. Companies like Vaultive, CipherCloud and TrendMicro have already started implementing this. This way, providers will not be able to provide the keys to snooping companies even if they have some leverage. The keys would be made and stored locally by the clients.
Regionalization is another consequence of the Snowden data leaks. For example, clients in the China and Asia-Pacific region are mostly apprehensive about using the US-based cloud services. Hence, local firms have found an increase in demand for their services. Further, the biggies in US haves started branching out, i.e., opening branches in other regions which faciliates lower delivery costs and better performance.
Last but not the least, Government transparency is yet another positive result of the infamous data leaks. Google, Microsoft and other tech giants have written an open letter to US President Obama demanding government surveillance reform and increased transparency. It is a small step towards a transparent and crystal clear system but at least in the right direction. Even Verizon plans to release a transparency report that details law enforcement requests for its customer data.