Information security management in cloud computing : a case study |
|
Author: | Penjala, Joni1 |
Organizations: |
1University of Oulu, Faculty of Information Technology and Electrical Engineering, Department of Information Processing Science, Information Processing Science |
Format: | ebook |
Version: | published version |
Access: | open |
Online Access: | PDF Full Text (PDF, 1 MB) |
Pages: | 63 |
Persistent link: | http://urn.fi/URN:NBN:fi:oulu-201906052441 |
Language: | English |
Published: |
Oulu : J. Penjala,
2019
|
Publish Date: | 2019-06-10 |
Thesis type: | Master's thesis |
Tutor: |
Shao, Xiuyan |
Reviewer: |
Karppinen, Pasi Shao, Xiuyan |
Description: |
Abstract Organizations are quickly adopting cloud computing in their daily operations. As a result, spending’s on cloud security solutions are increasing in conjunction with security threats redirecting to the cloud. Information security is a constant race against evolving security threats and it also needs to advance in order to accommodate the cloud computing adaptation. The aim of this thesis is to investigate the topics and issues that are related to information security management in cloud computing environments. Related information security management issues include risk management, security technology selection, security investment decision-making, employees’ security policy compliance, security policy development, and security training. By interviewing three different types of actors (normal employees, IT security specialists, and security managers) in a large ICT-oriented company, this study attempts to get different viewpoints related with the introduced issues and provide suggestions on how to improve information security management in cloud computing environments. This study contributes to the community by attempting to give a holistic perspective on information security management in the specific setting of cloud computing. Results of the research illustrate how investment decisions directly affect all other covered topics that in turn have an effect on one another, forming effective information security. see all
|
Subjects: | |
Copyright information: |
© Joni Penjala, 2019. This publication is copyrighted. You may download, display and print it for your own personal use. Commercial use is prohibited. |