You are on page 1of 4

Owens 1

Kristina Owens
Prof Owens
CSIT 101 EKA
21 September 2014

1
Information Literacy Assignment
1& 2) In the article, "Security challenges for cloud environments" by Ram Lakshminarayanan,
he explains that the introduction of the "cloud" has demanded that more extensive measures
towards privacy and IT security be taken. He goes into detail about the seven areas of security
risk surrounding cloud environments provided by the Cloud Security Alliance. Those areas
include, cloud service abuse, where users can register and use cloud services immediately,
making the service vulnerable to cybercriminals, spamming, etc. Another area would be data
loss. Because data can be easily compromised, certain sensitive information like financial and
customer records has to be protected from unauthorized access or it can run the risk of being
deleted. Overall if these challenges are not met with more secure measures to protect privacy,
many businesses may easily be compromised, identities may be stolen, and the list goes on.
3) I used words like "cloud security challenges" "cloud privacy challenges" "privacy on
cloud" "cloud security concerns"
Google gave me an article called, "Cloud Security: We're Asking the Wrong Questions"
Bing gave me an articles called, "Apple Will Add Extra Measures to iCloud.."
Owens 2

2
In my opinion, Bing may have been the better search engine. Although Google gave me
many more options, Bing had fewer options that were more specific to the topic I was
researching. I did not have to view a million pages to finally find what I was looking for.
4) Time - The article by Roger A. Grimes called, "Cloud Security: We're Asking the Wrong
Questions." was published September 10, 2014 and has not been updated since.
Relevance - It discusses the topic of cyber security and the vulnerabilities of any internet
program or service that deals with sensitive information and how it can be compromised by
online hackers.
Authority - Roger A. Grimes has written multiple computer security books, holds over 40
computer certifications and works for Microsoft as a computer security architect.
Accuracy - The information is trustworthy because it comes from a reliable source.
There is evidence throughout the article supporting the idea that almost any program can be
vulnerable to be compromised.
Purpose - The article was written to inform people that the cloud is a new system and
there will be kinks and places for improvement and that is something we must all remember.
5) Some key words I used to find the journals were "cloud security" "icloud security" "cloud
security problems" "cloud privacy concerns"
I used ScienceDirect because it actually had the word science unlike some of the other
databases I searched through.
Owens 3
3
I also used the Business Source Premier it was a database that I saw multiple times when
looking for information on cloud computing and privacy concerns.
6) Using the internet to do research is very different from doing research in the databases for
me. Because I am used to surfing the internet, I would much rather do research through that
source but I know that in college, I will have to adjust to using both heavily. When researching
the internet based article, "Security Challenged for Cloud Environments," it was easy to find
almost everything. The hardest thing for me to find was the publisher but one of the most
difficult parts of researching on the internet is finding a credible source because almost anyone
can compromise a website these days. When researching in the database, everything seemed
much more specific which can sometimes help you to find things in a more timely manner.
Because you know the database, you can almost be certain that it is a credible source but all and
all the hardest part for me was actually finding out which database the journal belonged to.

Owens 4



4
Work Cited Page
Cook, Tim. "Apple Will Add Extra Security Measures To ICloud, Says Tim Cook |
TechCrunch." TechCrunch. N.p., 10 Sept. 2014. Web. 20 Sept. 2014.
Grimes, Roger A. "Cloud Security: We're Asking the Wrong Questions." InfoWorld. N.p., 10
Sept. 2014. Web. 20 Sept. 2014.
Kalloniatis, Christos, Haralambos Mouratidis, Manousakis Vassilis, Shareeful Islam, Stefanos
Gritzalis, and Evangelia Kavakli. "Towards the Design of Secure and Privacy-oriented
Information Systems in the Cloud: Identifying the Major Concepts." Computer Standards
& Interfaces (2013): pag 1-7. ScienceDirect. Journal Article/Web. 20 Sept. 2014.
Lakshminarayana, Ram. "Security Challenges for Cloud." ZDNet. CBS Interactive, 19 Sept.
2014. Web. 20 Sept. 2014.
Mihir, Nanavati, Patrick Colp, Bill Aiello, and Andrew Warfield. Cloud Security: A Gathering
Storm (2014): pag 1-10. Business Source Premier. Journal Article/Web. 20 Sept. 2014.

You might also like