Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Walden Dissertations and Doctoral Studies

Legal Studies

2017

Cloud attacks

Articles 1 - 1 of 1

Full-Text Articles in Social and Behavioral Sciences

Security Strategies For Hosting Sensitive Information In The Commercial Cloud, Edward Steven Forde Jan 2017

Security Strategies For Hosting Sensitive Information In The Commercial Cloud, Edward Steven Forde

Walden Dissertations and Doctoral Studies

IT experts often struggle to find strategies to secure data on the cloud. Although current security standards might provide cloud compliance, they fail to offer guarantees of security assurance. The purpose of this qualitative case study was to explore the strategies used by IT security managers to host sensitive information in the commercial cloud. The study's population consisted of information security managers from a government agency in the eastern region of the United States. The routine active theory, developed by Cohen and Felson, was used as the conceptual framework for the study. The data collection process included IT security manager …