Loading...
Please wait, while we are loading the content...
Strategies Used by Cloud Security Managers to Implement Secure Access Methods
| Content Provider | Semantic Scholar |
|---|---|
| Author | Harmon, Eric S. |
| Copyright Year | 2018 |
| Abstract | Strategies Used by Cloud Security Managers to Implement Secure Access Methods by Eric Harmon MS, Kaplan University, 2014 BS, Strayer University, 2012 Doctoral Study Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Information Technology Walden University December 2017 Abstract Cloud computing can be used as a way to access services and resources for many organizations; however, hackers have created security concerns for users that incorporate cloud computing in their everyday functions. The purpose of this qualitative multiple case study was to explore strategies used by cloud security managers to implement secureCloud computing can be used as a way to access services and resources for many organizations; however, hackers have created security concerns for users that incorporate cloud computing in their everyday functions. The purpose of this qualitative multiple case study was to explore strategies used by cloud security managers to implement secure access methods to protect data on the cloud infrastructure. The population for this study was cloud security managers employed by 2 medium size businesses in the Atlanta, Georgia metropolitan area and that have strategies to implement secure access methods to protect data on the cloud infrastructure. The technology acceptance model was used as the conceptual framework for the study. Data were collected from semi-structured interviews of 7 security managers and review of 21 archived documents that reflected security strategies from past security issues that occurred. Data analysis was performed using methodological triangulation and resulted in the identification of three major themes: implementing security policies, implementing strong authentication methods, and implementing strong access control methods. The findings from this research may contribute to positive social by decreasing customers’ concerns regarding personal information that is stored on the cloud being compromised. Strategies Used by Cloud Security Managers to Implement Secure Access Methods by Eric Harmon MS, Kaplan University, 2014 BS, Strayer University, 2012 Doctoral Study Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Information Technology |
| File Format | PDF HTM / HTML |
| Alternate Webpage(s) | https://scholarworks.waldenu.edu/cgi/viewcontent.cgi?article=6007&context=dissertations |
| Language | English |
| Access Restriction | Open |
| Content Type | Text |
| Resource Type | Article |