Over a decade ago, cloud computing became an important topic for small and large businesses alike. The new concept promises scalability, security, cost reduction, portability, and availability. While addressing this issue over the past several years, there have been intensive discussions about the importance of cloud computing technologies. Therefore, this paper reviews the transition from traditional computing to cloud computing and the benefit for businesses, cloud computing architecture, cloud computing services classification, and deployment models. Furthermore, this paper discusses the security policies and types of internal risks that a small business might encounter implementing cloud computing technologies. It addresses initiatives towards employing certain types of security policies in small businesses implementing cloud computing technologies to encourage small business to migrate to cloud computing by portraying what is needed to secure their infrastructure using traditional security policies without the complexity used in large corporations.<\/p>","DOI":"10.4018\/ijcac.2011040103","type":"journal-article","created":{"date-parts":[[2011,10,19]],"date-time":"2011-10-19T16:07:18Z","timestamp":1319040438000},"page":"29-40","source":"Crossref","is-referenced-by-count":5,"title":["Applying Security Policies in Small Business Utilizing Cloud Computing Technologies"],"prefix":"10.4018","volume":"1","author":[{"given":"Louay","family":"Karadsheh","sequence":"first","affiliation":[{"name":"ECPI University, USA"}]},{"given":"Samer","family":"Alhawari","sequence":"additional","affiliation":[{"name":"Applied Science Private University, Jordan"}]}],"member":"2432","reference":[{"key":"ijcac.2011040103-0","doi-asserted-by":"publisher","DOI":"10.1108\/17410391011019732"},{"key":"ijcac.2011040103-1","doi-asserted-by":"crossref","unstructured":"Bronk, C. (2008). Hacking the nation-state: Security, information technology and policies of assurance. Information Security Journal: A Global Perspective, 17(3), 132-142.","DOI":"10.1080\/19393550802178565"},{"key":"ijcac.2011040103-2","doi-asserted-by":"crossref","unstructured":"Buyya, R., Yeo, C. S., & Venugopal, S. (2008). Market-oriented cloud computing: Vision, hype, and reality for delivering IT Services as computing utilities. In Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications (p. 1).","DOI":"10.1109\/HPCC.2008.172"},{"key":"ijcac.2011040103-3","doi-asserted-by":"publisher","DOI":"10.1108\/10650751011073607"},{"key":"ijcac.2011040103-4","unstructured":"Cesare, S., & Xiang, Y. (2010). Classification of malware using structured control flow. In Proceedings of the Eighth Australasian Symposium on Parallel and Distributed Computing, Brisbane, Australia. (Vol. 107)."},{"key":"ijcac.2011040103-5","doi-asserted-by":"crossref","unstructured":"Clarke, R. (2010). User requirements for cloud computing architecture. In Proceedings of the 10th IEEE\/ACM International Conference on Cluster, Cloud and Grid Computing (pp. 623-630).","DOI":"10.1109\/CCGRID.2010.20"},{"key":"ijcac.2011040103-6","unstructured":"Cloud Computing World. (2010). Why your small business needs cloud computing. Retrieved from http:\/\/www.cloudcomputingworld.org\/cloud-computing-for-businesses\/why-your-small-business-needs-cloud-computing.html"},{"key":"ijcac.2011040103-7","unstructured":"Cloud Security Alliance. (2009). Security guidance for critical areas of focus in cloud computing V2.1. Retrieved from http:\/\/www.privatecloud.com\/2010\/01\/26\/security-guidance-for-critical-areas-of-focus-in-cloud-computing-v2-1\/?fbid=uCRTvs9w3Cs"},{"key":"ijcac.2011040103-8","unstructured":"Computer Technology Documentation Project. (2010). Network and computer security tutorial 2010. Retrieved from http:\/\/www.comptechdoc.org\/"},{"key":"ijcac.2011040103-9","doi-asserted-by":"publisher","DOI":"10.1145\/1290958.1290971"},{"key":"ijcac.2011040103-10","first-page":"43","author":"S.Diver","year":"2007","journal-title":"Information security policy \u2013 a development guide for large and small companies"},{"key":"ijcac.2011040103-11","unstructured":"European Network and Information Security Agency. (2009). Cloud computing - benefits, risks and recommendations for information security. Retrieved from http:\/\/itlaw.wikia.com\/wiki\/Cloud_Computing:_Benefits,_Risks,_and_Recommendations_for_Information_Security"},{"key":"ijcac.2011040103-12","doi-asserted-by":"publisher","DOI":"10.1145\/1735223.1735232"},{"key":"ijcac.2011040103-13","doi-asserted-by":"publisher","DOI":"10.1145\/1364782.1364786"},{"key":"ijcac.2011040103-14","unstructured":"Heath, N. (2010). How cloud computing will help government save taxpayer \u00a33.2bn. Retrieved from http:\/\/www.silicon.com\/management\/public-sector\/2010\/01\/27\/how-cloud-computing-will-help-government-save-taxpayer-32bn-39745389\/"},{"key":"ijcac.2011040103-15","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(02)00504-7"},{"key":"ijcac.2011040103-16","doi-asserted-by":"publisher","DOI":"10.1108\/09685229910292817"},{"key":"ijcac.2011040103-17","doi-asserted-by":"publisher","DOI":"10.1080\/10658980701744861"},{"issue":"2","key":"ijcac.2011040103-18","first-page":"185","article-title":"A model for mobile agent security in e-business applications.","volume":"2","author":"A.Kannammal","year":"2007","journal-title":"International Journal of Business and Information"},{"key":"ijcac.2011040103-19","doi-asserted-by":"publisher","DOI":"10.1108\/09565691011064340"},{"key":"ijcac.2011040103-20","doi-asserted-by":"publisher","DOI":"10.1108\/07419050911010741"},{"issue":"6","key":"ijcac.2011040103-21","first-page":"50","article-title":"The NIST definition of cloud computing.","volume":"53","author":"P.Mell","year":"2010","journal-title":"Communications of the ACM"},{"key":"ijcac.2011040103-22","unstructured":"Moran, J. (2010). ZScaler web security cloud for small business. Retrieved from http:\/\/www.smallbusinesscomputing.com\/webmaster\/article.php\/3918716\/ZScaler-Web-Security-Cloud-for-Small-Business.htm"},{"key":"ijcac.2011040103-23","unstructured":"Morris, M. (n. d.). Employee theft schemes. Retrieved from http:\/\/www.cowangunteski.com\/documents\/EmployeeTheftSchemes_001.pdf"},{"key":"ijcac.2011040103-24","doi-asserted-by":"publisher","DOI":"10.1201\/1086\/44119.13.1.20040301\/80433.6"},{"key":"ijcac.2011040103-25","doi-asserted-by":"crossref","unstructured":"Preda, S., Cuppens, F., & Cuppens-Boulahia, N. Alfaro.J., Toutain, L., & Elrakaiby, Y. (2009). Semantic context aware security policy deployment. In Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, Sydney, Australia.","DOI":"10.1145\/1533057.1533092"},{"key":"ijcac.2011040103-26","year":"2006","journal-title":"Information security policy templates"},{"key":"ijcac.2011040103-27","first-page":"72","article-title":"Cloud security for small businesses. In Proceedings of the Allied Academies International Conference of the Academy of Information &","volume":"14","author":"M.Srinivasan","year":"2010","journal-title":"Management Science"},{"key":"ijcac.2011040103-28","unstructured":"Standage, T. (2002). The weakest link. The Economist, 11-14."},{"key":"ijcac.2011040103-29","doi-asserted-by":"crossref","unstructured":"Swanson, M., & Guttman, B. (1996). Generally accepted principles and practices for securing information technology systems. Retrieved from http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-14\/800-14.pdf","DOI":"10.6028\/NIST.SP.800-14"},{"key":"ijcac.2011040103-30","doi-asserted-by":"crossref","unstructured":"Twitchell, D. P. (2006). Social engineering in information assurance curricula. In Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, Kennesaw, GA.","DOI":"10.1145\/1231047.1231062"},{"key":"ijcac.2011040103-31","doi-asserted-by":"publisher","DOI":"10.1145\/1327512.1327513"},{"key":"ijcac.2011040103-32","author":"M.Whitman","year":"2009","journal-title":"Principles of information security"},{"issue":"1","key":"ijcac.2011040103-33","first-page":"1","article-title":"Cloud computing: Emerging legal issues for access to data, anywhere, anytime.","volume":"14","author":"M. H.Wittow","year":"2010","journal-title":"Journal of Internet Law"},{"key":"ijcac.2011040103-34","doi-asserted-by":"publisher","DOI":"10.1108\/17410391011088583"},{"key":"ijcac.2011040103-35","unstructured":"Zscaler. (2010). Zscaler web security cloud for small business. Retrieved from http:\/\/www.zscaler.com\/pdf\/brochures\/ds_zscalerforsmb.pdf"}],"container-title":["International Journal of Cloud Applications and Computing"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=54718","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T19:00:57Z","timestamp":1654110057000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijcac.2011040103"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2011,4,1]]},"references-count":36,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2011,4]]}},"URL":"https:\/\/doi.org\/10.4018\/ijcac.2011040103","relation":{},"ISSN":["2156-1834","2156-1826"],"issn-type":[{"value":"2156-1834","type":"print"},{"value":"2156-1826","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,4,1]]}}}