Applying Security Policies in Small Business Utilizing Cloud Computing Technologies | IGI Global Scientific Publishing
Reference Hub5
Applying Security Policies in Small Business Utilizing Cloud Computing Technologies

Applying Security Policies in Small Business Utilizing Cloud Computing Technologies

Louay Karadsheh, Samer Alhawari
Copyright: © 2011 |Volume: 1 |Issue: 2 |Pages: 12
ISSN: 2156-1834|EISSN: 2156-1826|EISBN13: 9781613505960|DOI: 10.4018/ijcac.2011040103
Cite Article Cite Article

MLA

Karadsheh, Louay, and Samer Alhawari. "Applying Security Policies in Small Business Utilizing Cloud Computing Technologies." IJCAC vol.1, no.2 2011: pp.29-40. https://doi.org/10.4018/ijcac.2011040103

APA

Karadsheh, L. & Alhawari, S. (2011). Applying Security Policies in Small Business Utilizing Cloud Computing Technologies. International Journal of Cloud Applications and Computing (IJCAC), 1(2), 29-40. https://doi.org/10.4018/ijcac.2011040103

Chicago

Karadsheh, Louay, and Samer Alhawari. "Applying Security Policies in Small Business Utilizing Cloud Computing Technologies," International Journal of Cloud Applications and Computing (IJCAC) 1, no.2: 29-40. https://doi.org/10.4018/ijcac.2011040103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Over a decade ago, cloud computing became an important topic for small and large businesses alike. The new concept promises scalability, security, cost reduction, portability, and availability. While addressing this issue over the past several years, there have been intensive discussions about the importance of cloud computing technologies. Therefore, this paper reviews the transition from traditional computing to cloud computing and the benefit for businesses, cloud computing architecture, cloud computing services classification, and deployment models. Furthermore, this paper discusses the security policies and types of internal risks that a small business might encounter implementing cloud computing technologies. It addresses initiatives towards employing certain types of security policies in small businesses implementing cloud computing technologies to encourage small business to migrate to cloud computing by portraying what is needed to secure their infrastructure using traditional security policies without the complexity used in large corporations.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global Scientific Publishing bookstore.