Constant change in the technology landscape has been mirrored by the steady evolution of information security. The current information system environment is increasingly complex, comprising storage, servers, LANs/WANs, workstations, Unified Communications, Intranet, and Internet connections.Read more
Short answer: No.
We can think about the risks associated with public cloud computing in terms of the CIA triad, which are:
Confidentiality – Information is only available to those who are authorized to use it
Integrity – Information is what it purports to be. Transactions are authentic and unmodified in flight
Availability – Information is accessible when it’s needed
If we consider a public cloud solution from a standpoint of CIA, we quickly realize that the security risks that are associated with cloud are not really new risks.Read more