Question

In: Accounting

The Cloud Effect" Please respond to the following: 1. Many firms are relying on cloud computing,...

The Cloud Effect" Please respond to the following:

1. Many firms are relying on cloud computing, also known as “the cloud,” to perform key business functions. By moving transactional processing to the cloud, firms are exposing themselves to additional attacks as well as to tighter scrutiny from regulators and stakeholders. From the e-Activity, assume that you are the CFO of Amazon.com. Create an argument indicating how your firm will be able to balance the needs of security with the desire of being a dominant player in the global market.

2. As the CFO, describe your top-three fears in competing in the global market, and how you plan to overcome those fears. Provide support for your rationale.

Solutions

Expert Solution

1. As CFO of Amazon.com, in order to balance needs of security I would hire a team of hackers to do penetration testing. Of course, there would need to authorization and authentication controls in place to ensures that only those who are given access to these systems are using them and gives the company another form of an audit trail. Types of authentication can be passwords, personal identification numbers, ID badges, or biometric identifiers. Without relying on cloud computing is not possible to survive in competitive market. Only through which we can become dominant player in the Global market. By follow above authorisation and authentication controls as CFO of Amazon.com we abletobalance the needs of security with the desire of being a dominant player in the Global Market.

2. As the CFO, there are several fears in a competing global market, which include intense competition, losses from foreign exchange, and data losses, and other security breaches. According to (Kappel, 2014), there are ways to deal with intense competitions which include differentiating our business from the competition, ignore the competition by being a leader in theindustry, do not underestimate the competition and do not play dirty. Foreign exchange risk is inherent to doing business in a global market, so companies need to mitigate that risk when possible. A few ways this risk can be mitigated, according to (Lander), include requiring payment in US dollars, requiring short payment periods to avoid fluctuation in exchange rates, considering charging more to foreign customers to offset potential foreign exchange rate losses and hedging to avoid negative swings. To protect against data losses and other security breaches, it will be important to train employees on how to avoid attempts from outside threats trying to access the system as well as continuing to develop and communicate security plans, policies, andprocedures concerning data losses and other security breaches.


Related Solutions

The Cloud Effect" Please respond to the following 1. Many firms are relying on cloud computing,...
The Cloud Effect" Please respond to the following 1. Many firms are relying on cloud computing, also known as “the cloud,” to perform key business functions. By moving transactional processing to the cloud, firms are exposing themselves to additional attacks as well as to tighter scrutiny from regulators and stakeholders. From the e-Activity, assume that you are the CFO of Amazon.com. Create an argument indicating how your firm will be able to balance the needs of security with the desire...
Many firms are relying on cloud computing, also known as “the cloud,” to perform key business...
Many firms are relying on cloud computing, also known as “the cloud,” to perform key business functions. By moving transactional processing to the cloud, firms are exposing themselves to additional attacks as well as to tighter scrutiny from regulators and stakeholders. From the e-Activity, assume that you are the CFO of Amazon.com. Create an argument indicating how your firm will be able to balance the needs of security with the desire of being a dominant player in the global market....
1. Please compare “Cloud Computing” with “Cloud Storage” and the integral parts used in both, and...
1. Please compare “Cloud Computing” with “Cloud Storage” and the integral parts used in both, and provide examples. 2. What is social network & it's influence on today's society? Give examples of social network..
Subject: Cloud computing A cloud provider can have many cloud consumers who are using one or...
Subject: Cloud computing A cloud provider can have many cloud consumers who are using one or more services. However, there can be a number of challenges and events that can threaten the regular levels of service. Explain how the cloud providers can address these challenges and threats?
Explain why cloud computing is likely to revolutionize the way firms acquire and use information technology...
Explain why cloud computing is likely to revolutionize the way firms acquire and use information technology resources.
With the rapid growth of cloud computing, many organizations are contracting with third party service providers...
With the rapid growth of cloud computing, many organizations are contracting with third party service providers to process and store all kinds of data off site. In doing so, entities are now dependent on the effectiveness of controls provided by external software providers and data centers that are used to generate and store a huge volume of data of important information for making critical decisions. 1 What challenges do you see the auditor faced with when auditing a client who...
Getting Organized" Please respond to the following: Manny Fresh uses the Cloud to store his music...
Getting Organized" Please respond to the following: Manny Fresh uses the Cloud to store his music tracks and other important files. Share with your instructor and peers your thoughts on the following: Try one (1) online storage tool that you have never used before, such as Google Drive, Dropbox , Box.com, or OneDrive. Note: Some of these services also offer priced options with additional storage capabilities, but just sign up for the free account for the purposes of this activity....
1. Explain the common security threat concept in the cloud. [Hint : chapter 9] Cloud Computing,...
1. Explain the common security threat concept in the cloud. [Hint : chapter 9] Cloud Computing, Kris Jamsa, 2013, Johns & Bartlett Learning, ISBN: 978-1- 4496-4739-1
Why do firms outsource their IT functions? Explain the options of traditional IT outsourcing and cloud computing, and how they differ.
Why do firms outsource their IT functions? Explain the options of traditional IT outsourcing and cloud computing, and how they differ.  
Describe the following cloud computing principles:   Organizational boundaries (to include the trust boundary) Cloud delivery models...
Describe the following cloud computing principles:   Organizational boundaries (to include the trust boundary) Cloud delivery models (Iaas, PaaS, SaaS) Multi-tenant and resource pooling
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT