Essential Reading: Baron, H., Heide, S., Mahmud, S., & Yeoh, J. (2019). Cloud Security Complexity: Challenges in Managing Security in Hybrid and Multi-Cloud Environments. Retrieved from https://cl
Introduction:
Security of Employee Data
S.No
Security Threat/Risk Description
Likelihood
Impact
Priority
Preventive Actions
Contingency Plans
1.
1.
2.
1.
2.
2.
3.
4.
5.
Existing security threats to Employee data
Likelihood - VL, L,M, H, VH
Impact- - VL, L,M, H, VH
Priority- - VL, L, M,H, VH
Explain issues
1.
2.
3.
.
.
.
.
S.No | New Security Threat/Risk of employee data Description (after moving to Saas) | Likelihood | Impact | Priority | Preventive Actions | Contingency Plans |
1. | 1. 2. | 1. 2. | ||||
2. | ||||||
3. | ||||||
4. | ||||||
5. | ||||||
10. |
New Security Threat to Employee data (after moving to SaaS)
Likelihood - VL, L,M, H, VH Impact- - VL, L,M, H, VH Priority- - VL, L, M,H, VH
Explain issues
1.
2.
3.
4.
5.
Severity of risk and threat to security employee data
Probability |
|
|
|
|
|
Very High |
|
|
|
|
|
High |
|
|
|
|
|
Medium |
|
|
|
|
|
Low |
|
|
|
|
|
Very Low |
|
|
|
|
|
Severity | Very Low | Low | Medium | High | Very High |
Privacy of Employee Data
Existing privacy threats and risks to the privacy of employee data
S.No | Privacy Threat/Risk Description (Employee data) | Likelihood (Probability) | Impact (Severity) | Priority | Preventive Actions | Contingency Plans |
1. | 1. 2. | 1. 2. | ||||
2. | ||||||
3. | ||||||
4. | ||||||
5. |
Explain issues
1.
2.
3.
4.
5……
S.No | New Privacy Threat/Risk of employee data Description (after moving to Saas) | Likelihood | Impact | Priority | Preventive Actions | Contingency Plans |
1. | 1. 2. | 1. 2. | ||||
2. | ||||||
3. | ||||||
4. | ||||||
5. |
New Security Threat to Employee data (after moving to SaaS)
Likelihood - VL, L,M, H, VH
Impact- - VL, L,M, H, VH
Priority- - VL, L, M,H, VH
Explain issues
1.
2.
3.
4.
5.
6.
7.
Severity of risk and threat to privacy employee data
Probability |
|
|
|
|
|
Very High |
|
|
|
|
|
High |
|
|
|
|
|
Medium |
|
|
|
|
|
Low |
|
|
|
|
|
Very Low |
|
|
|
|
|
Severity | Very Low | Low | Medium | High | Very High |
Digital Identity Issues (threats and risks to the digital identities of Government employees from the move to SaaS applications)
1. Name - Explain briefly
2.
3.
4.
5.
6.
.
Conclusion:
References:
1.
2.