despite the increased assurance by cloud computing vendors, the integrity of the company’s information is still vulnerable to unwanted access. german federal office for information security, it-grundschutz catalogues, bonn, germany, 13th edition, 2013.
with a framework of general information security management processes derived from standards of the iso 27000 family the most important information security processes for health care organizations using cloud computing will be identified considering the main risks regarding cloud computing and the type of information processed. reynolds, “cloud computing: a new business paradigm for biomedical information sharing,” journal of biomedical informatics, vol.
wilson, “the critical success factor method: establishing a foundation for enterprise security management,” july 2004. additionally this team is responsible for the network security and they thus work to ensure that both the hardware and the software of the company (usually firewall and firewall operating system) work according to the set standards and thus ensuring that unwanted data packets are blocked from entering the company’s servers (whitman & mattord, 2011).
these authentication platforms have continuously faced security threats from smart hackers. german federal office for information security, bsi-standard 100-1, bonn, germany, 2008.
some of the essential services provided by it in a company includes; network management, provision of secure http access in the web browser and ensuring network connection security. hibbert, “an integrated framework for safety, quality and risk management: an information and incident management system based on a universal patient safety classification,” quality and safety in health care, vol.