You are on page 1of 2

Discuss a key issue of a security aspect or concern in application migration

Application migration is a process of change in which there are some security

risks and concerns for the company and one of which being the security of data while

being transferred. For example if the applications are being migrated to a cloud system

and when data is being transferred to a cloud network, there is a risk that the firms will

lose control over the data once the data is transferred the cloud network because the

company will depend upon the cloud vendor for the security the data and the control

over the data will be lost by the company. A number of companies have grown to be

accountable for the protection of their own critical information and the information

related to customers and with the migration, the data location will be changed. In this

situation there is a need for a paradigm shift such a way that the business can protect

its data.

References

Khajeh-Hosseini, A., Greenwood, D., Sommerville, I., (2010). Cloud Migration: A Case

Study of Migrating an Enterprise IT System to IaaS. Submitted to IEEE CLOUD 2010

M. Casassa-Mont, S. Pearson and P. Bramhall, “Towards Accountable Management of

Identity and Privacy: Sticky Policies and Enforceable Tracing Services”, Proc. DEXA

2003, IEEE Computer Society, 2003, pp. 377-382

Discuss one issue and example where change management helps reduce risk

As we have discussed how the process of application migration has security

issues related the data migration or data transfer from one system to another for
example to a cloud based system. The risk can be reduced by an effective change

management plan and strategies. The change management activities like staff

competency assessment and the project assessment will help reduces the risks of the

data security. The staff competency assessment will help the company understand the

skill levels of the staff of the cloud vender and if there are any gaps in the skills, they

can be identified so that it can be made sure that the data of the company will be and

right and secure hands. The project assessment will help the company monitor the

project before the start and after the completion of the project because it will help the

company assess the plan, system process and targets of the application migration

project. So the effective change management will help reduce the risk of data security

during the application migration process.

References

A Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters. Fully secure functional

encryption: Attribute-based encryption and (hierarchical) inner product encryption. In

Advances in Cryptology - EUROCRYPT 2010. Springer, 2010

You might also like