Data to Intelligence
Data refers to the raw and unarguable facts that are precise. Information defines the combination of data into a format that is able to respond to simple everyday questions. Intelligence combines information in order to give individuals or organizations the ability to formulate informed decisions. Essentially, the transformation of multiple pieces of data into information can then lead to intelligence (Matallah et al., 2017). Cloud computing is able to process large amounts of data which can improve the utilization of later formed information and intelligence.
Cloud Computing Security
The main risks concerning data, information, and intelligence in cloud computing include compliance violations, malware infections, identity theft, and data breaches. When implementing cloud computing for a business, the firm may cede some control of their information to the provider. There is a risk of data loss or breaches in the case that the provider’s servers may be accessed by a third party (Balachandran & Prasad, 2017). However, most providers of cloud computing offer substantial resources in security research and safeguard implementation.
Cloud Computing and Concealed Conduits
Radvanovsky and McDougall (2019) refer to the cloud as a concealed conduit in terms of cloud computing security. It suggests that the cloud does not enter the access control measures of a known network but latches onto points that have data, information, and intelligence passing outside a known and trusted network (Qureshi et al., 2021). As such, this can encourage cloud computing in terms of open-source information and intelligence as this method is able to track traveling data and spot any tampering from untrusted entities.
Open Source Information and Intelligence
According to the FOIA, there are a number of limitations in open access to information and intelligence, especially concerning national security, law enforcement records, and personal privacy (United States of America National Security Archive, 2017). However, outside these subjects, open-source information and intelligence can be beneficial to critical infrastructure protection if they can be monitored through systems that assess for credibility and accuracy.
References
Balachandran, B. M., & Prasad, S. (2017). Challenges and benefits of deploying big data analytics in the cloud for business intelligence.Procedia Computer Science, 112, 1112-1122. Web.
Matallah, H., Belalem, G., & Bouamrane, K. (2017). Towards a new model of storage and access to data in big data and cloud computing. International Journal of Ambient Computing and Intelligence, 8(4), 31-45. Web.
Qureshi, K. N., Jeon, G., & Piccialli, F. (2021). Anomaly detection and trust authority in artificial intelligence and cloud computing. Computer Networks, 184. Web.
Radvanovsky, R., & McDougall, A. (2019). Critical infrastructure: Homeland security and emergency preparedness (4th ed.). Taylor & Francis Group.
United States of America, National Security Archive. FOIA Basics. National Security Archive, 2017.