The purpose of this article is to discuss the risks and reasons of adopting the cloud computing in the critical infrastructure within the government context of cloud computing adoption. The article will also present examples of cloud computing adoption in the critical infrastructure domain. The data used in the paper was gathered from different academic, governmental, and online sources. It was found that, although there are risks involved in the cloud computing adoption, governments are deploying cloud computing using different deployment models and reaching high level of deployment within the critical infrastructure. The findings of this study suggest that it is not a question of adopting or not anymore, but the question of how to mitigate the risks involved after the deployment.
History
Journal
International Journal of Cyber Warfare and Terrorism
Volume
10
Season
July-September
Pagination
47-58
Location
Hershey, Pa.
ISSN
1947-3435
eISSN
1947-3443
Language
eng
Publication classification
C1 Refereed article in a scholarly journal, C Journal article