Please Read the following articles on Cloud Security and
their Associated Risks:
·
Christodorescu, M.,
Sailer, R., Schales, D. L., Sgandurra, D., & Zamboni, D. (2009, November).
Cloud security is not (just) virtualization security: a short paper. In Proceedings
of the 2009 ACM workshop on Cloud computing security(pp. 97-102). ACM.
·
Fogarty, K. (2012, August 10). The
biggest cloud computing security risk is impossible to eliminate. Retrieved
from http://www.networkcomputing.com/security/the-biggest-cloud-computing-security-ris/240005337
·
Kinsella, J. (2012, September 26). 5
(more) key cloud security issues. Retrieved from http://www.csoonline.com/article/717307/5-more-key-cloud-security-issues
- Discuss with your classmates why Cloud Security is
different from that of traditional network architectures and what you think the
future holds for Cloud Security and it's adoption rate with company's.
What are some technologies and solutions that can be used to reduce risk
for the "Cloud" or "Cloud Data" .
Your answer should include the terms, concepts, and theories
learned thus far. Cite each source used. No credit will be given if Wikipedia
is used. Your answer should be a minimum of 250 words. To
post, click on the Topic title (e.g., Week 7 Forum to access
the topic and then click the "Post New Thread" button.
Part 2 of 2
(1)Research VPNs
(2)Discuss what they are and some common techniques used to try and subvert their security.
(2)Discuss what they are and some common techniques used to try and subvert their security.
Your
answer should include the terms, concepts, and theories learned thus far. Cite
each source used. No credit will be given if Wikipedia is used. Your
answer should be a minimum of 250 words. To post, click on the
Topic title (e.g., Week 7 Forum to access the topic and then
click the "Post New Thread" button.
Click Here To Get More On This Paper!!!!
No comments:
Post a Comment