Uncategorized

Security Models and Cloud Operations Essay

Security Models and Cloud Operations Essay

From the first e-Activity, analyze the industry researched for each security model would be most applicable, and explain why you believe that to be the case. Identify the security models from your findings.
From the second e-Activity, ascertain the primary way in which the organization that you researched was able to leverage a cloud solution while overcoming its security concerns. Discuss whether or not you believe that the security concerns surrounding cloud operations are warranted. Justify your answers with real-world examples from applicable situations, where appropriate.
Use the Internet for at least two (2) articles describing an industry using three (3) different security models. Also, read the National Cybersecurity Center Policy Capture, located at http://www.whitehouse.gov/files/documents/cyber/CybersecurityCentersGraphic.pdf. Be prepared to discuss. Note: Wikipedia and similar Websites do not qualify as quality resources.
Research the Internet for one (1) real-world example of where a corporation has deployed a part of its operations to the cloud and addressed organization security along the way. Also, reference the US Government Cloud Computing Technology Roadmap Volume II, located athttp://www.nist.gov/itl/cloud/upload/SP_500_293_volumeII.pdf. Be prepared to discuss.

Is this the question you were looking for? If so, place your order here to get started!

×