Categories
Uncategorized

Security Concerns, Risk Issues, and Legal Aspects

Week 3 Readings and Media Please review the following for this week:     Vic (J.R.) Winkler, Securing the Cloud, Cloud Computer Security Techniques and Tactics,…

Week 3 Readings and Media
Please review the following for this week:
    Vic (J.R.) Winkler, Securing the Cloud, Cloud Computer Security Techniques and Tactics, 2011, Chapter 3    NIST SP 800-125A SECURITY RECOMMENDATIONS FOR HYPERVISOR DEPLOYMENT ON SERVERS, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-125A.pdfVideo:    Public Cloud Security: Surviving in a Hostile Multitenant Environmenthttps://www.youtube.com/watch?v=lk4eCARD1RU—————————————————————————————-Week 3 ASSIGNMENT: Security Concerns, Risk Issues, and Legal Aspects (2 pages)
Write two pages using this weeks reading and media. APA Format and provide two references at a minimum.
Write two paragraphs (for each answer) in a separate document that you can upload (e.g., Microsoft Word file). Precede each answer with the question and its corresponding number.1.    Privacy laws attempt to provide protection to an individual from unauthorized disclosure of the individuals personally identifiable information (PII). Please list and discuss items that are normally considered as a persons individual identifiers.2.    Using virtualized systems introduces many new risks, while maintaining many if not most of the risks inherent in using traditional systems. Please identify and discuss some risks to virtualized systems.
—————————————————————————————-Week 3 DISCUSSION: Cloud Privacy (1 page)
Write one page using this weeks reading material and video. APA Format and provide two references at a minimum.
One area that is greatly affected by cloud computing is privacy. Its important to remember that although the control of cloud computing privacy has many threats and vulnerabilities in common with non-cloud processes and infrastructure, it also has unique security issues.  Discuss some of the impacts on an organization of exploits that can result in a privacy loss for the organization.

CLICK HERE

Leave a Reply

Your email address will not be published. Required fields are marked *