logo

Identity-Based Auditing Mechanism From RSA

   

Added on  2022-08-19

13 Pages2910 Words12 Views
CLOUD COMPUTING SECURITY
Name of the Student:
Name of the University:
Author’s Note:
Running head: CLOUD COMPUTING SECURITY

CLOUD COMPUTING SECURITY
1

CLOUD COMPUTING SECURITY
2
Table of Contents
Introduction:-...................................................................................................................................3
Discussion:-.....................................................................................................................................3
Application:-................................................................................................................................3
Security Issues:-...........................................................................................................................4
Data breaches:-........................................................................................................................4
Unauthorized Access:-.............................................................................................................6
Data Loss:-...............................................................................................................................6
Security Solution:-.......................................................................................................................7
Data breach:-............................................................................................................................7
Unauthorized Access:-.............................................................................................................8
Data loss:-................................................................................................................................9
Conclusion:-.....................................................................................................................................9
References:-...................................................................................................................................10

CLOUD COMPUTING SECURITY
3
Introduction:-
Cloud computing is the on-demand accessibility of computer system resources,
particularly computing power and data storage, lacking direct active management by the
operator. The term is usually using to define data centers accessible to several operators over the
Internet. With cloud computing, operators can access documents and use applications from any
operator that can access the Internet (Kumar 2015). The security of cloud computing mentions to
a comprehensive set of rules, applications, technologies, and controls applied to defend
virtualized data, IP, services, applications, and the related structure of cloud computing. It is a
sub-domain of network security, computer security, and more approximately information
security. In this report, the writer will be discussing the security issues of cloud computing and
possible mitigation plan.
Discussion:-
Application:-
These securities of cloud computing measures are constructing to protect the information,
support supervisory amenability, and safeguard consumers' confidentiality as well as setting
certification instructions for specific devices and users (Duncan and Whittington 2016). These
security rules managed and configured in one place; management overheads are decreasing, and
IT teams sanctioned to concentrate on other business areas. It has developed different regions of
business processes. The user can use the cloud for several applications. These applications are
very much helpful to enhance modern technology and innovation.
The cloud providers take steps to defend data that’s in transit. Security approaches
include encryption, VPN, or masking. VPN permits remote workers to connect their corporate

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Virtual Private Network (VPN)
|14
|762
|297

Virtual Private Network: Types, Implementation, and Advantages
|12
|590
|259

Network Infrastructure Component Report 2022
|14
|2934
|16

Application of VPN to JKS Accountant
|13
|1078
|392

Virtual Private Network (VPN) - Benefits, Risks and Components | Desklib
|14
|879
|437

Network Security: Remote Access, Interconnecting Devices, and WAN Technologies
|9
|1459
|154