logo

Cloud Technology and Fundamentals | Assignment

5 Pages1198 Words18 Views
   

Added on  2022-09-07

Cloud Technology and Fundamentals | Assignment

   Added on 2022-09-07

ShareRelated Documents
Running head: CLOUD TECHNOLOGY AND FUNDAMENTALS
CLOUD TECHNOLOGY AND FUNDAMENTALS
Name of the Student:
Name of the University:
Author Note:
Cloud Technology and Fundamentals | Assignment_1
CLOUD TECHNOLOGY AND FUNDAMENTALS1
Question 1: What are some of the measures that can be taken to ensure that
data in a cloud environment is secure? Include techniques for data-at-rest vs.
data-in-transit encryption.
Answer:
The businesses usually use the cloud storage to store their sensitive data in a centralized
location. The cloud technology thus deals with multiple data security threats where the attackers
always try to phish the data to exploit the business and its reputation (Almorsy, Grundy &
Müller, 2016). The business data are required to be secured such that they can perform their
business operations efficiently. There are numerous data security measures for the cloud
technology. The primary measures are such as:
Encryption Technique: In this method, the sensitive business data is transformed to an
unreadable form. This technique helps the business top retain the availability,
confidentiality and integrity of the business data (Daemen & Rijmen, 2013). The
encryption method primarily transforms the data into an unreadable form such that if an
attacker gains the information he or she cannot read the information as well as cannot
able to misuse the acquired information. In this method, there is a secret key using which
a user can easily read the information. The information can only be accessed using the
secret key. The receiver end should have the decryption key for reading the sent
information (Gorbunov, Vaikuntanathan & Wee, 2015). Encryption can be of two types:
public key encryption and symmetric encryption. The primary purpose of the data
encryption is to secure digital data from the attacker or hackers. The encryption
algorithms give confidentiality as well as security to the drive data by dealing with non –
Cloud Technology and Fundamentals | Assignment_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Principle and Method in Cryptographic Security | Discussion
|4
|638
|19

Security in Information Technology | Assignments
|13
|3545
|119

Encryption Techniques Assignment 2022
|9
|2287
|7

Analysis of Router cipher algorithm
|7
|1355
|83

Encryption Algorithm Assignment
|6
|1103
|186

Network Security: Cryptography, Data in Transit and Rest, Cloud Computing
|10
|1928
|459