logo

2CLOUD SECURITY CLOUD SECURITY Cloud Security Name of the Student Name of the University Author's Note: Executive Summary

   

Added on  2020-03-13

19 Pages4535 Words120 Views
Theoretical Computer Science
 | 
 | 
 | 
Running head: CLOUD SECURITYCloud SecurityName of the StudentName of the UniversityAuthor’s Note:
2CLOUD SECURITY CLOUD SECURITY Cloud Security Name of the Student Name of the University Author's Note: Executive Summary_1

1CLOUD SECURITYExecutive SummaryThe main objective of this report is to understand the basic concept of cloud security. The wideset of various technologies and strategies that are utilized to secure the information, data andseveral applications are known as cloud computing security. This cloud security helps the usersto secure their data with basic encryption algorithms. The following report helps to understandthe basic case study of Department of Administrative Services or DAS. Two important strategiesare provided in the report. They are the privacy strategy for data and the personal data protectionstrategy proposal. These two strategies are described with perfect details and description. Properrecommendations are also provided for both the strategies.
2CLOUD SECURITY CLOUD SECURITY Cloud Security Name of the Student Name of the University Author's Note: Executive Summary_2

2CLOUD SECURITYTable of ContentsIntroduction......................................................................................................................................4Discussion........................................................................................................................................5DAS.............................................................................................................................................51. Privacy Strategy for Personal Data..........................................................................................61.1 Management of Personal Information...............................................................................61.2 Collection and Management of Solicited Personal Information........................................61.3 Use and Disclosure of Personal Information.....................................................................71.4 Use and Security of Digital Identities................................................................................71.5 Security of Personal Information.......................................................................................81.6 Access to Personal Information.........................................................................................81.7 Quality and Correction of Personal Information...............................................................82. Recommended Privacy Controls.............................................................................................93. Personal Data Protection Strategy.........................................................................................113.1 Protection of Personal Information..................................................................................113.2 Authorized Access and Disclosure of Personal Information...........................................123.3 De-identification of Personal Data..................................................................................123.4 Use of Personal Digital Identities....................................................................................123.5 Security of Personal Data................................................................................................133.6 Archiving of Personal Data.............................................................................................13
2CLOUD SECURITY CLOUD SECURITY Cloud Security Name of the Student Name of the University Author's Note: Executive Summary_3

3CLOUD SECURITY4. Recommended Personal Data Protection Strategy................................................................13Conclusion.....................................................................................................................................14References......................................................................................................................................16
2CLOUD SECURITY CLOUD SECURITY Cloud Security Name of the Student Name of the University Author's Note: Executive Summary_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
ITC 568 - Cloud Security and Privacy Report
|34
|10001
|50

Cloud Computing Report 2022
|24
|7085
|19

Investigation Data Privacy and Security Australia Report 2022
|24
|6742
|9

Cloud Privacy and Security Assignment
|31
|9505
|142

Cloud Privacy and Privacy Policy
|25
|7029
|142

Cloud Computing Assignment - Cloud Privacy and Security
|24
|7063
|98