ITC568 Cloud Privacy and Security: Semester Presentation
VerifiedAdded on 2025/06/21
|23
|775
|444
AI Summary
Desklib provides solved assignments and past papers to help students succeed.

ITC568 - Cloud Privacy
and Security
Student name:
Student ID:
and Security
Student name:
Student ID:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Introduction
This presentation will cover the following
areas related to case study:
Impact of using SaaS applications and
locations on the security posture of DAS
Impact of operational solutions on the
threats and risks for the privacy and
security of data
Implications of privacy and security of the
location of data processing for DAS
Issues of data sensitivity
Issues of data sovereignty
This presentation will cover the following
areas related to case study:
Impact of using SaaS applications and
locations on the security posture of DAS
Impact of operational solutions on the
threats and risks for the privacy and
security of data
Implications of privacy and security of the
location of data processing for DAS
Issues of data sensitivity
Issues of data sovereignty

Security Impact of using SaaS applications and
locations
Positive impact
Multiple locations allow the
backup of data
Ensure high availability of
services
Data recovery
locations
Positive impact
Multiple locations allow the
backup of data
Ensure high availability of
services
Data recovery
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Security Impact of using SaaS applications and
locations
Positive
impact
Ensures data
integrity
Seamless
upgrades
High
availability
locations
Positive
impact
Ensures data
integrity
Seamless
upgrades
High
availability
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Positive impacts

Security Impact of using SaaS
applications and locations
Negative impact
Data transmission risk: As the data is
traveled a long distance, there are
chances of data theft during this
transmission.
Less visibility of data: Implementing
the SaaS solution for data storage will
cause less visibility of data.
Lack of control: Organization may not
fully control the data and permission
with distributed services.
applications and locations
Negative impact
Data transmission risk: As the data is
traveled a long distance, there are
chances of data theft during this
transmission.
Less visibility of data: Implementing
the SaaS solution for data storage will
cause less visibility of data.
Lack of control: Organization may not
fully control the data and permission
with distributed services.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Security Impact of using SaaS
applications and locations
Negative impact
Risk related to internet: As all
the data is on the cloud that is
connected to the internet, there
are high chances of data leakage
or data disclosure
Public cloud threats: The cloud
deployment model is public which
increases which is less secure
than the private cloud
applications and locations
Negative impact
Risk related to internet: As all
the data is on the cloud that is
connected to the internet, there
are high chances of data leakage
or data disclosure
Public cloud threats: The cloud
deployment model is public which
increases which is less secure
than the private cloud
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Security Impact of using SaaS applications and
locations
Negative
impact
BYOD
Insider threat
Weak
authentication
system
Account
hijacking
locations
Negative
impact
BYOD
Insider threat
Weak
authentication
system
Account
hijacking

Impact of operational solutions
on the threats and risk
Positive impact
Reduce the chances of
physical intervention: People
will no be able to steal the data
manually.
Eliminates wiretapping
Reduces the scenario of identity
misuse
Add an additional level of
security
on the threats and risk
Positive impact
Reduce the chances of
physical intervention: People
will no be able to steal the data
manually.
Eliminates wiretapping
Reduces the scenario of identity
misuse
Add an additional level of
security
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Impact of operational solutions
on the threats and risk
Negative
impact
API expose
Denial of
service
Digital identity
theft
on the threats and risk
Negative
impact
API expose
Denial of
service
Digital identity
theft
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Impact of operational solutions
on the threats and risk
Negative
impact
Connectivity
to internet
Data leakage
Violation of
SLA
on the threats and risk
Negative
impact
Connectivity
to internet
Data leakage
Violation of
SLA

Implications for DAS of data
processing location
Different time
zone
Government
regulation
Natural
hazards
Accessibility
processing location
Different time
zone
Government
regulation
Natural
hazards
Accessibility
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 23
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





