Identify cloud computing security risks

Assignment Help Computer Network Security
Reference no: EM131458370

Assignment: LASA: Cloud Computing Virtual Overview

Description of LASA:

For this assignment, you will use Microsoft PowerPoint and Jing to create a professional, cloud-based presentation of approximately 10-15 slides. Your presentation will provide a summative overview that reflects on the material that was covered in Modules 1-5 on cloud computing. Review the scenario and follow the directions below to develop and upload your presentation.

Scenario:

You have recently accepted a position as the director of New Cloud Initiatives at CloudHR, a company that provides various cloud-based solutions for human resource applications. During your first week, the CloudHR's director of sales and marketing informed you that his or her sales team is spending considerable time explaining the basics of cloud computing to prospective customers. He or she asks you to prepare a high-level overview presentation on cloud computing as well as provide a link to the uploaded presentation. This way, his or her team can forward the link to prospective customers.

Tasks:

In your 10- to 15-slide presentation, include the following along with detailed speaker's notes:

• Define and describe cloud computing as it relates to one's business and personal needs.
• Using real-world examples from current providers, explain what an organization should consider when reviewing each one of the following services:

o Software as a service (SaaS)
o Platform as a service (PaaS)
o Infrastructure as a service (IaaS)

• Discuss and justify the benefits of cloud computing for both providers and consumers of cloud services. Make sure you include:

o The benefits associated with the pay-on-demand nature of cloud computing.
o The ways with which cloud computing assists with business risks, such as mitigation of security risks and disaster recovery.
o A comparison of horizontal and vertical scalability with respect to the cloud's ability to scale on demand.

• Explain the accessibility advantages offered by cloud computing as opposed to traditional network-based access.

• Analyze virtualization and explain how it differs from cloud computing.

• Identify cloud computing security risks and recommend ways to mitigate those risks.

• Hypothesize about the future of the cloud as it relates to meeting business needs.

• Download Jing (a cloud-based presentation provider) and use it to capture your Microsoft PowerPoint presentation.

• Access the Screencast website to upload your Microsoft PowerPoint presentation. Ensure that it can be properly streamed.

Note: If you have any trouble utilizing any of the websites, please refer to the respective website's available support features or contact your instructor.

Your final deliverable will be a Microsoft PowerPoint presentation (captured in Jing and uploaded on www.screencast.com), which will be approximately 10-15 slides in length (including detailed speaker's notes). Utilize at least three scholarly or professional sources (beyond your textbook) in your research. Your presentation should be written in a clear, concise, and organized manner; demonstrate ethical scholarship in accurate representation and attribution of sources; and display accurate spelling, grammar, and punctuation.

Reference no: EM131458370

Questions Cloud

Dollar loan in peso-denominated interest : what would be the cost to Bimbo of its dollar loan in peso-denominated interest?
Talk about something that was troubling : Select a conversation in which the other person wanted to talk about something that was troubling him or her.
Small business loan of a nominal rate of interest : AJ takes out a small business loan of $15500 at a nominal rate of interest of 8.7% convertible quarterly.
Default risk premium on the corporate bond : What is the default risk premium on the corporate bond
Identify cloud computing security risks : Identify cloud computing security risks and recommend ways to mitigate those risks. Analyze virtualization and explain how it differs from cloud computing.
Until the company has been incorporated : “Until the company has been incorporated it cannot contract or do any other act.
What are total finance charges over that four year period : Jennifer wants to buy some furniture for her new apartment. What are the total finance charges over that four- year period?
What is the equilibrium of the game : Consider the nonatomic routing game shown in the left figure (i). What is the "equilibrium" of the game in (i) and the corresponding travel time of all traffic?
Relationship of these factors to situation outcomes : As you read the chapters, think about pertinent issues and the relationship of these factors to situation outcomes.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd