SlideShare a Scribd company logo
1 of 2
Respond agree or disagree
There is still an argument that whether the cloud system
provides better security or not. The author clearly states that,
the risk management depends on the deployment factors and
security infrastructure existing in the organization. The writer
also indicates about risk equation to evaluate the pros and cons
of cloud regarding risk management and vulnerability
(Lindstrom, 2015).
Pros of Cloud in Risk Management and Vulnerability
Scale and Flexibility: Since the need for cloud increases, the
importance of managing vulnerability, considering risk
management and other important factors also grows
dramatically (Zhang, 2017).
Coverage and Visibility: In cloud system, there is a high
possibility of coverage and visibility of assets, security and
polices and guidelines that will help to understand the risk
management and vulnerability of the cloud (Zhang, 2017)
Proactive Response: Security can be embedded during
deployment and will provide a better protection method
proactively (Zhang, 2017).
Cons of Cloud in Risk Management and Vulnerability
Change in Level of Threat: Due to the availability of the data to
more people, there is more activity going on. Attackers use this
opportunity to find vulnerability and make an attack. The threat
increases once the data is available in the internet (Lindstrom,
2015).
Attackers Cost Benefit: Attackers do not spend more time by
research and training. They always calculate their benefit. So,
when data is available in the cloud, hackers will get good
opportunity to attack the cloud (Lindstrom, 2015).
Deployment Risk: There is a high chance of vulnerability when
the application environment is moving from the legacy system
to highly distributed, virtualized architecture. The author also
explains the possibility of collateral damage simply because the
public cloud system is shared with others (Lindstrom, 2015).
Lindstrom, P. (2015). Better Cloud Security: Do the
Math. Information security, 12-16. Retrieved from
http://eds.a.ebscohost.com.lopes.idm.oclc.org/ehost/detail/detail
vid=0&sid=1ad4da93-9ce3-40be-a335-002e2cfe796d%40sdc-v-
sessmgr02&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1za
XRl#db=aci&AN=108883675
Zhang, E. (2017, August, 31). Cloud Computing Security
Benefits: InfoSec Pros Reveal the Top Benefits of the Cloud.
Retrieved from https://digitalguardian.com/blog/cloud
computing-security-benefits

More Related Content

Similar to Respond agree or disagree There is still an argument that whet.docx

Akamai 2018 Spring state of the Internet security report
Akamai 2018 Spring state of the Internet security reportAkamai 2018 Spring state of the Internet security report
Akamai 2018 Spring state of the Internet security reportYuriy Yuzifovich
 
PUBLIC CLOUD IN BUSINESS
PUBLIC CLOUD IN BUSINESSPUBLIC CLOUD IN BUSINESS
PUBLIC CLOUD IN BUSINESSVy Quoc Tran
 
Pivotal Role of HR in Cybersecurity
Pivotal Role of HR in CybersecurityPivotal Role of HR in Cybersecurity
Pivotal Role of HR in CybersecurityMatthew Rosenquist
 
Application Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementApplication Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementMel Drews
 
McAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats PredictionsMcAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats PredictionsMatthew Rosenquist
 
What is the future of cloud security linked in
What is the future of cloud security linked inWhat is the future of cloud security linked in
What is the future of cloud security linked inJonathan Spindel
 
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-Lillian Ekwosi-Egbulem
 
OverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateOverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateKashif Ali
 
Cloud Security: Techniques and frameworks for ensuring the security and priva...
Cloud Security: Techniques and frameworks for ensuring the security and priva...Cloud Security: Techniques and frameworks for ensuring the security and priva...
Cloud Security: Techniques and frameworks for ensuring the security and priva...IRJET Journal
 
SafeAssign Originality ReportSummer 2019 - Security Architecture.docx
SafeAssign Originality ReportSummer 2019 - Security Architecture.docxSafeAssign Originality ReportSummer 2019 - Security Architecture.docx
SafeAssign Originality ReportSummer 2019 - Security Architecture.docxjeffsrosalyn
 
Analysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docxAnalysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docxdaniahendric
 
Data security in cloud environment
Data security in cloud environmentData security in cloud environment
Data security in cloud environmentShivam Singh
 
A Review On Data Security In Cloud Computing
A Review On Data Security In Cloud ComputingA Review On Data Security In Cloud Computing
A Review On Data Security In Cloud ComputingYolanda Ivey
 
DDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNING
DDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNINGDDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNING
DDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNINGIJCI JOURNAL
 
Defending Your Institution Against Ransomware Attacks
Defending Your Institution Against Ransomware AttacksDefending Your Institution Against Ransomware Attacks
Defending Your Institution Against Ransomware AttacksMark D. Webster, Ph.D.
 
A Proposed Model for Datacenter in -Depth Defense to Enhance Continual Security
A Proposed Model for Datacenter in -Depth Defense to Enhance Continual SecurityA Proposed Model for Datacenter in -Depth Defense to Enhance Continual Security
A Proposed Model for Datacenter in -Depth Defense to Enhance Continual SecurityHossam Al-Ansary
 
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docxResearch Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docxaudeleypearl
 

Similar to Respond agree or disagree There is still an argument that whet.docx (20)

Ijsrp p5211
Ijsrp p5211Ijsrp p5211
Ijsrp p5211
 
Akamai 2018 Spring state of the Internet security report
Akamai 2018 Spring state of the Internet security reportAkamai 2018 Spring state of the Internet security report
Akamai 2018 Spring state of the Internet security report
 
PUBLIC CLOUD IN BUSINESS
PUBLIC CLOUD IN BUSINESSPUBLIC CLOUD IN BUSINESS
PUBLIC CLOUD IN BUSINESS
 
Pivotal Role of HR in Cybersecurity
Pivotal Role of HR in CybersecurityPivotal Role of HR in Cybersecurity
Pivotal Role of HR in Cybersecurity
 
Application Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementApplication Threat Modeling In Risk Management
Application Threat Modeling In Risk Management
 
McAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats PredictionsMcAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats Predictions
 
What is the future of cloud security linked in
What is the future of cloud security linked inWhat is the future of cloud security linked in
What is the future of cloud security linked in
 
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
 
Security research trends in 2020
Security research trends in 2020Security research trends in 2020
Security research trends in 2020
 
OverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateOverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrate
 
Cloud Security: Techniques and frameworks for ensuring the security and priva...
Cloud Security: Techniques and frameworks for ensuring the security and priva...Cloud Security: Techniques and frameworks for ensuring the security and priva...
Cloud Security: Techniques and frameworks for ensuring the security and priva...
 
SafeAssign Originality ReportSummer 2019 - Security Architecture.docx
SafeAssign Originality ReportSummer 2019 - Security Architecture.docxSafeAssign Originality ReportSummer 2019 - Security Architecture.docx
SafeAssign Originality ReportSummer 2019 - Security Architecture.docx
 
Analysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docxAnalysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docx
 
Data security in cloud environment
Data security in cloud environmentData security in cloud environment
Data security in cloud environment
 
A Review On Data Security In Cloud Computing
A Review On Data Security In Cloud ComputingA Review On Data Security In Cloud Computing
A Review On Data Security In Cloud Computing
 
cloud1_aggy.pdf
cloud1_aggy.pdfcloud1_aggy.pdf
cloud1_aggy.pdf
 
DDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNING
DDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNINGDDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNING
DDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNING
 
Defending Your Institution Against Ransomware Attacks
Defending Your Institution Against Ransomware AttacksDefending Your Institution Against Ransomware Attacks
Defending Your Institution Against Ransomware Attacks
 
A Proposed Model for Datacenter in -Depth Defense to Enhance Continual Security
A Proposed Model for Datacenter in -Depth Defense to Enhance Continual SecurityA Proposed Model for Datacenter in -Depth Defense to Enhance Continual Security
A Proposed Model for Datacenter in -Depth Defense to Enhance Continual Security
 
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docxResearch Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
 

More from peggyd2

Respond 1For better detection of the specific fraud I wou.docx
Respond 1For better detection of the specific fraud I wou.docxRespond 1For better detection of the specific fraud I wou.docx
Respond 1For better detection of the specific fraud I wou.docxpeggyd2
 
Respond to 1 peers Discussion 6200Choose a colleague’s post .docx
Respond to 1 peers Discussion 6200Choose a colleague’s post .docxRespond to 1 peers Discussion 6200Choose a colleague’s post .docx
Respond to 1 peers Discussion 6200Choose a colleague’s post .docxpeggyd2
 
Respond substantively to the initial posts of at least two of your p.docx
Respond substantively to the initial posts of at least two of your p.docxRespond substantively to the initial posts of at least two of your p.docx
Respond substantively to the initial posts of at least two of your p.docxpeggyd2
 
Respond 1The AICPA Code of Conduct is based on six princi.docx
Respond 1The AICPA Code of Conduct is based on six princi.docxRespond 1The AICPA Code of Conduct is based on six princi.docx
Respond 1The AICPA Code of Conduct is based on six princi.docxpeggyd2
 
Respond in the following waysAsk a probing question.Share a.docx
Respond in the following waysAsk a probing question.Share a.docxRespond in the following waysAsk a probing question.Share a.docx
Respond in the following waysAsk a probing question.Share a.docxpeggyd2
 
Respond in a paragraph to the discussion board. In your response.docx
Respond in a paragraph to the discussion board. In your response.docxRespond in a paragraph to the discussion board. In your response.docx
Respond in a paragraph to the discussion board. In your response.docxpeggyd2
 
Respond in a paragraph the discussion board. In your response,.docx
Respond in a paragraph the discussion board. In your response,.docxRespond in a paragraph the discussion board. In your response,.docx
Respond in a paragraph the discussion board. In your response,.docxpeggyd2
 
RESPOND EACH STUDENT 200 WORDSRonnie Sims Week 4 Rodgers vs..docx
RESPOND EACH STUDENT 200 WORDSRonnie Sims Week 4 Rodgers vs..docxRESPOND EACH STUDENT 200 WORDSRonnie Sims Week 4 Rodgers vs..docx
RESPOND EACH STUDENT 200 WORDSRonnie Sims Week 4 Rodgers vs..docxpeggyd2
 
Respond for this posting one paragraph  with two references and cita.docx
Respond for this posting one paragraph  with two references and cita.docxRespond for this posting one paragraph  with two references and cita.docx
Respond for this posting one paragraph  with two references and cita.docxpeggyd2
 
Respond by Day 7 to at least one of your colleagues postings .docx
Respond by Day 7 to at least one of your colleagues postings .docxRespond by Day 7 to at least one of your colleagues postings .docx
Respond by Day 7 to at least one of your colleagues postings .docxpeggyd2
 
Respond by providing at least two contributions for improving .docx
Respond by providing at least two contributions for improving .docxRespond by providing at least two contributions for improving .docx
Respond by providing at least two contributions for improving .docxpeggyd2
 
Respond agree or disagreeVulnerabilities in system design can .docx
Respond agree or disagreeVulnerabilities in system design can .docxRespond agree or disagreeVulnerabilities in system design can .docx
Respond agree or disagreeVulnerabilities in system design can .docxpeggyd2
 
Respond by Day 5 to at least one of your colleagues postings .docx
Respond by Day 5 to at least one of your colleagues postings .docxRespond by Day 5 to at least one of your colleagues postings .docx
Respond by Day 5 to at least one of your colleagues postings .docxpeggyd2
 
Respond 250 Do you think IGOs create a convergence of state .docx
Respond 250 Do you think IGOs create a convergence of state .docxRespond 250 Do you think IGOs create a convergence of state .docx
Respond 250 Do you think IGOs create a convergence of state .docxpeggyd2
 
Respiratory Attendance QuestionsDue 114 at 6pPlease an.docx
Respiratory Attendance QuestionsDue 114 at 6pPlease an.docxRespiratory Attendance QuestionsDue 114 at 6pPlease an.docx
Respiratory Attendance QuestionsDue 114 at 6pPlease an.docxpeggyd2
 
Resource Page 69 of Managing Innovation and Entrepreneurship,.docx
Resource Page 69 of Managing Innovation and Entrepreneurship,.docxResource Page 69 of Managing Innovation and Entrepreneurship,.docx
Resource Page 69 of Managing Innovation and Entrepreneurship,.docxpeggyd2
 
Respond & Disagree ! Try to choose a post that you respectfully disa.docx
Respond & Disagree ! Try to choose a post that you respectfully disa.docxRespond & Disagree ! Try to choose a post that you respectfully disa.docx
Respond & Disagree ! Try to choose a post that you respectfully disa.docxpeggyd2
 
Respond to one of the following question using the lessons a.docx
Respond to one of the following question using the lessons a.docxRespond to one of the following question using the lessons a.docx
Respond to one of the following question using the lessons a.docxpeggyd2
 
Respond 1Impetigo The purpose of this discussion is to revie.docx
Respond 1Impetigo The purpose of this discussion is to revie.docxRespond 1Impetigo The purpose of this discussion is to revie.docx
Respond 1Impetigo The purpose of this discussion is to revie.docxpeggyd2
 
Respond to the following 2 prompts below..1. According to Maxw.docx
Respond to the following 2 prompts below..1. According to Maxw.docxRespond to the following 2 prompts below..1. According to Maxw.docx
Respond to the following 2 prompts below..1. According to Maxw.docxpeggyd2
 

More from peggyd2 (20)

Respond 1For better detection of the specific fraud I wou.docx
Respond 1For better detection of the specific fraud I wou.docxRespond 1For better detection of the specific fraud I wou.docx
Respond 1For better detection of the specific fraud I wou.docx
 
Respond to 1 peers Discussion 6200Choose a colleague’s post .docx
Respond to 1 peers Discussion 6200Choose a colleague’s post .docxRespond to 1 peers Discussion 6200Choose a colleague’s post .docx
Respond to 1 peers Discussion 6200Choose a colleague’s post .docx
 
Respond substantively to the initial posts of at least two of your p.docx
Respond substantively to the initial posts of at least two of your p.docxRespond substantively to the initial posts of at least two of your p.docx
Respond substantively to the initial posts of at least two of your p.docx
 
Respond 1The AICPA Code of Conduct is based on six princi.docx
Respond 1The AICPA Code of Conduct is based on six princi.docxRespond 1The AICPA Code of Conduct is based on six princi.docx
Respond 1The AICPA Code of Conduct is based on six princi.docx
 
Respond in the following waysAsk a probing question.Share a.docx
Respond in the following waysAsk a probing question.Share a.docxRespond in the following waysAsk a probing question.Share a.docx
Respond in the following waysAsk a probing question.Share a.docx
 
Respond in a paragraph to the discussion board. In your response.docx
Respond in a paragraph to the discussion board. In your response.docxRespond in a paragraph to the discussion board. In your response.docx
Respond in a paragraph to the discussion board. In your response.docx
 
Respond in a paragraph the discussion board. In your response,.docx
Respond in a paragraph the discussion board. In your response,.docxRespond in a paragraph the discussion board. In your response,.docx
Respond in a paragraph the discussion board. In your response,.docx
 
RESPOND EACH STUDENT 200 WORDSRonnie Sims Week 4 Rodgers vs..docx
RESPOND EACH STUDENT 200 WORDSRonnie Sims Week 4 Rodgers vs..docxRESPOND EACH STUDENT 200 WORDSRonnie Sims Week 4 Rodgers vs..docx
RESPOND EACH STUDENT 200 WORDSRonnie Sims Week 4 Rodgers vs..docx
 
Respond for this posting one paragraph  with two references and cita.docx
Respond for this posting one paragraph  with two references and cita.docxRespond for this posting one paragraph  with two references and cita.docx
Respond for this posting one paragraph  with two references and cita.docx
 
Respond by Day 7 to at least one of your colleagues postings .docx
Respond by Day 7 to at least one of your colleagues postings .docxRespond by Day 7 to at least one of your colleagues postings .docx
Respond by Day 7 to at least one of your colleagues postings .docx
 
Respond by providing at least two contributions for improving .docx
Respond by providing at least two contributions for improving .docxRespond by providing at least two contributions for improving .docx
Respond by providing at least two contributions for improving .docx
 
Respond agree or disagreeVulnerabilities in system design can .docx
Respond agree or disagreeVulnerabilities in system design can .docxRespond agree or disagreeVulnerabilities in system design can .docx
Respond agree or disagreeVulnerabilities in system design can .docx
 
Respond by Day 5 to at least one of your colleagues postings .docx
Respond by Day 5 to at least one of your colleagues postings .docxRespond by Day 5 to at least one of your colleagues postings .docx
Respond by Day 5 to at least one of your colleagues postings .docx
 
Respond 250 Do you think IGOs create a convergence of state .docx
Respond 250 Do you think IGOs create a convergence of state .docxRespond 250 Do you think IGOs create a convergence of state .docx
Respond 250 Do you think IGOs create a convergence of state .docx
 
Respiratory Attendance QuestionsDue 114 at 6pPlease an.docx
Respiratory Attendance QuestionsDue 114 at 6pPlease an.docxRespiratory Attendance QuestionsDue 114 at 6pPlease an.docx
Respiratory Attendance QuestionsDue 114 at 6pPlease an.docx
 
Resource Page 69 of Managing Innovation and Entrepreneurship,.docx
Resource Page 69 of Managing Innovation and Entrepreneurship,.docxResource Page 69 of Managing Innovation and Entrepreneurship,.docx
Resource Page 69 of Managing Innovation and Entrepreneurship,.docx
 
Respond & Disagree ! Try to choose a post that you respectfully disa.docx
Respond & Disagree ! Try to choose a post that you respectfully disa.docxRespond & Disagree ! Try to choose a post that you respectfully disa.docx
Respond & Disagree ! Try to choose a post that you respectfully disa.docx
 
Respond to one of the following question using the lessons a.docx
Respond to one of the following question using the lessons a.docxRespond to one of the following question using the lessons a.docx
Respond to one of the following question using the lessons a.docx
 
Respond 1Impetigo The purpose of this discussion is to revie.docx
Respond 1Impetigo The purpose of this discussion is to revie.docxRespond 1Impetigo The purpose of this discussion is to revie.docx
Respond 1Impetigo The purpose of this discussion is to revie.docx
 
Respond to the following 2 prompts below..1. According to Maxw.docx
Respond to the following 2 prompts below..1. According to Maxw.docxRespond to the following 2 prompts below..1. According to Maxw.docx
Respond to the following 2 prompts below..1. According to Maxw.docx
 

Recently uploaded

How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17Celine George
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesAmanpreetKaur157993
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaEADTU
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFVivekanand Anglo Vedic Academy
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfPondicherry University
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxneillewis46
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....Ritu480198
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文中 央社
 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MysoreMuleSoftMeetup
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxLimon Prince
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...Nguyen Thanh Tu Collection
 
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfContoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfcupulin
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportDenish Jangid
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjMohammed Sikander
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...EduSkills OECD
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxAdelaideRefugio
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 

Recently uploaded (20)

How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategies
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
 
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
 
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfContoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 

Respond agree or disagree There is still an argument that whet.docx

  • 1. Respond agree or disagree There is still an argument that whether the cloud system provides better security or not. The author clearly states that, the risk management depends on the deployment factors and security infrastructure existing in the organization. The writer also indicates about risk equation to evaluate the pros and cons of cloud regarding risk management and vulnerability (Lindstrom, 2015). Pros of Cloud in Risk Management and Vulnerability Scale and Flexibility: Since the need for cloud increases, the importance of managing vulnerability, considering risk management and other important factors also grows dramatically (Zhang, 2017). Coverage and Visibility: In cloud system, there is a high possibility of coverage and visibility of assets, security and polices and guidelines that will help to understand the risk management and vulnerability of the cloud (Zhang, 2017) Proactive Response: Security can be embedded during deployment and will provide a better protection method proactively (Zhang, 2017). Cons of Cloud in Risk Management and Vulnerability Change in Level of Threat: Due to the availability of the data to more people, there is more activity going on. Attackers use this opportunity to find vulnerability and make an attack. The threat increases once the data is available in the internet (Lindstrom, 2015). Attackers Cost Benefit: Attackers do not spend more time by research and training. They always calculate their benefit. So, when data is available in the cloud, hackers will get good opportunity to attack the cloud (Lindstrom, 2015). Deployment Risk: There is a high chance of vulnerability when the application environment is moving from the legacy system to highly distributed, virtualized architecture. The author also
  • 2. explains the possibility of collateral damage simply because the public cloud system is shared with others (Lindstrom, 2015). Lindstrom, P. (2015). Better Cloud Security: Do the Math. Information security, 12-16. Retrieved from http://eds.a.ebscohost.com.lopes.idm.oclc.org/ehost/detail/detail vid=0&sid=1ad4da93-9ce3-40be-a335-002e2cfe796d%40sdc-v- sessmgr02&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1za XRl#db=aci&AN=108883675 Zhang, E. (2017, August, 31). Cloud Computing Security Benefits: InfoSec Pros Reveal the Top Benefits of the Cloud. Retrieved from https://digitalguardian.com/blog/cloud computing-security-benefits