SlideShare a Scribd company logo
1 of 5
Please read the below two discussion posts and provide the
response for each discussion in 75 to 100 words.
Post#1
Nowadays, there are numerous advancements in technology. As
a result, the traditional workplace has gradually transformed
with home offices and virtual workplaces where employees can
hold meetings using video teleconferencing tools and
communicate through email and other applications such as Slack
(Montrief, et al., 2020). This makes the cloud more busy which
brings up the need for improved cloud security.
Generally, in a public cloud, there exists a shared
responsibility between the user and the Cloud Service Provider
(CSP). Due to the rise of cyber-related crimes over the years,
security for things like data classification, network controls and
physical security need clear owners. The division of such
responsibilities is called shared responsibility model for cloud
security. “According to Amazon Web Services (AWS), security
responsibility is shared by both CSP and CSC and they called it
as Shared Security Responsible Model” (Kumar, Raj, &
Jelciana, 2018). “While client and endpoint protection, identity
and access management and application level controls are a
shared responsibility the responsibility resides largely with the
client organization” (Lane, Shrestha, & Ali, 2017). However,
the responsibilities may vary depending on the cloud service
provider and the cloud environment the user is using to operate.
Nevertheless, despite the cloud services used, the burden of
protecting data lays upon the user.
Normally, security is broken down into two broad
categories: security of the cloud and security in the cloud.
Security of the cloud is a section of the shared responsibility
model handled by the cloud service provider. It comprises of
hardware, host operating systems and physical security of the
infrastructure. Most of these logistical challenges are offloaded
when an organization moves its operations to the cloud. In
contrast, security in the cloud is the security responsibility
handled by the user. “The cloud service customer is responsible
for securing and managing the applications that run in the
cloud, the operating systems, data-at-rest, data-in-transit,
policies and other responsibilities” (Bennett & Robertson,
2019). Since access to customer data remains the most critical
component in cloud computing, it also determined the level of
security in the cloud to be implemented by the customer.
The customer is responsible for the following
components. First, the customer is responsible for data security.
While the provider is responsible for automatically encrypting
data in transit and in storage, the customer is expected to
configure file system encryption and protection of network
traffic. Secondly, the customer is responsible for physical
security of computers and other devices used to access the
cloud. Thirdly, the customer is responsible for application
security. Security of managed applications may be handles by
cloud provider services, but the customer is responsible for
configuring those services accurately and correctly. Fourthly,
the customer is responsible for security hinges on identity and
access management in on-premises computing. The cloud
provider can implement authentication services but it’s the work
of the customer to configure them. Finally, the customer is
responsible for network security on-premises.
The cloud has various advantages such as scalability,
elasticity and flexible prices. However, security is remains a
critical business concern for many organizations (Xue & Xin,
2016). Regardless of which cloud service provider used, the
customer will always be responsible for managing the customer
data, analyzing workload, traffic and performance. When
implementing cloud projects, customers need to identify and
understand the risks associated with digitalization, public
networks and outsourcing of infrastructure components. Shared
responsibility in cloud computing depends on the agreement that
the customer has with the cloud service provider. This is
because there are specific tasks that can be logically handled by
the customer while other duties are handles by the service
provider such as ensuring physical access to the data center is
restricted to authorized personnel’s only.
Post#2
Cloud offers variety of services and virtual machine to an
organization at cost effective and is thus considered as one of
the most innovative advances in technology. The ability to scale
as well as stored and manage data increases by using cloud.
Regulatory compliance states the modification and the steps that
the organization should actively take to reach its goals. Good
regulatory compliances needs to be maintained while moving to
cloud so that any necessary precaution and post cloud changes
can be made to the organization thus moving it closure to the
goal and target. “There are straight-forward ways of modeling
future ownership and the progression of value creation using a
combination of capitalization table analysis and the venture
capital method of valuation” (Sammut, 2020).
Protecting the crucial and sensitive data while moving to cloud
is the major concern of the organization and database
administrator is an intrinsic component of the authorization and
control process towards regulatory compliance. DBA don’t
necessarily need to know who can access the system but are
necessary for database security and checking security breaches
and attacks. DBA most importantly needs to know about the
architecture of the cloud and the various components being
actively used by the organization while moving to cloud. An
understanding about the difference between on premises and
cloud services including the computing stack is also a
requirement for DBA. Along with that, the dba should also
know how to utilize all the components of the cloud both from
the point of view of administrator and developer. “While
current Passive optical network (PON) standards can provide
data transmission capacity of tens of Gbps, in the near future,
the use of more wavelengths with rates higher than 10 Gb/s
could see the overall capacity increase towards hundreds of
Gbps” (Afraz, 2018).
DBA also plays the crucial role in managing the budget for the
cloud database and thus should have the related information as
well as knowledge about application design and impact of cloud
database followed by the cost of impact. Studies suggest that it
is not recommended to move all the data at once to cloud, at
least not initially. The DBA thus needs to work for few days in
the hybrid setting of cloud and on-premises arrangement. DBA
should know the traditional skills to manage on premises
activities and also the advanced skill to deal with the cloud
activities and database. The initial movement of database to
cloud should only include the crucial and the important
effective data and thus DBA should use his understanding to
decide what data should be moved to cloud followed by
planning for the remaining data and deciding their time to move
to cloud. Dba needs to be aware about each component of cloud,
the organization services and the cloud services to maintain
good regulatory compliance when moving to the cloud. “Since
data in the cloud is going to be placed online, it is important
that these data in the clouds are well secured” (Krishna, 2018).
Please read the below two discussion posts and provide the response .docx

More Related Content

Similar to Please read the below two discussion posts and provide the response .docx

Introduction To Cloud Computing
Introduction To  Cloud ComputingIntroduction To  Cloud Computing
Introduction To Cloud Computingacemindia
 
Introduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud InfrastructureIntroduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud InfrastructureSANTHOSHKUMARKL1
 
NJVC Implementation of Cloud Computing Solutions in Federal Agencies
NJVC Implementation of Cloud Computing Solutions in Federal AgenciesNJVC Implementation of Cloud Computing Solutions in Federal Agencies
NJVC Implementation of Cloud Computing Solutions in Federal AgenciesGovCloud Network
 
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud StorageEnhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud StorageIRJET Journal
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environmentsijfcstjournal
 
Cloud Information Accountability Frameworks for Data Sharing in Cloud
Cloud Information Accountability Frameworks for Data Sharing in CloudCloud Information Accountability Frameworks for Data Sharing in Cloud
Cloud Information Accountability Frameworks for Data Sharing in CloudIOSR Journals
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar reportshafzonly
 
Service oriented cloud computing
Service oriented cloud computingService oriented cloud computing
Service oriented cloud computingMandar Pathrikar
 
Intro to cloud computing
Intro to cloud computingIntro to cloud computing
Intro to cloud computingKashif Bhatti
 
A Short Appraisal on Cloud Computing
A Short Appraisal on Cloud ComputingA Short Appraisal on Cloud Computing
A Short Appraisal on Cloud ComputingScientific Review SR
 
Running head CLOUD COMPUTING SECURITY .docx
Running head CLOUD COMPUTING SECURITY                            .docxRunning head CLOUD COMPUTING SECURITY                            .docx
Running head CLOUD COMPUTING SECURITY .docxjoellemurphey
 
Strategic Importance of Cloud Computing in the Business Organizati.docx
Strategic Importance of Cloud Computing in the Business Organizati.docxStrategic Importance of Cloud Computing in the Business Organizati.docx
Strategic Importance of Cloud Computing in the Business Organizati.docxsusanschei
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelijcsit
 
Distributed Computing - Cloud Computing and Other Buzzwords: Implications for...
Distributed Computing - Cloud Computing and Other Buzzwords: Implications for...Distributed Computing - Cloud Computing and Other Buzzwords: Implications for...
Distributed Computing - Cloud Computing and Other Buzzwords: Implications for...Mark Conrad
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesIJCSIS Research Publications
 

Similar to Please read the below two discussion posts and provide the response .docx (20)

1376843836 94879193
1376843836  948791931376843836  94879193
1376843836 94879193
 
An Intro to Cloud Computing
An Intro to Cloud ComputingAn Intro to Cloud Computing
An Intro to Cloud Computing
 
CLOUD COMPUTING_proposal
CLOUD COMPUTING_proposalCLOUD COMPUTING_proposal
CLOUD COMPUTING_proposal
 
Introduction To Cloud Computing
Introduction To  Cloud ComputingIntroduction To  Cloud Computing
Introduction To Cloud Computing
 
Introduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud InfrastructureIntroduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud Infrastructure
 
NJVC Implementation of Cloud Computing Solutions in Federal Agencies
NJVC Implementation of Cloud Computing Solutions in Federal AgenciesNJVC Implementation of Cloud Computing Solutions in Federal Agencies
NJVC Implementation of Cloud Computing Solutions in Federal Agencies
 
B1802041217
B1802041217B1802041217
B1802041217
 
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud StorageEnhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
 
Cloud Information Accountability Frameworks for Data Sharing in Cloud
Cloud Information Accountability Frameworks for Data Sharing in CloudCloud Information Accountability Frameworks for Data Sharing in Cloud
Cloud Information Accountability Frameworks for Data Sharing in Cloud
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
 
Service oriented cloud computing
Service oriented cloud computingService oriented cloud computing
Service oriented cloud computing
 
Intro to cloud computing
Intro to cloud computingIntro to cloud computing
Intro to cloud computing
 
A Short Appraisal on Cloud Computing
A Short Appraisal on Cloud ComputingA Short Appraisal on Cloud Computing
A Short Appraisal on Cloud Computing
 
Running head CLOUD COMPUTING SECURITY .docx
Running head CLOUD COMPUTING SECURITY                            .docxRunning head CLOUD COMPUTING SECURITY                            .docx
Running head CLOUD COMPUTING SECURITY .docx
 
Strategic Importance of Cloud Computing in the Business Organizati.docx
Strategic Importance of Cloud Computing in the Business Organizati.docxStrategic Importance of Cloud Computing in the Business Organizati.docx
Strategic Importance of Cloud Computing in the Business Organizati.docx
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
 
Distributed Computing - Cloud Computing and Other Buzzwords: Implications for...
Distributed Computing - Cloud Computing and Other Buzzwords: Implications for...Distributed Computing - Cloud Computing and Other Buzzwords: Implications for...
Distributed Computing - Cloud Computing and Other Buzzwords: Implications for...
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
 
Ey35869874
Ey35869874Ey35869874
Ey35869874
 

More from christalgrieg

Please read the case  Fraud at WorldCom in the book provided below  .docx
Please read the case  Fraud at WorldCom in the book provided below  .docxPlease read the case  Fraud at WorldCom in the book provided below  .docx
Please read the case  Fraud at WorldCom in the book provided below  .docxchristalgrieg
 
Please read the below discussion post and provide response in 75 to .docx
Please read the below discussion post and provide response in 75 to .docxPlease read the below discussion post and provide response in 75 to .docx
Please read the below discussion post and provide response in 75 to .docxchristalgrieg
 
Please read the assignment content throughly Internet Resources .docx
Please read the assignment content throughly Internet Resources .docxPlease read the assignment content throughly Internet Resources .docx
Please read the assignment content throughly Internet Resources .docxchristalgrieg
 
Please read the article by Peterson (2004). Your responses to th.docx
Please read the article by Peterson (2004). Your responses to th.docxPlease read the article by Peterson (2004). Your responses to th.docx
Please read the article by Peterson (2004). Your responses to th.docxchristalgrieg
 
Please read the article which appears below. Write and submit an.docx
Please read the article which appears below. Write and submit an.docxPlease read the article which appears below. Write and submit an.docx
Please read the article which appears below. Write and submit an.docxchristalgrieg
 
Please Read instructions Role Model LeadersChoose one • 1 .docx
Please Read instructions Role Model LeadersChoose one • 1 .docxPlease Read instructions Role Model LeadersChoose one • 1 .docx
Please Read instructions Role Model LeadersChoose one • 1 .docxchristalgrieg
 
Please read each attachment for instructions, please answer each q.docx
Please read each attachment for instructions, please answer each q.docxPlease read each attachment for instructions, please answer each q.docx
Please read each attachment for instructions, please answer each q.docxchristalgrieg
 
PLEASE READ BEFORE STARTING! 500 WORD PAPER ONLY USING THE NOTES I.docx
PLEASE READ BEFORE STARTING! 500 WORD PAPER ONLY USING THE NOTES I.docxPLEASE READ BEFORE STARTING! 500 WORD PAPER ONLY USING THE NOTES I.docx
PLEASE READ BEFORE STARTING! 500 WORD PAPER ONLY USING THE NOTES I.docxchristalgrieg
 
Please read Patricia Benners Five Stages of Proficiency. Explai.docx
Please read Patricia Benners Five Stages of Proficiency. Explai.docxPlease read Patricia Benners Five Stages of Proficiency. Explai.docx
Please read Patricia Benners Five Stages of Proficiency. Explai.docxchristalgrieg
 
Please Read Instructions OBJECTIV.docx
Please Read Instructions OBJECTIV.docxPlease Read Instructions OBJECTIV.docx
Please Read Instructions OBJECTIV.docxchristalgrieg
 
Please react to this student post. remember references and plarigari.docx
Please react to this student post. remember references and plarigari.docxPlease react to this student post. remember references and plarigari.docx
Please react to this student post. remember references and plarigari.docxchristalgrieg
 
Please provide the following information about your culture which is.docx
Please provide the following information about your culture which is.docxPlease provide the following information about your culture which is.docx
Please provide the following information about your culture which is.docxchristalgrieg
 
Please proof the paper attached and complete question 6 and 7..docx
Please proof the paper attached and complete question 6 and 7..docxPlease proof the paper attached and complete question 6 and 7..docx
Please proof the paper attached and complete question 6 and 7..docxchristalgrieg
 
Please prepare PPT( 5 Slides and 1 citation slide) and also explain .docx
Please prepare PPT( 5 Slides and 1 citation slide) and also explain .docxPlease prepare PPT( 5 Slides and 1 citation slide) and also explain .docx
Please prepare PPT( 5 Slides and 1 citation slide) and also explain .docxchristalgrieg
 
Please prepare a one-pageProject Idea that includes the .docx
Please prepare a one-pageProject Idea that includes the .docxPlease prepare a one-pageProject Idea that includes the .docx
Please prepare a one-pageProject Idea that includes the .docxchristalgrieg
 
Please prepare at least in 275 to 300 words with APA references and .docx
Please prepare at least in 275 to 300 words with APA references and .docxPlease prepare at least in 275 to 300 words with APA references and .docx
Please prepare at least in 275 to 300 words with APA references and .docxchristalgrieg
 
Please provide references for your original postings in APA form.docx
Please provide references for your original postings in APA form.docxPlease provide references for your original postings in APA form.docx
Please provide references for your original postings in APA form.docxchristalgrieg
 
Please provide an update to include information about methodology, n.docx
Please provide an update to include information about methodology, n.docxPlease provide an update to include information about methodology, n.docx
Please provide an update to include information about methodology, n.docxchristalgrieg
 
Please provide an evaluation of the Path to Competitive Advantage an.docx
Please provide an evaluation of the Path to Competitive Advantage an.docxPlease provide an evaluation of the Path to Competitive Advantage an.docx
Please provide an evaluation of the Path to Competitive Advantage an.docxchristalgrieg
 
please prepare in at least 275 to 300 words with APA references and .docx
please prepare in at least 275 to 300 words with APA references and .docxplease prepare in at least 275 to 300 words with APA references and .docx
please prepare in at least 275 to 300 words with APA references and .docxchristalgrieg
 

More from christalgrieg (20)

Please read the case  Fraud at WorldCom in the book provided below  .docx
Please read the case  Fraud at WorldCom in the book provided below  .docxPlease read the case  Fraud at WorldCom in the book provided below  .docx
Please read the case  Fraud at WorldCom in the book provided below  .docx
 
Please read the below discussion post and provide response in 75 to .docx
Please read the below discussion post and provide response in 75 to .docxPlease read the below discussion post and provide response in 75 to .docx
Please read the below discussion post and provide response in 75 to .docx
 
Please read the assignment content throughly Internet Resources .docx
Please read the assignment content throughly Internet Resources .docxPlease read the assignment content throughly Internet Resources .docx
Please read the assignment content throughly Internet Resources .docx
 
Please read the article by Peterson (2004). Your responses to th.docx
Please read the article by Peterson (2004). Your responses to th.docxPlease read the article by Peterson (2004). Your responses to th.docx
Please read the article by Peterson (2004). Your responses to th.docx
 
Please read the article which appears below. Write and submit an.docx
Please read the article which appears below. Write and submit an.docxPlease read the article which appears below. Write and submit an.docx
Please read the article which appears below. Write and submit an.docx
 
Please Read instructions Role Model LeadersChoose one • 1 .docx
Please Read instructions Role Model LeadersChoose one • 1 .docxPlease Read instructions Role Model LeadersChoose one • 1 .docx
Please Read instructions Role Model LeadersChoose one • 1 .docx
 
Please read each attachment for instructions, please answer each q.docx
Please read each attachment for instructions, please answer each q.docxPlease read each attachment for instructions, please answer each q.docx
Please read each attachment for instructions, please answer each q.docx
 
PLEASE READ BEFORE STARTING! 500 WORD PAPER ONLY USING THE NOTES I.docx
PLEASE READ BEFORE STARTING! 500 WORD PAPER ONLY USING THE NOTES I.docxPLEASE READ BEFORE STARTING! 500 WORD PAPER ONLY USING THE NOTES I.docx
PLEASE READ BEFORE STARTING! 500 WORD PAPER ONLY USING THE NOTES I.docx
 
Please read Patricia Benners Five Stages of Proficiency. Explai.docx
Please read Patricia Benners Five Stages of Proficiency. Explai.docxPlease read Patricia Benners Five Stages of Proficiency. Explai.docx
Please read Patricia Benners Five Stages of Proficiency. Explai.docx
 
Please Read Instructions OBJECTIV.docx
Please Read Instructions OBJECTIV.docxPlease Read Instructions OBJECTIV.docx
Please Read Instructions OBJECTIV.docx
 
Please react to this student post. remember references and plarigari.docx
Please react to this student post. remember references and plarigari.docxPlease react to this student post. remember references and plarigari.docx
Please react to this student post. remember references and plarigari.docx
 
Please provide the following information about your culture which is.docx
Please provide the following information about your culture which is.docxPlease provide the following information about your culture which is.docx
Please provide the following information about your culture which is.docx
 
Please proof the paper attached and complete question 6 and 7..docx
Please proof the paper attached and complete question 6 and 7..docxPlease proof the paper attached and complete question 6 and 7..docx
Please proof the paper attached and complete question 6 and 7..docx
 
Please prepare PPT( 5 Slides and 1 citation slide) and also explain .docx
Please prepare PPT( 5 Slides and 1 citation slide) and also explain .docxPlease prepare PPT( 5 Slides and 1 citation slide) and also explain .docx
Please prepare PPT( 5 Slides and 1 citation slide) and also explain .docx
 
Please prepare a one-pageProject Idea that includes the .docx
Please prepare a one-pageProject Idea that includes the .docxPlease prepare a one-pageProject Idea that includes the .docx
Please prepare a one-pageProject Idea that includes the .docx
 
Please prepare at least in 275 to 300 words with APA references and .docx
Please prepare at least in 275 to 300 words with APA references and .docxPlease prepare at least in 275 to 300 words with APA references and .docx
Please prepare at least in 275 to 300 words with APA references and .docx
 
Please provide references for your original postings in APA form.docx
Please provide references for your original postings in APA form.docxPlease provide references for your original postings in APA form.docx
Please provide references for your original postings in APA form.docx
 
Please provide an update to include information about methodology, n.docx
Please provide an update to include information about methodology, n.docxPlease provide an update to include information about methodology, n.docx
Please provide an update to include information about methodology, n.docx
 
Please provide an evaluation of the Path to Competitive Advantage an.docx
Please provide an evaluation of the Path to Competitive Advantage an.docxPlease provide an evaluation of the Path to Competitive Advantage an.docx
Please provide an evaluation of the Path to Competitive Advantage an.docx
 
please prepare in at least 275 to 300 words with APA references and .docx
please prepare in at least 275 to 300 words with APA references and .docxplease prepare in at least 275 to 300 words with APA references and .docx
please prepare in at least 275 to 300 words with APA references and .docx
 

Recently uploaded

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 

Recently uploaded (20)

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 

Please read the below two discussion posts and provide the response .docx

  • 1. Please read the below two discussion posts and provide the response for each discussion in 75 to 100 words. Post#1 Nowadays, there are numerous advancements in technology. As a result, the traditional workplace has gradually transformed with home offices and virtual workplaces where employees can hold meetings using video teleconferencing tools and communicate through email and other applications such as Slack (Montrief, et al., 2020). This makes the cloud more busy which brings up the need for improved cloud security. Generally, in a public cloud, there exists a shared responsibility between the user and the Cloud Service Provider (CSP). Due to the rise of cyber-related crimes over the years, security for things like data classification, network controls and physical security need clear owners. The division of such responsibilities is called shared responsibility model for cloud security. “According to Amazon Web Services (AWS), security responsibility is shared by both CSP and CSC and they called it as Shared Security Responsible Model” (Kumar, Raj, & Jelciana, 2018). “While client and endpoint protection, identity and access management and application level controls are a shared responsibility the responsibility resides largely with the client organization” (Lane, Shrestha, & Ali, 2017). However, the responsibilities may vary depending on the cloud service provider and the cloud environment the user is using to operate. Nevertheless, despite the cloud services used, the burden of protecting data lays upon the user. Normally, security is broken down into two broad categories: security of the cloud and security in the cloud. Security of the cloud is a section of the shared responsibility model handled by the cloud service provider. It comprises of
  • 2. hardware, host operating systems and physical security of the infrastructure. Most of these logistical challenges are offloaded when an organization moves its operations to the cloud. In contrast, security in the cloud is the security responsibility handled by the user. “The cloud service customer is responsible for securing and managing the applications that run in the cloud, the operating systems, data-at-rest, data-in-transit, policies and other responsibilities” (Bennett & Robertson, 2019). Since access to customer data remains the most critical component in cloud computing, it also determined the level of security in the cloud to be implemented by the customer. The customer is responsible for the following components. First, the customer is responsible for data security. While the provider is responsible for automatically encrypting data in transit and in storage, the customer is expected to configure file system encryption and protection of network traffic. Secondly, the customer is responsible for physical security of computers and other devices used to access the cloud. Thirdly, the customer is responsible for application security. Security of managed applications may be handles by cloud provider services, but the customer is responsible for configuring those services accurately and correctly. Fourthly, the customer is responsible for security hinges on identity and access management in on-premises computing. The cloud provider can implement authentication services but it’s the work of the customer to configure them. Finally, the customer is responsible for network security on-premises. The cloud has various advantages such as scalability, elasticity and flexible prices. However, security is remains a critical business concern for many organizations (Xue & Xin, 2016). Regardless of which cloud service provider used, the customer will always be responsible for managing the customer data, analyzing workload, traffic and performance. When implementing cloud projects, customers need to identify and
  • 3. understand the risks associated with digitalization, public networks and outsourcing of infrastructure components. Shared responsibility in cloud computing depends on the agreement that the customer has with the cloud service provider. This is because there are specific tasks that can be logically handled by the customer while other duties are handles by the service provider such as ensuring physical access to the data center is restricted to authorized personnel’s only. Post#2 Cloud offers variety of services and virtual machine to an organization at cost effective and is thus considered as one of the most innovative advances in technology. The ability to scale as well as stored and manage data increases by using cloud. Regulatory compliance states the modification and the steps that the organization should actively take to reach its goals. Good regulatory compliances needs to be maintained while moving to cloud so that any necessary precaution and post cloud changes can be made to the organization thus moving it closure to the goal and target. “There are straight-forward ways of modeling future ownership and the progression of value creation using a combination of capitalization table analysis and the venture capital method of valuation” (Sammut, 2020). Protecting the crucial and sensitive data while moving to cloud is the major concern of the organization and database administrator is an intrinsic component of the authorization and control process towards regulatory compliance. DBA don’t necessarily need to know who can access the system but are necessary for database security and checking security breaches and attacks. DBA most importantly needs to know about the architecture of the cloud and the various components being
  • 4. actively used by the organization while moving to cloud. An understanding about the difference between on premises and cloud services including the computing stack is also a requirement for DBA. Along with that, the dba should also know how to utilize all the components of the cloud both from the point of view of administrator and developer. “While current Passive optical network (PON) standards can provide data transmission capacity of tens of Gbps, in the near future, the use of more wavelengths with rates higher than 10 Gb/s could see the overall capacity increase towards hundreds of Gbps” (Afraz, 2018). DBA also plays the crucial role in managing the budget for the cloud database and thus should have the related information as well as knowledge about application design and impact of cloud database followed by the cost of impact. Studies suggest that it is not recommended to move all the data at once to cloud, at least not initially. The DBA thus needs to work for few days in the hybrid setting of cloud and on-premises arrangement. DBA should know the traditional skills to manage on premises activities and also the advanced skill to deal with the cloud activities and database. The initial movement of database to cloud should only include the crucial and the important effective data and thus DBA should use his understanding to decide what data should be moved to cloud followed by planning for the remaining data and deciding their time to move to cloud. Dba needs to be aware about each component of cloud, the organization services and the cloud services to maintain good regulatory compliance when moving to the cloud. “Since data in the cloud is going to be placed online, it is important that these data in the clouds are well secured” (Krishna, 2018).