SlideShare a Scribd company logo
Respond agree or disagree
There is still an argument that whether the cloud system
provides better security or not. The author clearly states that,
the risk management depends on the deployment factors and
security infrastructure existing in the organization. The writer
also indicates about risk equation to evaluate the pros and cons
of cloud regarding risk management and vulnerability
(Lindstrom, 2015).
Pros of Cloud in Risk Management and Vulnerability
Scale and Flexibility: Since the need for cloud increases, the
importance of managing vulnerability, considering risk
management and other important factors also grows
dramatically (Zhang, 2017).
Coverage and Visibility: In cloud system, there is a high
possibility of coverage and visibility of assets, security and
polices and guidelines that will help to understand the risk
management and vulnerability of the cloud (Zhang, 2017)
Proactive Response: Security can be embedded during
deployment and will provide a better protection method
proactively (Zhang, 2017).
Cons of Cloud in Risk Management and Vulnerability
Change in Level of Threat: Due to the availability of the data to
more people, there is more activity going on. Attackers use this
opportunity to find vulnerability and make an attack. The threat
increases once the data is available in the internet (Lindstrom,
2015).
Attackers Cost Benefit: Attackers do not spend more time by
research and training. They always calculate their benefit. So,
when data is available in the cloud, hackers will get good
opportunity to attack the cloud (Lindstrom, 2015).
Deployment Risk: There is a high chance of vulnerability when
the application environment is moving from the legacy system
to highly distributed, virtualized architecture. The author also
explains the possibility of collateral damage simply because the
public cloud system is shared with others (Lindstrom, 2015).
Lindstrom, P. (2015). Better Cloud Security: Do the
Math. Information security, 12-16. Retrieved from
http://eds.a.ebscohost.com.lopes.idm.oclc.org/ehost/detail/detail
vid=0&sid=1ad4da93-9ce3-40be-a335-002e2cfe796d%40sdc-v-
sessmgr02&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1za
XRl#db=aci&AN=108883675
Zhang, E. (2017, August, 31). Cloud Computing Security
Benefits: InfoSec Pros Reveal the Top Benefits of the Cloud.
Retrieved from https://digitalguardian.com/blog/cloud
computing-security-benefits

More Related Content

Similar to Respond agree or disagree There is still an argument that whet.docx

Ijsrp p5211
Ijsrp p5211Ijsrp p5211
Akamai 2018 Spring state of the Internet security report
Akamai 2018 Spring state of the Internet security reportAkamai 2018 Spring state of the Internet security report
Akamai 2018 Spring state of the Internet security report
Yuriy Yuzifovich
 
PUBLIC CLOUD IN BUSINESS
PUBLIC CLOUD IN BUSINESSPUBLIC CLOUD IN BUSINESS
PUBLIC CLOUD IN BUSINESSVy Quoc Tran
 
Pivotal Role of HR in Cybersecurity
Pivotal Role of HR in CybersecurityPivotal Role of HR in Cybersecurity
Pivotal Role of HR in Cybersecurity
Matthew Rosenquist
 
Application Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementApplication Threat Modeling In Risk Management
Application Threat Modeling In Risk Management
Mel Drews
 
McAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats PredictionsMcAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats Predictions
Matthew Rosenquist
 
What is the future of cloud security linked in
What is the future of cloud security linked inWhat is the future of cloud security linked in
What is the future of cloud security linked in
Jonathan Spindel
 
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
Lillian Ekwosi-Egbulem
 
Security research trends in 2020
Security research trends in 2020Security research trends in 2020
Security research trends in 2020
AIRCC Publishing Corporation
 
OverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateOverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateKashif Ali
 
Cloud Security: Techniques and frameworks for ensuring the security and priva...
Cloud Security: Techniques and frameworks for ensuring the security and priva...Cloud Security: Techniques and frameworks for ensuring the security and priva...
Cloud Security: Techniques and frameworks for ensuring the security and priva...
IRJET Journal
 
SafeAssign Originality ReportSummer 2019 - Security Architecture.docx
SafeAssign Originality ReportSummer 2019 - Security Architecture.docxSafeAssign Originality ReportSummer 2019 - Security Architecture.docx
SafeAssign Originality ReportSummer 2019 - Security Architecture.docx
jeffsrosalyn
 
Analysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docxAnalysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docx
daniahendric
 
Data security in cloud environment
Data security in cloud environmentData security in cloud environment
Data security in cloud environment
Shivam Singh
 
A Review On Data Security In Cloud Computing
A Review On Data Security In Cloud ComputingA Review On Data Security In Cloud Computing
A Review On Data Security In Cloud Computing
Yolanda Ivey
 
cloud1_aggy.pdf
cloud1_aggy.pdfcloud1_aggy.pdf
cloud1_aggy.pdf
AkhileshKumar241470
 
DDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNING
DDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNINGDDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNING
DDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNING
IJCI JOURNAL
 
Defending Your Institution Against Ransomware Attacks
Defending Your Institution Against Ransomware AttacksDefending Your Institution Against Ransomware Attacks
Defending Your Institution Against Ransomware Attacks
Mark D. Webster, Ph.D.
 
A Proposed Model for Datacenter in -Depth Defense to Enhance Continual Security
A Proposed Model for Datacenter in -Depth Defense to Enhance Continual SecurityA Proposed Model for Datacenter in -Depth Defense to Enhance Continual Security
A Proposed Model for Datacenter in -Depth Defense to Enhance Continual Security
Hossam Al-Ansary
 
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docxResearch Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
audeleypearl
 

Similar to Respond agree or disagree There is still an argument that whet.docx (20)

Ijsrp p5211
Ijsrp p5211Ijsrp p5211
Ijsrp p5211
 
Akamai 2018 Spring state of the Internet security report
Akamai 2018 Spring state of the Internet security reportAkamai 2018 Spring state of the Internet security report
Akamai 2018 Spring state of the Internet security report
 
PUBLIC CLOUD IN BUSINESS
PUBLIC CLOUD IN BUSINESSPUBLIC CLOUD IN BUSINESS
PUBLIC CLOUD IN BUSINESS
 
Pivotal Role of HR in Cybersecurity
Pivotal Role of HR in CybersecurityPivotal Role of HR in Cybersecurity
Pivotal Role of HR in Cybersecurity
 
Application Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementApplication Threat Modeling In Risk Management
Application Threat Modeling In Risk Management
 
McAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats PredictionsMcAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats Predictions
 
What is the future of cloud security linked in
What is the future of cloud security linked inWhat is the future of cloud security linked in
What is the future of cloud security linked in
 
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
 
Security research trends in 2020
Security research trends in 2020Security research trends in 2020
Security research trends in 2020
 
OverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateOverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrate
 
Cloud Security: Techniques and frameworks for ensuring the security and priva...
Cloud Security: Techniques and frameworks for ensuring the security and priva...Cloud Security: Techniques and frameworks for ensuring the security and priva...
Cloud Security: Techniques and frameworks for ensuring the security and priva...
 
SafeAssign Originality ReportSummer 2019 - Security Architecture.docx
SafeAssign Originality ReportSummer 2019 - Security Architecture.docxSafeAssign Originality ReportSummer 2019 - Security Architecture.docx
SafeAssign Originality ReportSummer 2019 - Security Architecture.docx
 
Analysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docxAnalysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docx
 
Data security in cloud environment
Data security in cloud environmentData security in cloud environment
Data security in cloud environment
 
A Review On Data Security In Cloud Computing
A Review On Data Security In Cloud ComputingA Review On Data Security In Cloud Computing
A Review On Data Security In Cloud Computing
 
cloud1_aggy.pdf
cloud1_aggy.pdfcloud1_aggy.pdf
cloud1_aggy.pdf
 
DDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNING
DDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNINGDDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNING
DDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNING
 
Defending Your Institution Against Ransomware Attacks
Defending Your Institution Against Ransomware AttacksDefending Your Institution Against Ransomware Attacks
Defending Your Institution Against Ransomware Attacks
 
A Proposed Model for Datacenter in -Depth Defense to Enhance Continual Security
A Proposed Model for Datacenter in -Depth Defense to Enhance Continual SecurityA Proposed Model for Datacenter in -Depth Defense to Enhance Continual Security
A Proposed Model for Datacenter in -Depth Defense to Enhance Continual Security
 
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docxResearch Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
 

More from peggyd2

Respond 1For better detection of the specific fraud I wou.docx
Respond 1For better detection of the specific fraud I wou.docxRespond 1For better detection of the specific fraud I wou.docx
Respond 1For better detection of the specific fraud I wou.docx
peggyd2
 
Respond to 1 peers Discussion 6200Choose a colleague’s post .docx
Respond to 1 peers Discussion 6200Choose a colleague’s post .docxRespond to 1 peers Discussion 6200Choose a colleague’s post .docx
Respond to 1 peers Discussion 6200Choose a colleague’s post .docx
peggyd2
 
Respond substantively to the initial posts of at least two of your p.docx
Respond substantively to the initial posts of at least two of your p.docxRespond substantively to the initial posts of at least two of your p.docx
Respond substantively to the initial posts of at least two of your p.docx
peggyd2
 
Respond 1The AICPA Code of Conduct is based on six princi.docx
Respond 1The AICPA Code of Conduct is based on six princi.docxRespond 1The AICPA Code of Conduct is based on six princi.docx
Respond 1The AICPA Code of Conduct is based on six princi.docx
peggyd2
 
Respond in the following waysAsk a probing question.Share a.docx
Respond in the following waysAsk a probing question.Share a.docxRespond in the following waysAsk a probing question.Share a.docx
Respond in the following waysAsk a probing question.Share a.docx
peggyd2
 
Respond in a paragraph to the discussion board. In your response.docx
Respond in a paragraph to the discussion board. In your response.docxRespond in a paragraph to the discussion board. In your response.docx
Respond in a paragraph to the discussion board. In your response.docx
peggyd2
 
Respond in a paragraph the discussion board. In your response,.docx
Respond in a paragraph the discussion board. In your response,.docxRespond in a paragraph the discussion board. In your response,.docx
Respond in a paragraph the discussion board. In your response,.docx
peggyd2
 
RESPOND EACH STUDENT 200 WORDSRonnie Sims Week 4 Rodgers vs..docx
RESPOND EACH STUDENT 200 WORDSRonnie Sims Week 4 Rodgers vs..docxRESPOND EACH STUDENT 200 WORDSRonnie Sims Week 4 Rodgers vs..docx
RESPOND EACH STUDENT 200 WORDSRonnie Sims Week 4 Rodgers vs..docx
peggyd2
 
Respond for this posting one paragraph  with two references and cita.docx
Respond for this posting one paragraph  with two references and cita.docxRespond for this posting one paragraph  with two references and cita.docx
Respond for this posting one paragraph  with two references and cita.docx
peggyd2
 
Respond by Day 7 to at least one of your colleagues postings .docx
Respond by Day 7 to at least one of your colleagues postings .docxRespond by Day 7 to at least one of your colleagues postings .docx
Respond by Day 7 to at least one of your colleagues postings .docx
peggyd2
 
Respond by providing at least two contributions for improving .docx
Respond by providing at least two contributions for improving .docxRespond by providing at least two contributions for improving .docx
Respond by providing at least two contributions for improving .docx
peggyd2
 
Respond agree or disagreeVulnerabilities in system design can .docx
Respond agree or disagreeVulnerabilities in system design can .docxRespond agree or disagreeVulnerabilities in system design can .docx
Respond agree or disagreeVulnerabilities in system design can .docx
peggyd2
 
Respond by Day 5 to at least one of your colleagues postings .docx
Respond by Day 5 to at least one of your colleagues postings .docxRespond by Day 5 to at least one of your colleagues postings .docx
Respond by Day 5 to at least one of your colleagues postings .docx
peggyd2
 
Respond 250 Do you think IGOs create a convergence of state .docx
Respond 250 Do you think IGOs create a convergence of state .docxRespond 250 Do you think IGOs create a convergence of state .docx
Respond 250 Do you think IGOs create a convergence of state .docx
peggyd2
 
Respiratory Attendance QuestionsDue 114 at 6pPlease an.docx
Respiratory Attendance QuestionsDue 114 at 6pPlease an.docxRespiratory Attendance QuestionsDue 114 at 6pPlease an.docx
Respiratory Attendance QuestionsDue 114 at 6pPlease an.docx
peggyd2
 
Resource Page 69 of Managing Innovation and Entrepreneurship,.docx
Resource Page 69 of Managing Innovation and Entrepreneurship,.docxResource Page 69 of Managing Innovation and Entrepreneurship,.docx
Resource Page 69 of Managing Innovation and Entrepreneurship,.docx
peggyd2
 
Respond & Disagree ! Try to choose a post that you respectfully disa.docx
Respond & Disagree ! Try to choose a post that you respectfully disa.docxRespond & Disagree ! Try to choose a post that you respectfully disa.docx
Respond & Disagree ! Try to choose a post that you respectfully disa.docx
peggyd2
 
Respond to one of the following question using the lessons a.docx
Respond to one of the following question using the lessons a.docxRespond to one of the following question using the lessons a.docx
Respond to one of the following question using the lessons a.docx
peggyd2
 
Respond 1Impetigo The purpose of this discussion is to revie.docx
Respond 1Impetigo The purpose of this discussion is to revie.docxRespond 1Impetigo The purpose of this discussion is to revie.docx
Respond 1Impetigo The purpose of this discussion is to revie.docx
peggyd2
 
Respond to the following 2 prompts below..1. According to Maxw.docx
Respond to the following 2 prompts below..1. According to Maxw.docxRespond to the following 2 prompts below..1. According to Maxw.docx
Respond to the following 2 prompts below..1. According to Maxw.docx
peggyd2
 

More from peggyd2 (20)

Respond 1For better detection of the specific fraud I wou.docx
Respond 1For better detection of the specific fraud I wou.docxRespond 1For better detection of the specific fraud I wou.docx
Respond 1For better detection of the specific fraud I wou.docx
 
Respond to 1 peers Discussion 6200Choose a colleague’s post .docx
Respond to 1 peers Discussion 6200Choose a colleague’s post .docxRespond to 1 peers Discussion 6200Choose a colleague’s post .docx
Respond to 1 peers Discussion 6200Choose a colleague’s post .docx
 
Respond substantively to the initial posts of at least two of your p.docx
Respond substantively to the initial posts of at least two of your p.docxRespond substantively to the initial posts of at least two of your p.docx
Respond substantively to the initial posts of at least two of your p.docx
 
Respond 1The AICPA Code of Conduct is based on six princi.docx
Respond 1The AICPA Code of Conduct is based on six princi.docxRespond 1The AICPA Code of Conduct is based on six princi.docx
Respond 1The AICPA Code of Conduct is based on six princi.docx
 
Respond in the following waysAsk a probing question.Share a.docx
Respond in the following waysAsk a probing question.Share a.docxRespond in the following waysAsk a probing question.Share a.docx
Respond in the following waysAsk a probing question.Share a.docx
 
Respond in a paragraph to the discussion board. In your response.docx
Respond in a paragraph to the discussion board. In your response.docxRespond in a paragraph to the discussion board. In your response.docx
Respond in a paragraph to the discussion board. In your response.docx
 
Respond in a paragraph the discussion board. In your response,.docx
Respond in a paragraph the discussion board. In your response,.docxRespond in a paragraph the discussion board. In your response,.docx
Respond in a paragraph the discussion board. In your response,.docx
 
RESPOND EACH STUDENT 200 WORDSRonnie Sims Week 4 Rodgers vs..docx
RESPOND EACH STUDENT 200 WORDSRonnie Sims Week 4 Rodgers vs..docxRESPOND EACH STUDENT 200 WORDSRonnie Sims Week 4 Rodgers vs..docx
RESPOND EACH STUDENT 200 WORDSRonnie Sims Week 4 Rodgers vs..docx
 
Respond for this posting one paragraph  with two references and cita.docx
Respond for this posting one paragraph  with two references and cita.docxRespond for this posting one paragraph  with two references and cita.docx
Respond for this posting one paragraph  with two references and cita.docx
 
Respond by Day 7 to at least one of your colleagues postings .docx
Respond by Day 7 to at least one of your colleagues postings .docxRespond by Day 7 to at least one of your colleagues postings .docx
Respond by Day 7 to at least one of your colleagues postings .docx
 
Respond by providing at least two contributions for improving .docx
Respond by providing at least two contributions for improving .docxRespond by providing at least two contributions for improving .docx
Respond by providing at least two contributions for improving .docx
 
Respond agree or disagreeVulnerabilities in system design can .docx
Respond agree or disagreeVulnerabilities in system design can .docxRespond agree or disagreeVulnerabilities in system design can .docx
Respond agree or disagreeVulnerabilities in system design can .docx
 
Respond by Day 5 to at least one of your colleagues postings .docx
Respond by Day 5 to at least one of your colleagues postings .docxRespond by Day 5 to at least one of your colleagues postings .docx
Respond by Day 5 to at least one of your colleagues postings .docx
 
Respond 250 Do you think IGOs create a convergence of state .docx
Respond 250 Do you think IGOs create a convergence of state .docxRespond 250 Do you think IGOs create a convergence of state .docx
Respond 250 Do you think IGOs create a convergence of state .docx
 
Respiratory Attendance QuestionsDue 114 at 6pPlease an.docx
Respiratory Attendance QuestionsDue 114 at 6pPlease an.docxRespiratory Attendance QuestionsDue 114 at 6pPlease an.docx
Respiratory Attendance QuestionsDue 114 at 6pPlease an.docx
 
Resource Page 69 of Managing Innovation and Entrepreneurship,.docx
Resource Page 69 of Managing Innovation and Entrepreneurship,.docxResource Page 69 of Managing Innovation and Entrepreneurship,.docx
Resource Page 69 of Managing Innovation and Entrepreneurship,.docx
 
Respond & Disagree ! Try to choose a post that you respectfully disa.docx
Respond & Disagree ! Try to choose a post that you respectfully disa.docxRespond & Disagree ! Try to choose a post that you respectfully disa.docx
Respond & Disagree ! Try to choose a post that you respectfully disa.docx
 
Respond to one of the following question using the lessons a.docx
Respond to one of the following question using the lessons a.docxRespond to one of the following question using the lessons a.docx
Respond to one of the following question using the lessons a.docx
 
Respond 1Impetigo The purpose of this discussion is to revie.docx
Respond 1Impetigo The purpose of this discussion is to revie.docxRespond 1Impetigo The purpose of this discussion is to revie.docx
Respond 1Impetigo The purpose of this discussion is to revie.docx
 
Respond to the following 2 prompts below..1. According to Maxw.docx
Respond to the following 2 prompts below..1. According to Maxw.docxRespond to the following 2 prompts below..1. According to Maxw.docx
Respond to the following 2 prompts below..1. According to Maxw.docx
 

Recently uploaded

Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 

Recently uploaded (20)

Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 

Respond agree or disagree There is still an argument that whet.docx

  • 1. Respond agree or disagree There is still an argument that whether the cloud system provides better security or not. The author clearly states that, the risk management depends on the deployment factors and security infrastructure existing in the organization. The writer also indicates about risk equation to evaluate the pros and cons of cloud regarding risk management and vulnerability (Lindstrom, 2015). Pros of Cloud in Risk Management and Vulnerability Scale and Flexibility: Since the need for cloud increases, the importance of managing vulnerability, considering risk management and other important factors also grows dramatically (Zhang, 2017). Coverage and Visibility: In cloud system, there is a high possibility of coverage and visibility of assets, security and polices and guidelines that will help to understand the risk management and vulnerability of the cloud (Zhang, 2017) Proactive Response: Security can be embedded during deployment and will provide a better protection method proactively (Zhang, 2017). Cons of Cloud in Risk Management and Vulnerability Change in Level of Threat: Due to the availability of the data to more people, there is more activity going on. Attackers use this opportunity to find vulnerability and make an attack. The threat increases once the data is available in the internet (Lindstrom, 2015). Attackers Cost Benefit: Attackers do not spend more time by research and training. They always calculate their benefit. So, when data is available in the cloud, hackers will get good opportunity to attack the cloud (Lindstrom, 2015). Deployment Risk: There is a high chance of vulnerability when the application environment is moving from the legacy system to highly distributed, virtualized architecture. The author also
  • 2. explains the possibility of collateral damage simply because the public cloud system is shared with others (Lindstrom, 2015). Lindstrom, P. (2015). Better Cloud Security: Do the Math. Information security, 12-16. Retrieved from http://eds.a.ebscohost.com.lopes.idm.oclc.org/ehost/detail/detail vid=0&sid=1ad4da93-9ce3-40be-a335-002e2cfe796d%40sdc-v- sessmgr02&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1za XRl#db=aci&AN=108883675 Zhang, E. (2017, August, 31). Cloud Computing Security Benefits: InfoSec Pros Reveal the Top Benefits of the Cloud. Retrieved from https://digitalguardian.com/blog/cloud computing-security-benefits