defending the data from the dastardly | cheapassignmenttutors.com
In 8-10 content slides
Around the world, large organizations have lead the way in the adoption of cloud-based services. The reason for this movement has been a cross between cost savings and improved services and functionality. As with any change, there is a degree of risk that is accepted in exchange for the new benefit. With that is the concern related to data security. Data takes 2 forms. Data in motion is data that is vulnerable as it moves across a computer network. Data at rest is data that is kept in storage. With respect to cloud computing, concerns exist for the security of data as it moves across the corporate network and the internet to the cloud, as the data is processed in RAM memory on the cloud server and finally as it is stored on a cloud data storage server.
Imagine for a moment that you are examining the vulnerabilities of data moving in the cloud and will examine these vulnerabilities from the perspective of a computer hacker. Research and explain the points of vulnerabilities with data in motion and data at rest.
- Define the vulnerabilities
- Explain the most likely techniques/methods a hacker would use to exploit those vulnerabilities
- Provide a robust list of recommendations that could be used by your organization and the cloud service provider to reduce exposure to the hackerâ€™s tactics.
The results of your research will be presented to your organizations leadership team to foster their understanding of the risks related to cloud computing and what the leadership team should do to reduce the risks. With that you have been asked to present your research in a power point presentation of 8 to 10 slides.
Your submitted assignment must include the following:
- Power Point presentation with a cover slide, content slides and reference slide.
- All in-text citations and references should be in APA format.
In 300 Words
Congratulations, your prior success with troubleshooting and resolving both network-based and cloud-based performance issues has gotten you noticed. The CIO now has the confidence in you to have you help with one remaining issue that is keeping him awake at night. The CIO would like to understand the process for how Transmission Control Protocol/Internet Protocol (TCP/IP) communication works, the most common issues that cause problems with it, and how to proactively address those issues.
You will discuss four software or hardware problems that will render two hosts unable to use the TCP/IP to communicate.
Discuss the following:
- Describe the process of how TCP/IP connection-oriented traffic flows.
- Explain the concerns related to IP address conflicts and how this can affect connection-oriented TCP/IP communication.
- Define the process you would follow to troubleshoot both hardware and software issues with network communication failure.