- Use the Internet or Strayer online database for at least two (2) articles describing an industry using three (3) different security models. Also, read the National Cybersecurity Center Policy Capture, located at http://www.whitehouse.gov/files/documents/cyber/CybersecurityCentersGraphic.pdf. Be prepared to discuss. Note: Wikipedia and similar Websites do not qualify as quality resources.
- Research the Internet or Strayer online database for one (1) real-world example of where a corporation has deployed a part of its operations to the cloud and addressed organization security along the way. Also, reference the US Government Cloud Computing Technology Roadmap Volume II, located at http://www.nist.gov/itl/cloud/upload/SP_500_293_volumeII.pdf. Be prepared to discuss.
From the first e-Activity, analyze the industry researched for each security model would be most applicable, and explain why you believe that to be the case. Identify the security models from your findings.
From the second e-Activity, ascertain the primary way in which the organization that you researched was able to leverage a cloud solution while overcoming its security concerns. Discuss whether or not you believe that the security concerns surrounding cloud operations are warranted. Justify your answers with real-world examples from applicable situations, where appropriate
each question needs to be a least 5 sentences