Recall from Chapter 3 how cloud computing generally requires leasing IT resources, depending on a third party to store data, or depending on a third party to provide services. Work in a small group with classmates to consider the security risks associated with cloud computing. Why are IT managers concerned about protecting cloud-based information assets? What is the IT industry response to concerns about cloud computing? What is the Cloud Security Alliance? Consider the class registration application at your university. Does your group consider this a mission critical application? Why or why not? Prepare a 5-minute presentation of your discussion that includes a recommendation for or against using cloud computing for critical applications at your university.
Answer to relevant QuestionsLouis has asked you to use the data provided in the CCC Security spreadsheet, Ch10Ex01, to identify (1) the department reporting the highest number of security incidents and (2) the most prevalent type of intrusion. Use the ...What are the seven phases of the systems development life cycle? What activities occur in each phase?The first software bug was a moth. Really. Visit the Computer History Museum at www.computerhistory.org to learn how Grace Hopper, a rear admiral in the Navy, made history in the computer field with the first software bug. ...Create a line graph that shows the number of severe defects on each day of the 14-day period. The x-axis should show the day number, and the y-axis should be labeled “Number of Severe Defects.”If software doesn’t wear out, which phase is generally the longest phase in the SDLC? Maintenance begins in the first few weeks of implementation and may last for many years until such time the system is declared obsolete. ...
Post your question