Question: A multinational corporation operates a distributed system across multiple cloud platforms, including IaaS, PaaS, and SaaS solutions, to manage their global operations efficiently. The system

A multinational corporation operates a distributed system across multiple cloud platforms, including IaaS, PaaS, and SaaS solutions, to manage their global operations efficiently. The system leverages grid computing for data-intensive tasks like climate modeling and utilizes a peer-to-peer network for decentralized file sharing among their international offices.
Considering the cybersecurity vulnerabilities inherent in such a complex setup, which of the following strategies would best enhance the security of this distributed system?
A multinational corporation operates a distributed system across multiple cloud platforms, including IaaS, PaaS, and SaaS solutions, to manage their global operations efficiently. The system leverages grid computing for data-intensive tasks like climate modeling and utilizes a peer-to-peer network for decentralized file sharing among their international offices.
Considering the cybersecurity vulnerabilities inherent in such a complex setup, which of the following strategies would best enhance the security of this distributed system?
Consolidating all client data into a single, highly secure database with frequent backups performed on a bi-weekly basis.
Increasing the number of servers in each data center to handle additional load and prevent potential downtimes.
Implementing a comprehensive data replication strategy across multiple geographic locations, combined with real-time data mirroring and transaction logging for immediate recovery in any disaster scenario.
Deploying a single-instance database with multiple access points to reduce the complexity and potential points of failure in the system architecture.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!