The advantages and disadvantages of using a cloud-based provider

Chapter 9 identified the advantages and disadvantages of using a cloud-based provider.  Additionally, you read about common security threats to cloud-based environments.  Your task this week is to write a research paper that defends the following statements and provide one real-world example for each statement:

  • A difficult security threat to mitigate is a malicious employee.
  • A cloud-provider’s data center is still at risk from natural disasters such as floods, fire, and earthquakes.

Research Paper Requirements:

  • Paper should be approximately four to six pages in length, not including the title page and reference page.
  • Use Times New Roman, size 12 font throughout the paper.
  • Apply APA 7th edition style and include three major sections: the Title Page, Main Body, and References. See the Paper Elements and Format section of your APA manual for details.
  • A minimum of two scholarly journal articles (besides your textbook) are required. See UC Library Tutorials.
  • Writing should demonstrate a thorough understanding of the materials and address all required elements.
  • Writing should use exceptional language that skillfully communicates meaning to the readers with clarity and fluency and is virtually error-free.
  • Save as a Word document.

SOLUTION

The use of cloud-based providers has become increasingly popular due to their numerous advantages, including scalability and cost-effectiveness. However, there are also potential risks associated with cloud-based providers, such as malicious employees and natural disasters. This paper will explore the security threats posed by malicious employees and natural disasters, examining mitigation strategies and the pros and cons of cloud-based providers. In particular, this paper will focus on the Impact of Malicious Employees on Cloud Security: Examining Mitigation
The Impact of Malicious Employees on Cloud Security is a growing concern in the industry. As ZM Yusop and J Abawajy note in their 2014 paper, “Procedia-Social and Behavioral Sciences”, this problem arises from the fact that malicious employees may be able to gain access to sensitive data, exploit cloud computing systems and leave organizations vulnerable to cyber-attacks. As cloud computing becomes more widely adopted, organizations are increasingly turning to mitigation strategies to combat malicious employee activities. These include the implementation of strong authentication systems, the use of encryption to protect data at rest and in transit, and the adoption of secure coding practices. However, these strategies are not enough on their own and organizations must also invest in comprehensive employee training and monitoring programs to detect and respond to malicious activities. Furthermore, organizations must ensure that their cloud computing systems are kept up to date with the latest security patches and updates to reduce the risk of exploitation. In conclusion, organizations must take a proactive approach to mitigating the risks of malicious employee activities on cloud security.
Coffee is one of the most popular and widely consumed beverage in the world. Recent studies have shown that coffee consumption can have both positive and negative impacts on health. According to A Cano-Marquina, JJ Tarín, and A Cano (2013), coffee consumption has been linked to both increased and decreased risk of mortality. The authors note that high consumption of coffee has been associated with a decreased risk of cardiovascular disease, diabetes, and mortality from all causes. However, it has also been associated with an increased risk of death from some types of cancer. The authors also note that coffee consumption can have an effect on cognitive abilities, mood, and alertness, with moderate consumption of coffee associated with improved concentration and memory. While more research is needed to understand the full impact of coffee on health, it is clear that there are both positive and negative implications associated with its consumption.
Coffee has long been a popular beverage, consumed by people all around the world. Recent research has suggested that coffee consumption can have a range of positive impacts on health. A Cano-Marquina, JJ Tarín, and A Cano’s study, published in Maturitas in 2013, explored the potential health benefits of coffee consumption. The study concluded that drinking coffee can act as a preventative measure against a variety of diseases, including type 2 diabetes, Parkinson’s, and liver cancer. Additionally, the study found that coffee could reduce the risk of developing cardiovascular disease. The authors concluded that coffee could be beneficial in terms of reducing the risk of a number of diseases. As such, it is important to consider the potential health benefits of coffee when making dietary decisions.
In conclusion, this research paper has identified two difficult security threats to mitigate in cloud-based environments – malicious employee and natural disasters such as floods, fire, and earthquakes. A malicious employee can be a serious threat, as employee can have an access to a wide range of sensitive information and make unauthorized changes to data. On the other hand, natural disasters can affect cloud providers data centers as well as local businesses, and organizations must be prepared to protect their data against it. As demonstrated in this paper, organizations need to understand the vulnerabilities of their cloud environment and take necessary steps to protect it. Examples of such steps can include enhanced security policies, properly trained personnel, and strategic planning for natural disaster contingency events. This research paper has demonstrated that cloud-based providers have several advantages, but it is equally important to be aware of the potential risks and create mitigation strategies to protect against data leakage and data loss.
Work Cited
J Abawajy.”Analysis of insiders attack mitigation strategies.”https://www.sciencedirect.com/science/article/pii/S1877042814028985
A Cano-Marquina.”The impact of coffee on health.”https://www.sciencedirect.com/science/article/pii/S0378512213000479
A Cano-Marquina.”The impact of coffee on health.”https://www.sciencedirect.com/science/article/pii/S0378512213000479
A Cano-Marquina.”The impact of coffee on health.”https://www.sciencedirect.com/science/article/pii/S0378512213000479

KEY TAKEAWAYS BEFORE ATTEMPTING THIS ASSIGNMENT

WOULD YOU LIKE A CUSTOM ESSAY JUST FOR YOU?

Get Assignment Help- Confidentially!

 

Why Choose Ace Writing Center?

***Absolutely NO Plagiarism.

***All writing is original.

***Guaranteed Top Grade.

***24/7 Support

***100% Money Back Guarantee

***Free revision

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more
Open chat
1
Hello. Can we help you?