Description
Please see the bold and underlined. I will need that in at least 48 hours but the paper can be given at a later date.
****ATTENTION: You are only required to provide the topic of your research paper and a sentence or two discussing the purpose of the paper for this assignment. Below is information that you will need for writing the final paper. It is not intended for this assignment.
Class,
For this assignment, you are to provide a topic for the course research paper required for week 7. I do not provide topic options for research papers. You have the option of selecting a topic of your choice as long as it is IT related. I review the topics and provide feedback. If a topic is "out of scope", I will inform you of any issues. This is an Information Security course. There are many options provided in your book. However, a good example or option to choose is Cloud Technology or Cloud Security. It's a hot ticket in the government sector right now. I appreciate anything related to IT security/Information Assurance/Cyber Security. You can also discuss new technology. The choice is yours.
****ATTENTION: You are only required to provide the topic of your research paper and a sentence or two discussing the purpose of the paper for this assignment. Below is information that you will need for writing the final paper. It is not intended for this assignment.
Instructions:
Details of Project Paper (15%): You must include at least 5 references.
Prepare a 8-10 page paper in Microsoft Word (counts as 15% of the final grade) in APA format (see writing expectations in the Policies section) (350 words per page).
At a minimum include the following:
- Detailed description of the area researched
- Technology involved in the area
- Future trends in the area
- Example companies involved in the area
- Regulatory issues surrounding the area
- Global implications for the area
- References (minimum of 5)
- You may use resources from the APUS Online Library, any library, government library, peer-reviewed reference, Internet (technology-related sites only-Wikipedia is not accepted). The paper must by at least 8 pages double-spaced, 1" margin all around, black 12 point fonts (Times New Roman or Arial) with correct citations of all utilized references/sources, (pictures, graphics, etc... are extra - allowed but extra for the minimum page count). The title page and references are also required but don't count in the minimum page count. A minimum of 5 references are needed. The body of the paper should be minimum of 8 pages.
- The paper will be subjected to checking against plagiarism. All research papers will automatically be submitted to TurnItIn for review. The paper must follow acceptable originality criteria (no more than 30% max total).
- Save the file using the following file naming convention: ISSC361_Project_First_Last.doc(x) (where first and last are your first and last names resp.) and submit the file in this assignment area
Here are the originality report requirements:
- The originality report must be less than 30% match
- You will submit the paper though the TII link in the assignment tab.
Submission Instructions:
If you do not follow these three requirement instructions you will get a 0 for your project paper assignment. I will give you the chance to rework your papers until an acceptable level of match is achieved.
If turnitin.com matches more than 40%, points will be deducted. If the score is 50-100%, the paper will be rejected and a score of zero (0) will be recorded.
Explanation & Answer
Attached.
Running head: CLOUD SECURITY
Cloud Security
Name
Institution
Date
CLOUD SECURITY
2
Purpose of the paper:
To establish why cloud security is one of the most critical issues in the storage of
information for both the government and the private organization. The essay will also endeavor to
find out why the government is concerned so much with data security and any information held or
stored in the cloud and the dangers that might be associated with any mishandling of such data.
Information privacy is a significant concern and any data stored on the cloud either for private
citizens, corporate organizations or government and this paper will equally look deep into how
watertight security and policy measures may be enhanced to safeguard information security.
Cloud Security
Cloud computing security commonly known as cloud security is the protection of computer
infrastructure, data and all the applications used in cloud computing. Essentially, cloud security is
made up of sets of rules; technologies as well as procedures which protect not only the applications,
data, and infrastructure but also cloud-based systems (Carlin & Curran, 2013). Cloud security is
necessary because the security measures are principally used to protect the privacy of the
consumers. Again, the security measures are a necessity since they are used to put up
authentication procedures for both the devices as well as their users. Cloud security is useful when
filtering online traffic, and it is also configured and tailor-made to fit the needs of the consumers
and their businesses. Reduction in administration overheads is achieved as a result of managing
the configurations in one common place. The delivery of cloud security is dependent on cloud
solutions and cloud providers.
Cloud security is quite essential to individual users because it informs them about the safety
of their data and systems (Carlin & Curran, 2013). Ideally, cloud security comes in handy because
CLOUD SECURITY
3
of the benefits it offers. Firstly, cloud security centralizes security and protection of data and
applications. Further, cloud-based networks are made up of multiple endpoints and various
devices. Therefore having the ability to manage all the entities mentioned above centrally
facilitates filtration and traffic analysis. Managing the cloud-based business networks enables
solution providers and business owners to easily initiate disaster recovery plans and initiate the
proper course of actions to avert any possible threat. Secondly, cloud storage and cloud security
minimize the overall costs because a used or solutions provider does not have to invest in
purchasing hardware for storage of applications and data (Ramachandra, Iftikhar & Khan, 2017).
Cloud security provides security features which offer total protection, and no human intervention
is warranted hence reducing costs which would have otherwise been used to pay the maintenance
crew.
Additionally, cloud security provides ultimate reliability and reduces administration
overheads. The cloud solution is the best option for manual security configurations and updates
(Ramachandra, Iftikhar & Khan, 2017). Updating security features manually can be tedious and
drains a lot of resources. However, when all these security updates are relocated to the cloud, then
they are managed in a central place without the need for human intervention. Cloud security is
quite reliable because making use of the proper cloud security measures enables the users and
cloud service providers to access their data and application anywhere anytime, provided these
entities are within the cloud. It is therefore advisable to move all systems to the cloud for reliability
reasons.
Cloud Security Technologies
Hybrid Cloud
CLOUD SECURITY
4
Recently, businesses ha...