Description
611_W5_Ass
Lastly, include steps for confirming their data protection practices.
Your assignment should be in a Word compatible document with proper attention to spelling, punctuation, and grammar. All references and citations must be in APA or MLA format. You should be included a list of references at the end in addition to citing information taken from those references. This is a NEW assignment. Do not just copy your previous assignment and alter a few words. The 90% originality rule for plagiarism is still in effect for this assignment.Attach the document to this assignment link. This assignment should be a minimum of two pages in length and is due at the end of the academic week
Explanation & Answer
Good luck in your study and if you need any further help in your assignments, please let me know Can you please confirm if you have received the work? Once again, thanks for allowing me to help you R MESSAGE TO STUDYPOOL NO OUTLINE IS NEEDED AS IT IS A DISCUSSION
DATA SECURITY
1
Data security
Student’s Name
Institution Affiliation
Date of Submission
DATA SECURITY
2
Introduction
The use of encryption in a protection of data when in rest simple storage is suggested to
use public or private (IaaS cloud service) the best example is S3 or Amazon simple storage. The
application that works with SaaS or PaaS uses Salesforce or Google Apps. Therefore, it is
feasible as it is compensating control. Avoid of cloud-based application is necessary since it is
not encrypted since it could prevent data searching or indexing to the data at rest. For
unauthorized access prevention, in commingled data, it is likely to access w...