Cloud Computing and Security for the National Security Agency

User Generated

Yrkvunaare

Computer Science

CSS410

Colorado Technical University

Description


  • Address the following in 3–4 pages:
    • What are 2–3 of the most effective access controls and techniques?
      • What do you recommend to help secure the cloud for your chosen company?
    • What are the best methods for securing data at rest (DAR) and data in motion (DIM)?
      • Be sure to cover what is recommended, and be sure to give your recommendations and why you are making those recommendations.
  • Reference all sources using APA style.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Answer posted please confirm.Kindly go through the work and let me know in case of any question,problem or clarification.Please contact me in case of anything unsatisfactory or if a certain requirement has not been met.If the answer is okay,looking forward to work with you again.Thanks

Running head: CLOUD COMPUTING AND SECURITY FOR THE NATIONAL SECURITY AGENCY

Cloud Computing and Security for the National Security Agency
Name
Institution affiliation
Date

1

CLOUD COMPUTING AND SECURITY FOR THE NATIONAL SECURITY AGENCY

2

Cloud Computing and Security for the National Security Agency
The national security agency is the main player in surveillance activities in the United
States. Concerning personnel and technical expertise, it is regarded as the largest intelligence
group. Operating under the jurisdiction of the department of defense is mandated to monitor
global intelligence, collect and process information and data regarding foreign intelligence.
Because the agency protects the United States against external attacks, it is authorized to achieve
its missions through sabotage of the electronic systems and software. This mass surveillance
requires that it employs the highest levels of security and use of cloud computing to secure its
most vital data/information. To secure their cloud, the national security agency like most other
organizations and companies is required to use specific access controls and techniques. Also, it is
needed to ensure that it employs the best methods to secure its data at rest (DAR) and data in
motion (DIM) to protect the American intelligence information.
Access controls are employed to ensure that the public can get information but in a
controlled way. It offers system administration and therefore grants people the privilege to read
information that they need. Public...


Anonymous
Excellent resource! Really helped me get the gist of things.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags