Final Report Part 2: Cloud Storage-as-a-Service and Course Reflection

User Generated

oxgc824

Computer Science

Description

Create a Microsoft® PowerPoint® presentation containing eight slides, including Introduction, Conclusion, and Reference slides. Include detailed speaker notes with each slide.

Scenario: You are preparing for a new company-wide project to provide each employee with a personal cloud storage account. The VP of Information Technology has asked you to research solutions for the organization and make sure the CSaaS provider encrypts data in transit and at rest. The U.S.-based company has 100,000 staff members and offices in 100 countries. You will be preparing a presentation of products to present to the company's Information Technology Committee so they can understand the technology, security features, and associated cyber risk. Your task is to:

  • Research Cloud Storage-as-a-Service (CSaaS) providers
  • Briefly define the technology involved to implement a cloud-based technology such as CSaaS
  • Briefly describe the registration and authentication process for one of the providers
  • Correctly identify the encryption technology used both in transit and in storage for one provider
  • Correctly identify the ethics and privacy policies of one CSaaS provider

All references need to adhere to APA guidelines, and images should not be copied unless author permission is obtained or copyright free images are used.

Compile your work from Weeks Four and Five into a zipped file.

Unformatted Attachment Preview

Final Project Part 1: Paper and Storyboard Tejashree Patel CYB-100 Professor Moneypenny March 20, 2018 Espionage, Intel Gathering, Cyber Warfare Espionage Intelligence Gathering Cyber Warfare Unlawful or unethical gathering of information about a competitor, or a foreign country, with intent to use the information to derail the plans of the country in question. Using resources to lawfully gather information which would help in making appropriate decisions about a certain situation. Here, the objective is to ensure safety of the interested parties Type of war occurring on the internet. It is a form of conflict that escalates to the extent of one party oppressing or hampering effective activities of another party by use of the internet or cyber space. Military influence on intelligence gathering, espionage, and cyber warfare • The military provides the necessary resources in the three activities • The more tactical the military is, the higher the chances that it is effective in the three activities • The three are part of what is learned in military academies as it aids countries be better equipped in protecting the citizens Personal Privacy Incident • The JP Morgan attacks on networks in the United States led to loss of personal information (Barzel, 2015) • Perpetrators have since been arrested and are facing trial • Conducting business in the cyber space prevents challenges such as: • Data breaches for espionage acts • Cyber crime and loss of client information to hackers Physical Assets of the Cyber Domain Such assets that aid in effective activities within the domain include: • a) Furniture and fixes: I have included these because they are needed to place and fix some machines in the cyber domain. • b) Computer equipment: this includes serves, notebook computers and mainframe computers. They are all required because they are part of cyber domain. • c) Storage media: these includes disks, DATS, magnetic tapes and CDs. They are important components of cyber domain. • d) Technical equipment’s: These are also physical assets of cyber domain, and they include air conditioners, used for cooling machines and power supplies, that supply power in the machines. • e). Communication equipment: they include fax machines, modems, EPABXs and routers, and these are also components of cyber domain. Espionage, intelligence gathering, cyber warfare, and physical assets in the modern day • The cyber domain is a primary asset in espionage and intelligence gathering • The possession of physical assets is one of the primary deterrence against cyber warfare • The more endowed a nation-state is, the more secure it is against cyber warfare References Barzel, N. (2017, May 22). Israeli Media: JPMorgan hack perpetrator to pay $403 million to US authorities. Finance Magnates. Retrieved from www.financemagnates.com/forex/regulation/israeli-scammer-pay-403million-us-authorities-following-sting-operation/
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Introduction

Cloud Storage-as-a-service
Providers





Also called the (MSP), Managed Service
Provider.
The files and data stored can only be
accessed through the internet.
They provide non-storage services.
Customers are able to download and
upload files and documents for free.

Technology involved to implement
a cloud-based tech...


Anonymous
Nice! Really impressed with the quality.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags