Cloud Security Alliance-top Threats
you will review and analyze the report “Cloud Security Alliance – Top Threats”
In this assignment, you will review and analyze the report “Cloud Security Alliance – Top Threats” and share your thoughts on the ideas or claims mentioned in the paper.
What is expected:
(a). Cloud Security Alliance (CSA) is a not-for-profit organization with a mission to “promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing”. As part of their mission, CSA develops technical documents on different aspects of cloud computing. One such document titled “Cloud Security Alliance Top Threats – The Treacherous 12 (2016)” discusses twelve top threats in cloud computing field and possible remedies for each threat.
(b). You need to review this document and write-up a report highlighting and explaining the major points that you understood from the paper and any take-home messages and whether you agree/disagree with them.
Please note that you will be graded based on how critically you express your understanding of this document in your report
Deliverables:
1. Please write a 2-page report that includes: (i) a summary of the key points that you understood from the document, (ii) your personal opinion on the main points mentioned in the document that you agree with and why, (ii) any points mentioned in the document that you do not agree with and incorporate your analysis on why you disagree on those point(s)
2. Please upload your report (as a single word or pdf file)
Answer preview
Cloud computing has been one of the newest technology where companies access get on-demand delivery of database, storage, computing power, and many other Information Technology resources and services through the internet. The most benefit of cloud computing is the fact that companies can use as much or as little of these services and resources according to their demand. Resources and services are fully managed and secured by cloud service providers. Companies need only to have a computer and internet access, making it economical and cheap (Subramanian & Jeyaraj, 2018). However, according to Cloud Security Alliance (CSA)- Top Threats, cloud computing has created new security problems and breaches that bypass the benefits of companies swit…
(850 words)