- List the security advantages of cloud-based solutions.
- List the security disadvantages of cloud-based solutions.
- Define and discuss the data wiping process.
- Discuss how a cloud-based solution provider may reduce the risk of a DDoS attack.
Use only 70-words max per topic to discuss and present your answer.
References: (Chapter 9)
Erl, T., Mahmood, Z., & Puttini, R. (2014). Cloud computing: concepts, technology, & architecture. Upper Saddle River, NJ: Prentice Hall.
Jamsa, K. A. (2013). Cloud computing: SaaS, PaaS, IaaS, virtualization, business models, mobile, security and more. Burlington, MA: Jones & Bartlett Learning