What is cloud security and issues associated to it?

1 Answer

Answer :

It refers to a wide range of policies, technologies and forms ofcontrol designed to protect data, applications and infrastructureassociated with data stored in the cloud (Free or unprovidedstorage space somewhere in the network).Some drawbacks that have arisen are: dispersion (duplication ofinformation), possible lack of security (your data is no longerdirectly within your reach), no internet, no cloud (no connection,no access to data), and some possible conflicts of legal coverageor copyright.

Related questions

Description : A company is considering a cloud environment to improve the operating efficiency for their dataand applications. The company is part of an industry where strict security and data privacy issues are of the highest ... a good choice? A. hybrid cloud B. public cloud C. private cloud D. governed cloud

Last Answer : private cloud

Description : In which issue, It is challenging to migrate an application, which is resource-intensive to cloud and to execute it via Virtual Machine? A. Architectural Issues B. Security and Privacy C. Mobile Communication Congestion D. Live VM Migration

Last Answer : Live VM Migration

Description : Point out the wrong statement. a) Google App Engine lets you deploy the application and monitor it b) From the standpoint of the client, a cloud service provider is different than any other networked ... be brought to bear to solve mobile, desktop, and local server issues d) All of the mentioned

Last Answer : From the standpoint of the client, a cloud service provider is different than any other networked service

Description : Is anyone else having security issues with Yahoo today/lately?

Last Answer : Nope worked just fine for me.

Description : Are there security issues with new US passports?

Last Answer : There are security issues with all chips that contain personal information, but I don't think you need to take any additional precautions with your new passport than you would have with your ... bigger problems than possible identity theft if you manage to lose your passport in the right country!

Description : Write down the major issues of security and integrity of information. -Technology

Last Answer : There are three major issues as follows:1. Confidentiality2. Integrity3. Availability

Description : Which group of representatives oversees foreign assistance security issues and the U.S. military?

Last Answer : Committee on Foreign Affairs

Description : Which of the following are the foundation of all the technical security issues in your information systems? a. Network Infrastructure vulnerabilities b. Information vulnerabilities c. System Infrastructure vulnerabilities d. Network Information vulnerabilities

Last Answer : a. Network Infrastructure vulnerabilities

Description : Which of the following are issues associated with SaaS? A. Modest software tools B. Network dependence C. Centralized management and data D. Multitenant solutions

Last Answer : Network dependence

Description : Which of these assumptions is not associated with strategies for goods-producing location decisions? a. most major costs can be identified dentified explicitly explicitly for each site b. focus on ... intangible costs can be evaluated e. location location is a major determinant determinant of cost

Last Answer : c. high customer contact issues are critical

Description : Product -related ethical issues can arise when marketers A)do not provide consumers with enough information about how a product is priced. B)force intermediaries to behave in a specific manner. C) ... with using a product. E)manufacture a product that is very similar to a competing product.

Last Answer : D)fail to disclose information to consumers about the risks associated with using a produc

Description : Primary market is associated with ……………………. Issues. a. Old b. New c. Old and New d. Very Old

Last Answer : b. New

Description : Why should I get cloud computing security?

Last Answer : McAfee and Norton are very commonly used security programs for the computer. Amazon.com or Best Buy are other good places to go to look for security devices for your laptop.

Description : Are there cloud computing security risks that I should be aware of?

Last Answer : Jul 27, 2011 " Cloud computing can be a convenient way to store and share data, but there are six cloud computing security risks that consumers should be aware of. ... When users entrust their information to a cloud, they risk not being able ...

Description : What is the risk in cloud computing security?

Last Answer : It depends on how much security you already have on your system. If you have bad security, then the cloud has bad security. If you have good security, then the cloud has good security.

Description : How cloud computing service ensure the business security?

Last Answer : The role of cloud based security solutions is to ensure that customer's information is safe at all time. A cloud service filters information and restricts unwarranted access. It offers back up for the client's information and offers data recovery in case of any data loss.

Description : What is cloud computing security?

Last Answer : You can use Spyware Cease to remove virus and protect your PC the above mentioned is about PC security, cloud computing security threats is mainly about: Cloud Security, Data Protection, Identity Management, Physical Security, Application Security, Data Recovery.

Description : Which of the following is the most important area of concern in cloud computing? a) Security b) Storage c) Scalability d) All of the mentioned

Last Answer : Security

Description : ________ dimension corresponds to two different states in the eight possible cloud forms. a) Physical location of data b) Ownership c) Security boundary d) None of the mentioned

Last Answer : None of the mentioned

Description : How many types of security boundary values exist in Cloud Cube model? a) 1 b) 2 c) 3 d) None of the mentioned

Last Answer : 2

Description : Geographic distribution of data across a cloud provider'’ network is a problem for many enterprises because it: A. Breaks compliance regulations B. Adds latency C. Raises security concerns D. Makes data recovery harder

Last Answer : Breaks compliance regulations

Description : What is the name of the organization helping to foster security standards for cloud computing? A. Cloud Security Standards Working Group B. Cloud Security Alliance C. Cloud Security WatchDog D. Security in the Cloud Alliance

Last Answer : Cloud Security Alliance

Description : What is the name of the organization helping to foster security standards for cloud computing? A. Cloud Security Standards Working. B. Cloud Security Alliance. C. Cloud Security WatchDog. D. Security in the Cloud Alliance.

Last Answer : Cloud Security Alliance.

Description : Geographic distribution of data across a cloud provider’s network is a problem for many enterprises because it: A. Breaks compliance regulations B. Adds latency C. Raises security concerns D. Makes data recovery harder

Last Answer : Breaks compliance regulations

Description : What is the name of the organization helping to foster security standards for cloud computing? A. Cloud Security Standards Working Group B. Cloud Security Alliance C. Cloud Security WatchDog D. Security in the Cloud Alliance

Last Answer : Cloud Security Alliance

Description : Point out the correct statement: 1) Different types of cloud computing service models provide different levels of security services 2) Adapting your on-premises systems to a cloud model requires that you determine what ... are correct B. only 1 is correct C. 2 and 3 are correct D. none are correct

Last Answer : 1,2,3 are correct

Description : Point out the correct statement: 1) Different types of cloud computing service models provide different levels of security services 2) Adapting your on-premises systems to a cloud model requires that you determine what ... are correct B. only 1 is correct C. 2 and 3 are correct D. none are correct

Last Answer : 1,2,3 are correct

Description : What is the name of the organization helping to foster security standards for cloud computing? A. Cloud Security Standards Working B. Cloud Security Alliance C. Cloud Security WatchDog D. Security in the Cloud Alliance

Last Answer : Cloud Security Alliance

Description : Following statements are talking about . 1. It's more complex than a hybrid cloud, which is typically a paired private and public cloud. 2. This cloud add more clouds to the mix, perhaps two ... , private use-based accounting A. Multi-Cloud B. Private Cloud C. Business Cloud D. Storage Cloud

Last Answer : Multi-Cloud

Description : What advantage is there for an enterprise to adopt a virtual private cloud model? A. Reduce costs by adopting a flexible pricing model for the entire operation. B. Reduce infrastructure ... such as security and performance since the entire infrastructure will be managed within the IT department.

Last Answer : Manage sensitive data in a compliant and secure manner and benefit from flexible pricing models for select services or infrastructure.

Description : Which statement is true about the security of the cloud computing environment? A. It is compromised because it is a shared environment. B. Multitenant applications are not able to run in a cloud ... a private cloud. D. Access to critical data is better controlled in a private cloud environment.

Last Answer : Access to critical data is better controlled in a private cloud environment

Description : Which two statements are true about the public cloud model? A. It meets security and auditing requirements for highly regulated industries. B. Resources and infrastructure are managed ... capital expenditures to creating a virtualized and elastic infrastructure within the enterprise data center.

Last Answer : It shifts the bulk of the costs from capital expenditures and IT infrastructure investment to an utility operating expense model.

Description : Which of the following simply means to hardware or software load over web servers, that improver's the efficiency of the server as well as the application? A. Amazon Cloud-front B. Elastic Load Balancer C. Load Balancing D. Security Management

Last Answer : Load Balancing

Description : __________ is an in-built back end component of cloud computing. A. Service B. Application C. Storage D. Security

Last Answer : Security

Description : Point out the wrong statement. a) Each different type of cloud service delivery model creates a security boundary b) Any security mechanism below the security boundary must be built into the system ... mechanism above the security boundary must be maintained by the customer d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the wrong statement. a) Securing data sent to, received from, and stored in the cloud is the single largest security concern b) The problem with the data you store in the cloud is that ... the cloud from direct client access is to create layered access to the data d) All of the mentioned

Last Answer : One and only approach to isolating storage in the cloud from direct client access is to create layered access to the data

Description : Point out the correct statement. a) The cloud service model you choose does not determine the variety of security features, compliance auditing, and other requirements b) To determine the particular ... you normally use for your applications only CSE-R17.BLOGSPOT.COM d) All of the mentioned

Last Answer : To determine the particular security mechanisms you need, you must perform a mapping of the particular cloud service model to the particular application you are deploying

Description : Point out the correct statement. a) Different types of cloud computing service models provide different levels of security services b) Adapting your on-premises systems to a cloud model requires that ... be transferred and stored in an encrypted format for security purpose d) All of the mentioned

Last Answer : Data should be transferred and stored in an encrypted format for security purpose d) All of the mentioned

Description : Which of the following is the most important area of concern in cloud computing? a) Security b) Storage c) Scalability d) All of the mentioned

Last Answer : Security

Description : The four levels of Cloud Federation include a) Conceptual level, Logical level, Operational level, Infrastructural level b) Conceptual level, Service level, Operational level, Infrastructural ... level, Infrastructural level d) Security level, Logical level, Operational level, Infrastructural leve

Last Answer : Conceptual level, Logical level, Operational level, Infrastructural level

Description : Considering areas of concern, external network requirements, internal network requirements is the evaluation of a) Assess the security provisions for cloud applications b) Ensure cloud networks and ... Manage people, roles and identities d) Understand the security requirements of the exit process

Last Answer : Ensure cloud networks and connections are secure

Description : Which is considered as an emerging industry best practice for dealing with dynamic and loosely coupled trust relationships in the collaboration model of an organization in Identity and Access management a) Identity federation b) Cloud federation c) Security federation d) None of the above

Last Answer : Identity federation

Description : One of the key objectives for Security initiatives in the cloud should be subject to measurements that gauge effectiveness in mitigating risk to the enterprise a) Effective Use of Resources b) Sustained Performance c) Risk Mitigation d) Strategic Alignment

Last Answer : Risk Mitigation

Description : The management model that facilitates effective and efficient security management and operations in the cloud environment so that an enterprise’s business targets are achieved is a) Cloud security b) Trust model c) Security model d) Cloud security governance

Last Answer : Cloud security governance

Description : Which is the model have to develop in order to protect e-commerce and online shopping provided by e-logistic vendors a) Cloud model b) API model c) Security model d) Trust model

Last Answer : Trust model

Description : A Solution to overcome the challenge to support a large number of application service consumers from around the world, cloud infrastructure providers (i.e., IaaS providers) have established data ... ) Global exchange of cloud resources b) Resource provisioning c) Cloud security d) Resource sharing

Last Answer : Global exchange of cloud resources

Description : “Enterprises should mandate that security investments, services, and projects in the cloud are executed to achieve established business goals” is a key objective of _____________ a) Strategic Alignment b) Value Delivery c) Risk Mitigation d) Sustained Performance

Last Answer : Strategic Alignment

Description : Which is not the advantages of Cloud Computing? a) Security b) Work Without Internet c) Scalability d) Reliability

Last Answer : Work Without Internet

Description : Which of the following is the most important area of concern in cloud computing? a) Security b) Storage c) Scalability d) All of the mentioned

Last Answer : Security

Description : __________ security consultants uses database security monitoring & scanning tools to maintain security to different data residing in the database / servers / cloud. a) Database b) Network c) System d) Hardware

Last Answer : d) Hardware