Cloud-based technology offers organizations a means to deploy new applications and software without the costly overhead of network infrastructure and recurring software expenses. With this convenience there are trade-offs relating to security, privacy, and control. As the CISO of a mid-sized organization, discuss these concerns and explain how an organization might mitigate them. Your analysis should demonstrate that you understand and know how to apply these common information security concepts, and it must address the full scope of information security processes and technologies involved in cloud-based services.
Your well-written paper must meet the following requirements:
- Your paper must be 4 pages in length and conform to the CSU Global Writing Center (Links to an external site.). Be sure to include an introduction, a body with at least two fully developed paragraphs, and a conclusion. Also include at least four scholarly references in addition to the required readings. The CSU Global Library is a good place to find these resources.
- Write clearly, using excellent grammar and style techniques. Be concise and logical. You are being graded, in part, on the quality of your writing. If you need assistance with your writing style, start with Tools for Effective Writing at the CSU Global Library (Links to an external site.), accessible from the Library’s homepage.
Post a Comment