Reference no: EM132928740
List the security advantages of cloud-based solutions.
List the security disadvantages of cloud-based solutions.
Define and discuss the data wiping process.
Discuss how a cloud-based solution provider may reduce the risk of a DDoS attack.
References: (Chapter 9)
Erl, T., Mahmood, Z., & Puttini, R. (2014). Cloud computing: concepts, technology, & architecture. Upper Saddle River, NJ: Prentice Hall.
Jamsa, K. A. (2013). Cloud computing: SaaS, PaaS, IaaS, virtualization, business models, mobile, security and more. Burlington, MA: Jones and Bartlett Learning