Reference no: EM133051276
Question 1. List the security advantages of cloud-based solutions.
Question 2. List the security disadvantages of cloud-based solutions.
Question 3. Define and discuss the data wiping process.
Question 4. Discuss how a cloud-based solution provider may reduce the risk of a DDoS attack.
References: (Chapter 9)
Erl, T., Mahmood, Z., & Puttini, R. (2014). Cloud computing: concepts, technology, & architecture. Upper Saddle River, NJ: Prentice Hall.
Jamsa, K. A. (2013). Cloud computing: SaaS, PaaS, IaaS, virtualization, business models, mobile, security and more. Burlington, MA: Jones & Bartlett Learning.