Describe the authentication procedures and related security


Assignment

Before Good Foods can implement a cloud-based service, it must be sure its applications, company data, and employee and customer information is secure. The company is concerned with system access, both internally and externally. It is also concerned with its ability to review the health of a cloud-based system after implementation. The company has asked you to find what security measures and auditing methods are available with cloud-based services.

To complete this assignment, include the following information in a minimum of 5 pages (not counting title page and references page):

• Describe the authentication procedures and related security concerns. Include a discussion of various identification methods.

• Describe the authorization techniques and related security concerns. Include a discussion of user groups and application level access.

• Describe security concerns as they relate to network connections. Include a discussion of each type of network connection currently in use.

• Describe cloud computing auditing methods and related security concerns. Include a discussion of current industry audit tools and the role of the vendor in each cloud-based delivery model.

• Review all of the following leading service providers from the list below and summarize their ability to address system and user security, as well as their ability to conduct security audits and minimize performance degradation as they relate to security measures:

o Salesforce
o Google
o Hewlett-Packard
o IBM
o Rackspace
o Microsoft
o Amazon

• Indicate which vendor(s) may be a fit for the Good Foods company, based on the vendor's ability to address system and user security, as well as audit and performance issues.

Format your assignment according to the following formatting requirements:

1. The answer should be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.

2. The response also includes a cover page containing the title of the assignment, the student's name, the course title, and the date. The cover page is not included in the required page length.

3. Also include a reference page. The Citations and references should follow APA format. The reference page is not included in the required page length.

Request for Solution File

Ask an Expert for Answer!!
Computer Network Security: Describe the authentication procedures and related security
Reference No:- TGS02985230

Expected delivery within 24 Hours