Compare different technologies and techniques


Problem

Senario

Software Development Life Cycle for Data in the Cloud Computing Environment

Each team member is a security software architect in a cloud service provider company, assigned to a project to provide the client with data integrity and confidentiality protections for data in transit that will be using applications in the cloud. Your client is an HR company that is moving HR applications and HR data into a community cloud, sharing tenancy with other clients. Your company has set up a software as a service, SAS, offering for its client base.

The data that the HR company will be pushing to and from the cloud will contain sensitive employee information, such as personally identifiable information, PII. You will have to address sensitive data and transit issues of the client data using the HR applications stored in the cloud, and provide a life cycle management report that includes solutions to the cloud computing architect of your company.

The team will decide on a team leader, who may divide sections to complete by small groups of team members. You decide to make an outline of the report, and to use the phases of the software development lifecycle, SDLC, as a basis for the report. The outline includes the following: examine the cloud computing environment and determine the protection techniques and how they will be applied to components within the cloud to ensure end-to-end protection of data in transit. Consider what security techniques and methods are applicable, and tailor the software development life cycle methodology for the cloud computing environment.

Select the best methods and techniques for protecting confidentiality and integrity of data in transit, and apply principles to the whole study approach. These are the software development life cycle phases to use as the report outline: initiating projects/defining scope, functional design, analysis and planning, system design specifications, software development, installation/implementation, tailoring, operation and maintenance, and disposal. Work in partnership teams to create the report.

Could you please help the following project at least 3 pages, APA and soruces.

Step I: Learn Different Ways to Secure Data in the Cloud (Different ways to secure the cloud)

Include a discussion about securing data in the cloud.

Step III: Provide Analysis and Planning for Evaluating Technologies (Evaluating Technologies)

i. Compare different technologies and techniques, including encryption, access control, and other techniques.

ii. Consider their efficiency, effectiveness, and other factors that may affect the security of the data in the cloud

iii. Conclude which is generally a better, stronger technique and why.

Request for Solution File

Ask an Expert for Answer!!
Software Engineering: Compare different technologies and techniques
Reference No:- TGS03261387

Expected delivery within 24 Hours