Research cloud storage-as-a-service providers


Discuss the below:

Create a Microsoft® PowerPoint® presentation containing eight slides, including Introduction, Conclusion, and Reference slides.

Scenario: You are preparing for a new company-wide project to provide each employee with a personal cloud storage account. The VP of Information Technology has asked you to research solutions for the organization and make sure the CSaaS provider encrypts data in transit and at rest. The U.S.-based company has 100,000 staff members and offices in 100 countries. You will be preparing a presentation of products to present to the company's Information Technology Committee so they can understand the technology, security features, and associated cyber risk. Your task is to:

Research Cloud Storage-as-a-Service (CSaaS) providers

Briefly define the technology involved to implement a cloud-based technology such as CSaaS

Briefly describe the registration and authentication process for one of the providers

Correctly identify the encryption technology used both in transit and in storage for one provider

Correctly identify the ethics and privacy policies of one CSaaS provider

 

US

RUSSIA

CHINA

Strategical

Abuse Act and Computer Fraud prohibits computer's unauthorized access their  interference, and data obtaining

 

Organisations or Individuals should be responsible for their network usage should not set up communication groups or websites due to fraudulent purposes and illegal activities. 

All government levels shall organize, carry out security of network and publically regularly.

 

 

Tactical

Electronic Communications Privacy Act governs data interception, access to data

Any person who violates Article 27 is engaging in activities that  endanger cyber security and may be imprisoned for between 5 to 15 days  be detained for 5 to 15. This depends on the severity of the case.

Network providers shall provide and maintain their products and services for time limits agreed upon between them and clients.

 

Operational

The Paperwork Reduction Act 1995

This law gave Management office and Budget the mandate and responsibility to develop cyber policies.  

People have a right to have the errors in their personal information corrected by their network operators.

Operators of Network shall cooperate with network departments on lawful supervision and implementation tasks.

Attachment:- Information Security.rar

Solution Preview :

Prepared by a verified Expert
Computer Engineering: Research cloud storage-as-a-service providers
Reference No:- TGS01946791

Now Priced at $50 (50% Discount)

Recommended (99%)

Rated (4.3/5)