Shared security responsibility model that a dba must be aware of when moving to the cloud (Essay Sample)
I need help on my presentation for my lean six sigma course. My topic is about KANBAN which is a process of identifying just-in-time material flow.
you can see below the instructions of the PowerPoint presentation. Please follow this instructions and also submit a word document helps me what should I say and explain in each slide.
Instructions
1) Max 10 pages
2) Content should contain:
a) Topic lecture
b) Application
c) Real case study about successful/bad or lack of application of "Topic"
d) Documented references for topic material + case study
Thanks
Shared Security Responsibility Model
Name
Institutional affiliations
Shared Security Responsibility Model
The cloud presents critical issues despite being an effective, efficient, and low-cost archetype for dynamic firms. Organizations are more concerned about security and privacy, mostly due to inadequate visibility of the cloud computing infrastructure (Sharma, Husain & Ali, 2017). Currently, computing service provides (CSPs) are sticking to the shared security responsibility model (SSRM) that calls for a duplex approach (customer and provider) to cloud security.
DBAs should understand that SSRM is necessary to guarantee the continued safety and privacy of the cloud database in a cloud. The cloud can be utilized as a PaaS, SaaS, or IaaS service. The deployment model can be public, private, hybrid, or community. Therefore, “these different configurations of one or more cloud computing services and cloud computing deployment models mean that not one party is totally responsible for data security and privacy in a cloud computing service” (Lane, Shrestha & Ali, 2017). Once DBAs are aware of where the provider's responsibility ends and where the organization begins, they will take the necessary risk management and mitigation approaches to ensure the clouds under their management are secure.
Other Topics:
- SOX COMPLIANCE FRAMEWORK. IT & Computer Science EssayDescription: Compliance with SOX is not only a legal requirement but also a profitable business practice. Corporations should, of course, act ethically and restrict access to sensitive financial systems....1 page/≈275 words| 1 Source | APA | IT & Computer Science | Essay |
- SECURITY CERTIFICATIONS. IT & Computer Science EssayDescription: GIAC Certifications establishes and oversees certifications for premier, qualified cybersecurity. GIAC Certifications offer the highest and most stringent guarantee of expertise and cybersecurity skills available to business, government, and military customers worldwide....1 page/≈275 words| 2 Sources | APA | IT & Computer Science | Essay |
- Abudant data IT & Computer Science Essay Research PaperDescription: The advancement and proliferation of technology over the last few decades have seen the cumulation of massive amounts of information referred to as “big data.” The data is either user-generated or as a remnant of actions performed using technological devices. The vast information...2 pages/≈550 words| 5 Sources | APA | IT & Computer Science | Essay |