Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Match to appropriate response. a. Occurs when the tenant loses physical control or does not manage their own physical servers. b. When data does not

Match to appropriate response.

a. Occurs when the tenant loses physical control or does not manage their own physical servers.

b. When data does not remain in the same system, may be exposed to the public or unauthorized users and which may result in legal concerns.

c. Cloud provider shall display commitment and provides a service that is reputable, feasible, capable and sustainable. The more the service provider leverages proprietary interfaces the higher the concern of the tenant because of the risk of tenant lock-in.

d. Is a concern if the data is subject to legal restrictions or regulatory compliance.

e. When a cloud provider does not expose details of their internal policy or technology implementation, tenants or users must trust the cloud providers security claim. Basically, the tenants and customers cannot see how the cloud provider handles security, privacy and reports security incidents.

f. A computer, network, or paper based activity which results (or may result) in misuse, damage, denial of service, compromise of integrity, or loss of confidentiality of a network, computer, application, or data; and threats, misrepresentations of identity, or harassment of or by individuals using these resources. It is important that the tenants and customers are informed when an incident occurs

g. Network connectivity and bandwidth is available when required.

h. When data is mixed with data that belongs to others.

i. The ability of the cloud provider to continue their operations and services if subjected to a disaster.

j. A concern when cloud computing brings new classes of risks and vulnerabilities.

1. Network Availability

2. Cloud Provider Viability

3. Disaster Recovery and Business Continuity

4. Security Incidents

5. Transparency

6. Loss of Physical Control

7. Privacy and Data

8. Control over Data

9. New Risks, New Vulnerabilities

10. Legal and Regulatory Compliance

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Readings In Database Systems

Authors: Michael Stonebraker

2nd Edition

0934613656, 9780934613651

More Books

Students also viewed these Databases questions