TECHNOLOGYS ETHICAL LEGAL PRIVACY ISSUES
USING PRIVACY SETTINGS IN SOCIAL MEDIA
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Antivirus software
|
|
Data Protection by Design
|
|
Cryptography
|
|
None of the above
|
Detailed explanation-1: -Segregation allows the cloud provider to divvy up resources to the different groups, and isolation ensures they can’t see or modify each others’ assets. Multitenancy doesn’t only apply across different organizations; it’s also used to divvy up resources between different units in a single business or organization.
Detailed explanation-2: -Encryption is an effective, well-established method for securing and transporting confidential data.
Detailed explanation-3: -Explanation: For hosting private clouds, a hyper-converged infrastructure (HCI) is the best option.
Detailed explanation-4: -Cloud security, also known as cloud computing security, is a collection of security measures designed to protect cloud-based infrastructure, applications, and data. These measures ensure user and device authentication, data and resource access control, and data privacy protection.