EMERGING TRENDS IN COMPUTING
CLOUD COMPUTING
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Access control
|
|
Auditing
|
|
Authentication
|
|
All of them
|
Detailed explanation-1: -Authentication and identity, access control, encryption, secure deletion, integrity checking, and data masking are all data protection methods that have applicability in cloud computing. Basic data encryption shouldn’t be the only solution you depend on when it comes your organization’s cloud data security.
Detailed explanation-2: -Authorization is used to control the access of data. It is the mechanism by which a system determines what level of access a particular authenticated user should have to secure resources controlled by the system. Data integrity in the cloud system means preserving information integrity.
Detailed explanation-3: -Data protection is the process of protecting sensitive information from damage, loss, or corruption. As the amount of data being created and stored has increased at an unprecedented rate, making data protection increasingly important.
Detailed explanation-4: -The five elements of cloud security are a secure architecture, enforcing compliance, practicing due diligence, monitoring the network, and incorporating solid authentication protocol.