COMPUTER SCIENCE AND ENGINEERING
CLOUD COMPUTING
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
collaboration
|
|
accessibility
|
|
encryption
|
|
backups
|
Detailed explanation-1: -The best cloud computing security solutions provide data security by design. They have security protocols and policies such as strong access controls and data encryption to prevent unauthorized entities from accessing confidential information.
Detailed explanation-2: -The first step in the defense against identity thieves is using a cloud service that encrypts your files both in the cloud and on your computer. Encryption ensures service providers and their service administrators, as well as third parties, do not have access to your private information.
Detailed explanation-3: -What do cloud services provide to help with privacy and security concerns? service providers use encryption for this reason.
Detailed explanation-4: -Cloud Storage always encrypts your data on the server side, before it is written to disk, at no additional charge. Besides this standard, Google-managed behavior, there are additional ways to encrypt your data when using Cloud Storage.
Detailed explanation-5: -Cloud encryption is the process of encoding and transforming data before transferring it to the cloud. This process converts plaintext data into ciphertext using mathematical algorithms and makes the data unreadable, thus protecting it from unauthorized and potentially malicious users.