Any topic (writer’s choice)

Any topic (writer’s choice)

linked item M2A1 Case Analysis: Cloud Computing Security Issues
Case analysis assigned during the course will involve a unique scenario related to cloud or mobile computing involving a set of questions related to the material being

covered in a given module. You will utilize the textbook, course materials, independent research, and detailed instructions provided in each module to respond to the

questions. There will be one case analysis due in Modules 2, 3, 5, and 7.

In this activity, you will write an analysis of cloud computing security issues and steps that can be taken to mitigate the issues you have identified. You should

clearly state any assumptions and provide citations that reference the course reading materials and other outside references from reputable sources.

Read the assigned readings for this module. Select at least two other external resources. Using them as foundations for this activity, write an analysis. Include

responses to the following:
Identify and describe three security issues related to cloud computing.
Recommend countermeasures to mitigate or prevent these issues from becoming a security risk.
Write the analysis in a Word document. Follow the APA style for writing, editing, and citations. Submit the document to the assignment dropbox.

In this activity, submit an abstract of your paper on developing a security policy for the use of cloud computing and mobile devices. The abstract should describe the

paper’s scope, topics, and sub-topics. Review the required content for the final project paper, and also the format, before you begin work on the abstract.

READ ALSO :   Communicating Ideas (Mechanics)

Required content for the Final Research Project report

• Description of the business environment of your choice.
• Compliance or other regulatory requirements under which this business operates.
• Description of the specific cloud service model used or implemented in the organization and the respective security policies.
• Description of the specific mobile devices adopted or used in the organization and the respective security policies.
• Gap analysis comparing current use of cloud computing and mobile devices and future state.
• Mandatory: A risk control matrix for both cloud computing and mobile devices
• Mandatory: A formal policy for securing cloud computing and mobile device management for your organization
Required format

• Title: The title is a concise statement of the subject of the paper.

• Abstract: The abstract is an “executive overview” of your paper. It should be a 50- to 100-word summary that would be appropriate to give your manager so that he/she

would know the essence of your project without reading the paper in its entirety.

• Table of Contents: In this section, list each section of your paper with the page number. The list should include:
o Tables and figures, if you included more than two
o Appendices, if included
o Bibliography or reference section listing sources used and including links to online content
• Introduction: In this section, state the purpose of the paper in succinct, declarative sentences. Convince your reader that the research project will have practical

value and meaning for the reader and that the study will be based upon the concepts studied in the course.

READ ALSO :   Winning a Grant Proposal

• Background and Significance: This section provides background information and justification for recommended policies for utilizing cloud computing and mobile devices

in your organization.
o Explain the applicable concepts from the course and apply them to your identified business environment. Include a gap analysis of where the organization is now in

terms of security of cloud computing and the use of mobile devices. Describe the current need for, and use of, these technologies and their benefits, risks, and

required controls.
• Discussion, Implications, and Recommendations: In this section, you should provide a thorough discussion of benefits and risks of cloud computing and mobile

technology and present a cloud computing security policy and a mobile device security policy. Your plan should include a detailed presentation of risks and controls.

• References: You cannot use only your textbooks as your primary source of information. You must draw on other sources such as websites, professional associations, and

industry standards.
o Be sure that you support the information presented with appropriate references. It is important that all references and quotes are cited correctly. All sources,

including websites, must be referenced in the bibliography or references list. You must follow an accepted authority for style and form (e.g., APA style).
• Format: Keep in mind that all accepted rules of English composition apply. Papers must be word-processed, double spaced, and have standard margins (1 inch on each

side).

• Length: The length of the paper, excluding cover page and references, is a minimum of 15 pages.

PLACE THIS ORDER OR A SIMILAR ORDER WITH US TODAY AND GET AN AMAZING DISCOUNT 🙂