Propose and defend a topic for your final project. Write 500 words or more explaining why this topic is important for your peers to understand. Be focused and specific. Look into the general topic provided in the list in this folder to find something new and interesting to write about. You should do a deep dive into a topic. Do not do a survey. Use the
Research Databases available from the Danforth Library
not Google.
You MUST make a statement saying exactly what your topic is.
Use at least five sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources.
Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0.
Write in essay format not in bulleted, numbered or other list format.
1.
With different types of cloud service delivery, what are the different licensing requirements that an owner must be aware of when moving to the cloud.
2. Discuss Shared technology vulnerabilities in the cloud,
3. How does a customer know what software versions cloud providers are using? Without that knowledge how can they do a proper risk assessment?
4. What policies should be in place for users to help reduce cloud based threats.
5. How can a consumer evaluate the physical security of their cloud provider? What standards should apply. What external and internal barriers should be in place? What access controls? What sort of surveillance should be provided, power redundancy, and fire suppression? Is a service contract sufficient? Should physical inspection be available? What about physical location? Are their volcanoes, tornadoes, earthquakes or other natural disasters common? Is the site near political unrest? Access to water? Outside temperature? Is there a physical buffer? Should the walls be made of ballistic material to withstand explosions? Staffing
6. Discuss the four tiers of Uptime Institutes functional recommendations for physical security for data centers.
7. What is a hypervisor? Differentiate between type I and type II. What are the security vulnerabilities of each?
8. Which is better for security server virtualization or application isolation? Why?
9. What are desktop virtualization, storage virtualization, memory virtualization, network virtualization? What are the security issues and benefits for each
10. Global boundaries and the cloud – separating politics from security
11. The relationship of net neutrality and cloud security
12. Ensuring Proper Access Control in the Cloud?
13. Cloud security risks from misconfiguration
14. Cloud service interruptions from DDOS
15. Preventive controls for Internal (non-routable) security threats
16. Detective Controls for routable and non-routable addresses
17. How security zones, groups or domains have replaced traditional zones and tiers
18. On being a cloud broker -tasks and challenges
19. Trust boundaries and division of responsibilities
20. Elasticity effect on threat surface
21. How to insure that your cloud provider has appropriate detective and preventive controls in place
22. How to secure virtualization layer
23. Threats to the hypervisor
24. What hardening means
25. Top ten recommendations for securing virtual servers
26. Vulnerabilities resulting from web programming frameworks
27. Preventing attacks on web applications
28. The relationship between DOS attacks and your cloud invoice
29. Good browser hygiene and cloud security
30. Compartmentalization and isolation in virtual multi-tenant environments
31. Security standards in PaaS API design
32. FIPS
33. Data Protection techniques under the The Data Accountability and Trust Act
34. Comparing block symmetric algorthms with streaming symmetric algorthms
35. Message authentication codes and hash functions.
36. Externalizing authentication: Trust Boundaries and IAM
37. Sustaining IAM with rapid turnover and job changes
38. IAM Compliance Management
39. Identity Federation Management
40. OAUTH
41. ITIL
42. ISO 27001/27002
43. Vulnerability and Risk assessment
44. Incident response
45. What can we learn from CCID (Cloud Computing Incidents Database
46. Cloud Health monitoring (internal and 3rd party)
47. Reading a Cloud Security Provider agreement
48. Discussing the data life cycle in the context of cloud computing
49. Facebook’s new privacy initiative
50. Cloud Security and the Federal Rules of Civil Procedure
We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.
Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.
Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.
Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.
Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.
Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.
We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.
Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.
You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.
Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.
Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.
You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.
You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.
Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.
We create perfect papers according to the guidelines.
We seamlessly edit out errors from your papers.
We thoroughly read your final draft to identify errors.
Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!
Dedication. Quality. Commitment. Punctuality
Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.
We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.
We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.
We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.
We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.