Security Models and Cloud Operations

From the first e-Activity, analyze the industry researched for each security model would be most applicable, and explain why you believe that to be the case. Identify the security models from your findings. From the second e-Activity, ascertain the primary way in which the organization that you researched was able to leverage a cloud solution while overcoming its security concerns. Discuss whether or not you believe that the security concerns surrounding cloud operations are warranted. Justify your answers with real-world examples from applicable situations, where appropriate.

Field of study: 
No answers yet