Cloud computing is the new ‘in’ term for external hosting. After reviewing the a
ID: 3695109 • Letter: C
Question
Cloud computing is the new ‘in’ term for external hosting. After reviewing the articles on cloud computing and the number of lost mobile devices that contain sensitive data, what might be the network impact of placing large amounts of enterprise data outside the firewalls? You, as the network engineer are responsible for network traffic into and out of your organization, With so much more information being sent externally for processing, how will you protect your organization from inappropriate access? This discussion board helps provide answers.
Explanation / Answer
To protect your organization from inappropriate access when data is moving on network we can use
Encryption – Encryption can be challenging to implement internally due to key management and maintenance, performance issues, and access controls. Extending internal encryption platforms and capabilities into the cloud can seem daunting at best.
There are different types of enceyptions:
1. Volume-based encryption
2. Application-specific encryption
3. File encryption
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.