Assignment:
Describe one of the security threats that might be encountered when using cloud-based resources and then compare and contrast the effectiveness of different ways of mitigating this threat. Have you heard of any threats similar to this really happening? If so, provide that example and include a URL so your peers can read the story and discuss the details.
Your answer must be typed, double-spaced, Times New Roman font (size 12), one-inch margins on all sides, APA format and also include references.