Security Models and Cloud Operations
- From the first e-Activity, analyze the industry researched for each security model would be most applicable, and explain why you believe that to be the case. Identify the security models from your findings.
- From the second e-Activity, ascertain the primary way in which the organization that you researched was able to leverage a cloud solution while overcoming its security concerns. Discuss whether or not you believe that the security concerns surrounding cloud operations are warranted. Justify your answers with real-world examples from applicable situations, where appropriate.