Discuss the below:
Create a Microsoft® PowerPoint® presentation containing eight slides, including Introduction, Conclusion, and Reference slides.
Scenario: You are preparing for a new company-wide project to provide each employee with a personal cloud storage account. The VP of Information Technology has asked you to research solutions for the organization and make sure the CSaaS provider encrypts data in transit and at rest. The U.S.-based company has 100,000 staff members and offices in 100 countries. You will be preparing a presentation of products to present to the company's Information Technology Committee so they can understand the technology, security features, and associated cyber risk. Your task is to:
Research Cloud Storage-as-a-Service (CSaaS) providers
Briefly define the technology involved to implement a cloud-based technology such as CSaaS
Briefly describe the registration and authentication process for one of the providers
Correctly identify the encryption technology used both in transit and in storage for one provider
Correctly identify the ethics and privacy policies of one CSaaS provider
|
US
|
RUSSIA
|
CHINA
|
Strategical
|
Abuse Act and Computer Fraud prohibits computer's unauthorized access their interference, and data obtaining
|
Organisations or Individuals should be responsible for their network usage should not set up communication groups or websites due to fraudulent purposes and illegal activities.
|
All government levels shall organize, carry out security of network and publically regularly.
|
Tactical
|
Electronic Communications Privacy Act governs data interception, access to data
|
Any person who violates Article 27 is engaging in activities that endanger cyber security and may be imprisoned for between 5 to 15 days be detained for 5 to 15. This depends on the severity of the case.
|
Network providers shall provide and maintain their products and services for time limits agreed upon between them and clients.
|
Operational
|
The Paperwork Reduction Act 1995
This law gave Management office and Budget the mandate and responsibility to develop cyber policies.
|
People have a right to have the errors in their personal information corrected by their network operators.
|
Operators of Network shall cooperate with network departments on lawful supervision and implementation tasks.
|
Attachment:- Information Security.rar