Expert answer:Lab Assignment: Recognizing Risks and Threats Asso

  

Solved by verified expert:In this lab, you will explore risks, threats, and vulnerabilities inherent with cloud computing, social networking, and mobile computing. You will read the National Institute of Standards and Technology’s (NIST) Definition of Cloud Computing and review the best practices put forth by the Cloud Security Alliance (CSA) and European Network and Information Security Agency (ENISA). You also will use your research to identify the top three security risks and recommend mitigations for each.Follow the steps below to complete this assignment:Carefully read through the Student Lab Guide linked below. It provides detailed instructions for accessing and completing the labs in this course.Open the Lab 9 Assessment Worksheet attached below.* Save a copy of the worksheet to your computer; this will allow you to fill it out electronically and save your answers. You will complete this worksheet and submit it to your instructor after you have completed the hands-on portion of the lab. However, it is strongly recommended that you read through the worksheet before you begin.Click the Lab Link in the module folder to enter the virtual lab environment.Read through all the material under the Intro and Steps tabs before you start working.Follow the step-by-step instructions under the Steps tab to perform the lab. Note: You will not be completing a lab report, so you can disregard instructions to make screen captures.After completing the hands-on lab, complete and submit the Lab 9 Assessment Worksheet. Use the worksheet that you saved to your computer. Be sure to save it again before submitting it.
assessment_worksheet_lab_09.pdf

Unformatted Attachment Preview

Don't use plagiarized sources. Get Your Custom Essay on
Expert answer:Lab Assignment: Recognizing Risks and Threats Asso
Just from $10/Page
Order Essay

Assessment Worksheet
Recognizing Risks and Threats Associated with Emerging
Technologies
Course Name and Number: _____________________________________________________
Student Name: ________________________________________________________________
Instructor Name: ______________________________________________________________
Lab Due Date: ________________________________________________________________
Overview
In this lab, you explored risks, threats, and vulnerabilities inherent in cloud computing, social
networking, and mobile computing. You read the National Institute of Standards and
Technology’s (NIST) Definition of Cloud Computing and reviewed the best practices put forth
by the Cloud Security Alliance (CSA) and European Network and Information Security Agency
(ENISA). You also used your research to identify the top three security risks and recommended
mitigations for each.
Lab Assessment Questions & Answers
1. What are the four security checklist recommendations from the ENISA guide that
customers who want to obtain cloud services should use?
2. Name five cloud security domains according to the CSA guide. How many are there in
total?
3. According to the NIST publication, what three cloud service models are primarily
available for customers today?
Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.
www.jblearning.com
Student Lab Manual
Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.
www.jblearning.com
Student Lab Manual
4. According to the NIST publication, what four deployment models are there for cloud
services regardless of the deliverable service models?
5. Name four security risks in using cloud computing as per the ENISA guide.
6. According to the ENISA guide, what are four legal issues that are common across all
cloud-computing scenarios?
7. From your research, what are three recommendations for cloud application security in the
future?
8. What are the two broad categories that the CSA guidance uses to classify the cloud
domains?
9. From your research, what are some ways to help protect the device’s physical security
when traveling with a corporate mobile device?
10. What are the most popular cloud-computing deployment models?
Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.
www.jblearning.com
Student Lab Manual
11. From your research, what are some unique risks that flash drives or portable hard drives
present to organizations? How can the risks be mitigated?
12. From your research, what are the risks associated with an employee using a service such
as Dropbox to maintain and share company files? How should the risks be approached?
13. According to the Cloud Security Alliance guide, what are some security best practices an
organization should have in place with the cloud provider before implementing a
solution?
Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.
www.jblearning.com
Student Lab Manual

Purchase answer to see full
attachment

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Order your essay today and save 30% with the discount code ESSAYSHELP