During Units 6 through 10, we continued our investigation of tools and techniques used in the detection and mitigation of malware in modern, cloud-based data storage and applications environments. In this regard, we had the opportunity to employ a malware detection and modification tool called TripWire in a lab environment, investigate a primary standard for secure data engineering as represented in the IEEE 1149.1 (JTAG) standard, and study the evolving threats of malware to data security in the open environment of the cloud and examine what might be done to combat these threats.
For this assignment, you will write a research paper, the body of which will be at least 10 pages in length and compliant with Help write my thesis – APA sixth edition formatting, addressing the following questions:
You are a data security consultant to a federal agency. You are asked to present a synopsis of three major threats to the cloud-based data structure which was developed in the assignment for Unit 6. In this paper:

Include and justify two major steps the agency can take, one internal to the design of the data structure and one external, referring to limitations on methods used to access specific instances of data that go beyond traditional access controls (access rights, passwords, and so forth).

Published by
Write
View all posts