Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Match to appropriate response. a. Occurs when the tenant loses physical control

ID: 3880404 • Letter: M

Question

Match to appropriate response.

a. Occurs when the tenant loses physical control or does not manage their own physical servers.

b. When data does not remain in the same system, may be exposed to the public or unauthorized users and which may result in legal concerns.           

c. Cloud provider shall display commitment and provides a service that is reputable, feasible, capable and sustainable. The more the service provider leverages proprietary interfaces the higher the concern of the tenant because of the risk of tenant lock-in.           

d. Is a concern if the data is subject to legal restrictions or regulatory compliance.           

e. When a cloud provider does not expose details of their internal policy or technology implementation, tenants or users must trust the cloud provider’s security claim. Basically, the tenants and customers cannot see how the cloud provider handles security, privacy and reports security incidents.           

f. A computer, network, or paper based activity which results (or may result) in misuse, damage, denial of service, compromise of integrity, or loss of confidentiality of a network, computer, application, or data; and threats, misrepresentations of identity, or harassment of or by individuals using these resources. It is important that the tenants and customers are informed when an incident occurs           

g. Network connectivity and bandwidth is available when required.           

h. When data is mixed with data that belongs to others.           

i. The ability of the cloud provider to continue their operations and services if subjected to a disaster.           

j. A concern when cloud computing brings new classes of risks and vulnerabilities.

1. Network Availability   

2. Cloud Provider Viability   

3. Disaster Recovery and Business Continuity

4. Security Incidents

5. Transparency

6. Loss of Physical Control   

7. Privacy and Data

8. Control over Data

9. New Risks, New Vulnerabilities

10. Legal and Regulatory Compliance

Explanation / Answer

a. Occurs when the tenant loses physical control or does not manage their own physical servers. ===== Loss of Physical Control
b. When data does not remain in the same system, may be exposed to the public or unauthorized users and which may result in legal concerns. ===== Control over Data
c. Cloud provider shall display commitment and provides a service that is reputable, feasible, capable and sustainable. The more the service provider leverages proprietary interfaces the higher the concern of the tenant because of the risk of tenant lock-in. ==== Cloud Provider Viability   
d. Is a concern if the data is subject to legal restrictions or regulatory compliance.=====Privacy and Data   
e. When a cloud provider does not expose details of their internal policy or technology implementation, tenants or users must trust the cloud provider’s security claim. Basically, the tenants and customers cannot see how the cloud provider handles security, privacy and reports security incidents. ===== Legal and Regulatory Compliance   
f. A computer, network, or paper based activity which results (or may result) in misuse, damage, denial of service, compromise of integrity, or loss of confidentiality of a network, computer, application, or data; and threats, misrepresentations of identity, or harassment of or by individuals using these resources. It is important that the tenants and customers are informed when an incident occurs ====== Security Incidents   
g. Network connectivity and bandwidth is available when required. ===== Network Availability
h. When data is mixed with data that belongs to others. ==== Control over Data
i. The ability of the cloud provider to continue their operations and services if subjected to a disaster. ======= Disaster Recovery and Business Continuity   
j. A concern when cloud computing brings new classes of risks and vulnerabilities. ===== New Risks, New Vulnerabilities