I am impressed with how you introduce your discussion. As you have explained, cloud work out is the remittance of computing services, including networking, databases, server software, and storage (Murray & Zysman, 2015). Hybrid cloud, public cloud, and private cloud are the three types of cloud. There are four categories of cloud computing; software as a service (SaaS), platform as a service (PaaS), infrastructure as a service (IaaS), and serverless. As you have stated, some of the cloud benefits include; eliminate the capital cost of purchasing software and hardware, the ability to scale elastically, security, reliability, and productivity. I love your clean, concise writing concerning the advantage of safe practices in every organization. Every organization needs to train employees on safe practices. As you have clearly explained, monitoring and administrating the cloud improves the security of an organization.
References
Kushida, K. E., Murray, J., & Zysman, J. (2015). Cloud computing: From scarcity to abundance. Journal of Industry, Competition and Trade, 15(1), 5-19.
Response Two
Excellent job; your introduction and explanation are impressive and they create a clear picture of your discussion. I can get a clear picture of how your work is flowing. The top cybersecurity attack businesses face includes; phishing attacks, malware attacks, ransomware, insider threats, and weak password (Chapman, 2021). As you have explained, ransomware threatens private information or data unless the ransom is paid. I love explaining how to avoid ransomware by maintaining the proper updates for software, firmware, applications, and utilities. Giving a modern touch to it and establishing a current problem thrown around in today’s society might be a beneficial way of getting the organization to care about the topic and take it seriously. As you have explained, phishing is a fraudulent act of sending emails to induce someone to reveal private information such as a password. I love your clean, concise writing about the risks facing modern organizations and how to mitigate the risks.
References
Chapman, P. (2021). Defending against insider threats with network security’s eighth layer. Computer Fraud & Security, 2021(3), 8-13.