Essay Writer » Essay Blog » Computer Science Essays Help » Using virtualization to protect subscriber data

Using virtualization to protect subscriber data

Task 1

Discussion

“Using virtualization to protect subscriber data”

In your initial discussion post, recommend two options or approaches that cloud service providers can implement to protect subscriber data. Keep in mind, there is a balance to be struck between relying on trusted processes and security policies, and achieving operational agility –especially when subscriber data is at stake. You are to post directly to the thread. Any discussion posted in an attachment will be disregarded.

Your initial post is due by 11:59 PM Wednesday 11/20/19 and be a minimum of 800 words.

Respond substantively to at least two other students’ posts. In your response posts, please compare the option(s) that your peers have suggested for protecting cloud subscriber data to your own recommendations. Describe the differences or similarities between each other’s suggestions. What is the best practice between your recommendation(s) and that of your classmates?

Your responses are due by 11:59 PM Sunday 11/24/19 and be a minimum of 350 words each. Discussions threads will close on Sunday, 11:59 pm Eastern Time (EST)in the week they are assigned.

*please remember to include at least three credible scholarly references with your initial post and two credible scholarly references with your response posts!

Note : Your Answer must be 800 words and three References

Response 1: 350 words and References

Response 2: 350 words and References

Response 1: 350 words and References

 

Task 2

Assignment

Topic:

Micro-segmentation and Zero Trust Security

Overview: Briefly describe the physical segmentation and microsegentation networking environments. Describe the difference between these two networking approaches.

Explain the concept of Zero Trust Security. How is this model different from conventional security models? How does this model support ubiquitous security in a cloud environment?

Explain how microsegmentation topology provides the foundation for implementing the Zero Trust model. Why do modern organizations need to consider implementing a Zero Trust security approach?

Please ensure you refer to the rubric for details on the requirements for this assignment!

Note : Your Answer must be 1000 words and three References.

Guidelines for Submission: Using APA 6th edition style standards, submit a Word document that is 3-4 pages in length (excluding title page, references, and appendices) and include at least three credible scholarly references to support your findings. The UC Library is a good place to find these sources. Be sure to cite and reference your work using the APA guides and essay template that are located in the course room.

 

Last Updated on November 18, 2019

Don`t copy text!
Scroll to Top