Cloud security and interactive methods

Q1. Read Chapter 9, which identified the advantages and disadvantages of using a cloud-based provider. 

Textbook: Cloud Computing by Dr. Kris Jamsa, 2nd ED

Don't use plagiarized sources. Get Your Custom Essay on
Need an answer from similar question? You have just landed to the most confidential, trustful essay writing service to order the paper from.
Just from $11/Page
Order Now

Write a research paper that defends the following statements and provide one real-world example for each statement: 

· A difficult security threat to mitigate is a malicious employee.

· A cloud provider’s data center is still at risk from natural disasters such as floods, fires, and earthquakes.  

The paper should be approximately five pages long, not including the title and reference pages. Please follow APA 7 Guidelines for in-text citations and references. A minimum of two scholarly journal articles (besides textbook) are required.

Q2. Read Chapter 4 in Textbook: Systems Analysis and Design by Kenneth E. Kendall and Julie E Kendall, 10th ED. 

Research a scholarly paper or professional video on “Gathering Requirements” and reflect on the following:

  • “Interactive Methods”: Which of the following is more beneficial: interviewing, questionnaires, sampling, document analysis, observation, or text analytics?

The paper must be between 250-300 words. Provide at least two APA references for your resource and corresponding in-text citations. You must provide the referenced resource URL/DOI in the APA reference.