Securing Cloud Computing Models
Contributed by Torrell Griffin
The purpose of this report, in essence, is to define cloud technology as well as describe some of the pros and cons of utilizing a number of different cloud services. Cloud technology offers a number of different methods as far as implementation goes, and along with each option, comes a new set of pros and cons. One method or option may be secure than the other, while the next method may offer more flexibility and control to the user. Security has definitely continued to become more and more important over time.
This document is in PDF format. To view it click here.