Assignment title: Information


Cloud Computing has become a major component of the IT infrastructure. Cloud Computing is used to store photos, documents as well as run complete IT infrastructures. Cloud Security has been called into question multiple times due to lack of control and lack of information on how cloud systems work. You should investigate the security of cloud systems starting with a generic view across all the sector and then focusing on individual systems such as Amazon Web Services, iCloud or Azure. You should examine exploits that have been made public including investigating the technical details of the attacks. Requirements Your should investigate the following: • Basic principles and theory of cloud security exploits. • The state of cloud security from the past five years. – You should include the current state of cloud security. • Your analysis of the likely future importance and effectiveness of cloud security exploits. Learning Outcomes 1. Analyse potential threats to computer systems and networks and evaluate countermeasures 15. Critically evaluate security policies and techniques 6. Research and report on a security-related topic, using app