(1.) Privacy laws attempt to provide protection to an individual from unauthorized disclosure of the individual’s personally identifiable information (PII). Please list and discuss items that are normally considered as a person’s individual identifiers.
(2.) Using virtualized systems introduces many new risks while maintaining many if not most of the risks inherent in using traditional systems. Please identify and discuss some risks to virtualized systems.
(3.) One area that is greatly affected by cloud computing is privacy. It’s important to remember that although the control of cloud computing privacy has many threats and vulnerabilities in common with non-cloud processes and infrastructure, it also has unique security issues. Discuss some of the impacts on an organization of exploits that can result in a privacy loss for the organization.

Sample Solution

This question has been answered.

Get Answer