Yulina Park

Publication Date

Spring 2016

Faculty Supervisor

Jason Hood


Cloud computing is a has become a popular resources for businesses because of its many advantages, including increased productivity and cost efficiency, but it has also become a huge target for cyberattacks. While there are laws and punishments to deter cybercrimes but they are not always effective, and attacked businesses are frequently found liable themselves. Therefore, the first line of defense is to take extra security steps which can greatly reduce the risks of becoming a victim to cloud hacking.


Business 204


Copyright is owned by the creator of this work

Included in

Business Commons



To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.