Authors

Yulina Park

Publication Date

Spring 2016

Faculty Supervisor

Jason Hood

Description

Cloud computing is a has become a popular resources for businesses because of its many advantages, including increased productivity and cost efficiency, but it has also become a huge target for cyberattacks. While there are laws and punishments to deter cybercrimes but they are not always effective, and attacked businesses are frequently found liable themselves. Therefore, the first line of defense is to take extra security steps which can greatly reduce the risks of becoming a victim to cloud hacking.

Course

Business 204

Rights

Copyright is owned by the creator of this work

Included in

Business Commons

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.