Question 1
Write a 4 page plagiarism free word doc which explains the below details
1)How could the data in cloud computing architecture be disrupted, and in what ways the flow could be attacked and various ways hackers do to disrupt the data in the cloud
2)Support the above explanation with a threat based on stride model
Use diagrams whenever necessary
Conclusion
References
Question 2
Using the Google scholar website, locate a peer reviewed article about privacy. Write a critical evaluation of the article; make sure to include three to five key points that you thought were important. All of the key points should be written in your own words, and the article must be properly cited using APA-style. Your work should include at least two references.
Use the below attached template
Minimum 600 words
Question 3
This week we learned how the web can be used as a database. We also learned how web applications can integrate with databases.
Summarize an application that your organization uses that is not currently on the web. What would be the advantages and disadvantages of accessing this application from the web? What steps can you take to determine whether the application could be available on the Internet?
Also, discuss the security implications that would need to be reviewed and what type of database design would be needed to support it.
Refer to the Discussion Rubric for directions on completing these discussions.