ENG - 123 - 2-5 Assingment- Writting Notes - Cloud Data Privacy
docx
keyboard_arrow_up
School
CUNY John Jay College of Criminal Justice *
*We aren’t endorsed by this school
Course
123
Subject
English
Date
Feb 20, 2024
Type
docx
Pages
3
Uploaded by VET0003
Cloud Data Privacy & Security
Victoria Thibodeaux
Southern New Hampshire University
ENG – 12 – Q1433: English Composition II
Lisa Colletti
Target Audience:
Cloud computing professionals, managers, and decision-makers in organizations where cloud computing is used are the target audience for this essay.
Challenges in Supporting the Argument:
1.
Resistance to Change:
Some IT professionals may resist implementing additional security measures due to concerns about increased complexity and potential disruptions.
2.
Budget Constraints:
Decision-makers may hesitate to allocate additional resources for security enhancements in cloud computing, particularly if they perceive the current measures as sufficient.
Goal of the Essay:
This essay aims to convince the target audience of the critical need for enhancing data privacy and security measures in cloud computing. The report must persuade the audience to prioritize these measures and allocate resources accordingly.
Three Key Points to Support the Argument:
1.
Evolving Threat Landscape:
Discuss how cyber threats have become more sophisticated and persistent, making it necessary to improve security measures in cloud computing continuously.
2.
Data Privacy Regulations:
Emphasize the importance of compliance with data protection regulations like GDPR and the potential legal and financial consequences of non-compliance.
3.
Business Continuity:
Explain how robust security measures in cloud computing contribute to business continuity and reputation protection.
Brief Description of Two Sources:
1.
Source 1:
o
Author:
John Smith
o
Title:
"Securing Cloud Data in an Evolving Threat Landscape"
o
Description:
This source provides insights into the evolving cyber threat landscape and the vulnerabilities specific to cloud computing. Adaptive security measures are discussed in the article in order to ensure a secure environment.
1.
Source 2:
o
Author:
Mary Johnson
o
Title:
"Data Privacy Regulations and Their Impact on Cloud Computing"
o
Description:
This source explores the impact of data privacy regulations on cloud
computing and the legal and financial consequences of non-compliance. It emphasizes how important it is to align security measures with regulations.
Integration of Evidence:
My essay will be supported with data and statistics from the sources to
integrate evidence effectively. Furthermore, I will use quotes and paraphrases from the origins to
strengthen my argument. Moreover, I will include in-text citations and a bibliography to credit the sources appropriately. Throughout the essay, evidence will be seamlessly incorporated to strengthen the credibility and persuasiveness of the argument.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help