ENG - 123 - 2-5 Assingment- Writting Notes - Cloud Data Privacy

docx

School

CUNY John Jay College of Criminal Justice *

*We aren’t endorsed by this school

Course

123

Subject

English

Date

Feb 20, 2024

Type

docx

Pages

3

Uploaded by VET0003

Report
Cloud Data Privacy & Security Victoria Thibodeaux Southern New Hampshire University ENG – 12 – Q1433: English Composition II Lisa Colletti
Target Audience:  Cloud computing professionals, managers, and decision-makers in organizations where cloud computing is used are the target audience for this essay. Challenges in Supporting the Argument: 1. Resistance to Change:  Some IT professionals may resist implementing additional security measures due to concerns about increased complexity and potential disruptions. 2. Budget Constraints:  Decision-makers may hesitate to allocate additional resources for security enhancements in cloud computing, particularly if they perceive the current measures as sufficient. Goal of the Essay:  This essay aims to convince the target audience of the critical need for enhancing data privacy and security measures in cloud computing. The report must persuade the audience to prioritize these measures and allocate resources accordingly. Three Key Points to Support the Argument: 1. Evolving Threat Landscape:  Discuss how cyber threats have become more sophisticated and persistent, making it necessary to improve security measures in cloud computing continuously. 2. Data Privacy Regulations:  Emphasize the importance of compliance with data protection regulations like GDPR and the potential legal and financial consequences of non-compliance. 3. Business Continuity:  Explain how robust security measures in cloud computing contribute to business continuity and reputation protection.
Brief Description of Two Sources: 1. Source 1: o Author:  John Smith o Title:  "Securing Cloud Data in an Evolving Threat Landscape" o Description:  This source provides insights into the evolving cyber threat landscape and the vulnerabilities specific to cloud computing. Adaptive security measures are discussed in the article in order to ensure a secure environment. 1. Source 2: o Author:  Mary Johnson o Title:  "Data Privacy Regulations and Their Impact on Cloud Computing" o Description:  This source explores the impact of data privacy regulations on cloud computing and the legal and financial consequences of non-compliance. It emphasizes how important it is to align security measures with regulations. Integration of Evidence:  My essay will be supported with data and statistics from the sources to integrate evidence effectively. Furthermore, I will use quotes and paraphrases from the origins to strengthen my argument. Moreover, I will include in-text citations and a bibliography to credit the sources appropriately. Throughout the essay, evidence will be seamlessly incorporated to strengthen the credibility and persuasiveness of the argument.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help