when a cloud customer uploads personally identifiable information (pii) to a cloud provider, who is ultimately responsible for the security of that pii?

Answers

Answer 1
Answer:

When a cloud customer uploads personally identifiable information (PII) to a cloud provider, both the customer and the cloud provider share responsibility for the security of that PII.

The specific division of responsibilities will depend on the terms of the service level agreement (SLA) between the customer and the cloud provider. In general, the cloud provider is responsible for securing the infrastructure and services that are used to store and process the PII. This includes ensuring that appropriate security controls are in place, such as access controls, encryption, and monitoring. The cloud provider may also be responsible for notifying the customer in the event of a security breach or incident.

However, the cloud customer also has a responsibility to ensure that the PII they upload to the cloud is secure. This includes properly securing their own systems and networks that are used to upload and access the PII, as well as properly configuring any security controls provided by the cloud provider.

Ultimately, the responsibility for the security of PII in the cloud is shared between the customer and the cloud provider, and both parties must take appropriate measures to ensure the security of the data.

To know more about personally identifiable information (PII), visit:

brainly.com/question/30023988

#SPJ11

Answer 2
Answer:

When a cloud customer uploads personally identifiable information (PII) to a cloud provider, both the customer and the cloud provider share responsibility for the security of that PII.

The specific division of responsibilities will depend on the terms of the service level agreement (SLA) between the customer and the cloud provider. In general, the cloud provider is responsible for securing the infrastructure and services that are used to store and process the PII. This includes ensuring that appropriate security controls are in place, such as access controls, encryption, and monitoring. The cloud provider may also be responsible for notifying the customer in the event of a security breach or incident.

However, the cloud customer also has a responsibility to ensure that the PII they upload to the cloud is secure. This includes properly securing their own systems and networks that are used to upload and access the PII, as well as properly configuring any security controls provided by the cloud provider.

Ultimately, the responsibility for the security of PII in the cloud is shared between the customer and the cloud provider, and both parties must take appropriate measures to ensure the security of the data.

To know more about personally identifiable information (PII), visit:

brainly.com/question/30023988

#SPJ11


Related Questions

What is a task? a piece of hardware physically or wirelessly connected to a computer, such as a hard drive or keyboard a partition on a hard drive; another way to reference a drive letter such asc. an event or action that causes the task to start an action performed by the system software, usually as a result of a trigger
1.Can ICTs be innovatively used in the absence of minimum literacy levels among the poor?
True or false? Main Content (MC) may include links on the page.
This is a broad category of applications and technologies for gathering, storing, analyzing, and providing access to data to help enterprise users make better business decisions.a. best practiceb. data martc. business information warehoused. business intelligencee. business warehouse
_______ software makes it possible to run multiple operating systems and multiple applications on the same server at the same time.

Which from the following list are an example of productivity software? a. microsoft office
b. google docs
c. iwork
d. all of the above?

Answers

Answer: a,b and c

Explanation:

In order for your laptop to make a wireless connection, it must first find an available __________ to connect to.a. SSID
b. VPN
c. RSAT
d. WEP

Answers

Answer:

The correct answer to the following question will be Option A (SSID).

Explanation:

SSID is a general or a technical term for either the title of a network channel. When you're setting up a virtual wireless network, you make something up to differentiate from many other community connections.

  • Even before you associate your machine to your wireless connection you can see that title or name of the device.
  • To enable a cellular connection to your computer device or network, you must, therefore, consider an SSID appropriate to attach to that as well.

So, SSID is the right answer.

a. SSID to connect to it

What are the six external parts of a computer?

Answers

External computer parts are those that connect to the case, often to provide ways to input or output data. Most computers use a keyboard and mouse as external input devices and a monitor as an output device. Speakers, printers, modems, network routers and external storage devices are other external devices.

Given a scanner reference variable named input that has been associated with an input source consisting of a sequence of strings and two int variables, count and longest, write the code necessary to examine all the strings in the input source and determine how long the longest string (or strings are). that value should be assigned to longest; the number of strings that are of that length should be assigned to count.

Answers

Answer:

int count = 0;  //int variables

int longest =0;  // int variables

Scanner input = new Scanner(System.in); // given input is reference variable

String str= new String();  // creating object of sting class

while (input.hasNext()) // taking the input by using scanner reference

{

str= input.next();  // taking input in string

if (str.length() == longest) // checking condition

++count;  // increment the count

else

if (Str.length() > longest) // if string is greater then longest

{

longest = str.length(); // calculating length

count = 1;  // assign count to 1

}

}

Explanation:

Following are the description of the code :

  • Declared a two variable count and longest of  int type.
  • Create a object of String class i.e 'str".
  • Taking input in the string by using scanner reference i.e "input".
  • Finally checking the condition of if and else block and calculating the length of string and assign into longest variable.

The code that examines all the strings in the input source and determines how long the longest string (or strings are) is the following:

total = 0;% initial value is zero, in every while loop it will be incremented

while(input.hasNextInt()){

total += input.nextInt( );

}

Which of the following is involved in ordering an outline? arranging grouping merging organizing

Answers

Answer:

the answer is not groping its merging

Explanation:

my homework sed it was wrong

and i dont want you to be to

Grouping

grouping

grouping

If Word finds a potential error in a document, a red, green, or blue wavy underline flags the problem. True
False

Answers

This is true but each color means a different type of error. Red is spelling, and blue is grammar and green is sentence structure errors. 


true, yes, there will be some sort of flag to let you know, probably a red one.