Discuss the following topics and provide substantive comments to at least two other posts. Select from the following list four (4) topics and discuss. Use only 70-words max per topic to discuss and present your answer. The discussion questions this week are from Chapter 9 (Jamsa, 2013).
- List the security advantages of cloud-based solutions.
- List the security disadvantages of cloud-based solutions.
- Define and discuss the data wiping process.
- Discuss how a cloud-based solution provider may reduce the risk of a DDoS attack.
- Define and discuss hyperjacking attacks.
- Define and discuss guest-hopping attacks.