See the attached file and message me for more information or instruction.

Need 150-word limit response for both below discussion post1 and post2

Please make sure quality work and No Plagiarism.

Follow APA guidelines.

Post1:

In my opinion, I feel it is better to encrypt your data before you place it in the cloud instead of encrypting the data after it is in the cloud. Encrypting data before sending it to the cloud provides better security, but it can potentially disable some features offered by the cloud service provider. (Merry, 2016). Encrypting the data prior to uploading it to the cloud ensures that the data is protect if the cloud service provider is breached. The attacker can obtain the stolen data but will not be able to decrypt and read it because the customer has possession of the encryption keys. This an example of security through network segmentation, as the data and the encryption keys are not stored in the same physical location. Encrypting data prior to transmitting it in the cloud enforces access control. Cloud service providers are unable to access the data without the encryption key, so it forces them to contact the customer for all access requests to customer data.

Encrypting data after it reaches the cloud leaves the data vulnerable to attack while the data is in transit because the data is sent in plaintext. In addition, encrypting the data after it is placed in the cloud shifts key management and encryption responsibility to the cloud service provider. This is unadvisable from an organizational standpoint because the organization has no control over the encryption keys and is unable to view access control requests. For example, if the cloud service provider has the encryption keys, they can access the data at will without the organization knowing about it. Allowing the cloud service provider to encrypt the data requires a high level of trust between the customer and the cloud service provider. The benefit of having the cloud service provider encrypt the data after it is stored in the cloud is that it allows the cloud service provider to perform services such as data analytics, context-indexing, and self-service access requests. Organizations may choose the approach of having the cloud service provider perform encryption while the data rests in the cloud for convenience. This approach allows users and applications to access data without the need to supply the decryption key for every data access request.

References

Merry, A. (2016, April 1). Why you should own the key when encrypting data in the cloud. Network World. https://www.networkworld.com/article/3050749/why-you-should-own-the-key-when-encrypting-data-in-the-cloud.html

Post2:

A number of technologies have lately acquired prominence, including machine learning, AI, deep learning, and cloud computing. As cloud storage grows in popularity as a means for many businesses to store their data, worries about the safety of that data have also increased in importance. To protect sensitive information, more and more establishments, including corporations and universities, are turning to cloud-based services.

A common definition of data encryption is, the process by which information is converted from a form that may be read or processed into a form that can only be read or processed once it has been decrypted (Qureshi et al., 2022). The short answer is yes, data encryption is required before being uploaded to the cloud. It is important to encrypt data before putting it on the cloud. Cloud-based data storage solutions, in particular, have always presented a significant security risk, as was previously mentioned.

For reasons of both privacy and security, it is essential that data be encrypted before being uploaded to cloud storage. Routinely encrypting sensitive information is essential for several reasons, including security, peace of mind, and the ability to aid businesses and other private entities in meeting the requirements of data protection certifications and legislation. In addition to preventing the accidental disclosure of sensitive and vital data, encryption before uploading to the cloud also protects data from sophisticated malware attacks that could leave the data unusable or useless in the event of an attack. It is recommended that you use encryption services for all of your data.

When moving data from one storage medium to another, keep in mind that it is more vulnerable to security risks (Qureshi et al., 2022). However, data encryption keeps sensitive information safe when in transit between devices or while being transferred to a remote server or the cloud. To ensure that only authorized parties have access to data that has been encrypted using industry standards, only those individuals with the necessary keys will be able to decrypt the information. Protecting private information and sensitive data during transmission between servers and client applications is among the many uses for data encryption.

References

Qureshi, M. B., Qureshi, M. S., Tahir, S., Anwar, A., Hussain, S., Uddin, M., & Chen, C. L. (2022). Encryption Techniques for Smart Systems Data Security Offloaded to the Cloud. Symmetry, 14(4), 695.

Order your essay today and save 20% with the discount code ESSAYHELP