Describe and discuss the scope of a cloud computing audit for your business. Use at least three sources.

Describe and discuss the scope of a cloud computing audit for your business. Use at least three sources.

Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.

2) In yopur own words, compare DNS failover and cloud failover. Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased.

3) Discuss why Security as a Service is a good investment.Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.

4) Propose and defend a topic for your final project. Write a paper explaining why this topic is important for your peers to understand. Be focused and specific. You should do a deep dive into a topic. Do not do a survey. Use at least five sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources.

“Project Topic : Good browser hygiene and cloud security”

5) Define several forms of metadata that can be useful to an investigation. How are valuable to an investigator?