Cloud Storage

Assignment #3No directly quoted material may be used in this project paper.Resources should be summarized or paraphrased with appropriate in-text and Resource page1. Explain what Cloud storage is, how it works, and what challenges and remedies are presented when attempting to acquire data from the Cloud.2.  If you had to explain to someone how and why they should protect their data on their computer, what would you present (remember to think about some key steps from intrusion, issues such as ransomware, how incidents occur, etc.)3. Explain at least three ways, in detail, that a digital forensic practitioner can display their ethical practices and understanding of ethics in the profession.Format RequirementsPaper must be double spaced, 11 or 12 pt font and 1” margins all around.All APA 7th edition format requirements must be followed (cover page, in text citations, reference page). Refer to APA/UMGC – learningresources found in the content page of this course.You must have resources to support your thoughts/opinions/information.  These must be cited both in text as well as at the end of the document. Your paper should not contain direct quotes, sourced material must be paraphrased.Due DateApr 27, 2021 11:59 PMHide RubricsRubric Name: 321 Assignment #3 RubricThis table lists criteria and criteria group names in the first column. The first row lists level names and includes scores if the rubric uses a numeric scoring method. You can give feedback on each criterion by tabbing to the add feedback buttons in the table.Criteria   Exceeds ExpectationsMeets ExpectationsApproaching ExpectationsBelow ExpectationsCriterion ScoreContent20 pointsStudent explained clearly and in detail what Cloud storage is, how it works, and what challenges and remedies are presented when attempting to acquire data from the Cloud. Student displayed exemplary critical thinking as evidenced by their response to this question and usage of resources to substantiate their responseStudent thoroughly and clearly presented the key considerations to be taken into consideration for someone to protect their data on their computer and why they should take steps to do so. Student’s discussion addressed each key element (i.e., intrusion, issues such as ransomware, how incidents occur, etc.) in a clear manner and used resources to substantiate their response.Student clearly, and in detail, explained at least three ways that a digital forensic practitioner can display their ethical practices and understanding of ethics in the profession. Student displayed exemplary critical thinking in this discussion and substantiated their response with more than 2 resources.Points Available: 18-2017.9 pointsStudent explained what Cloud storage is, how it works, and what challenges and remedies are presented when attempting to acquire data from the Cloud. Student displayed solid/good critical thinking as evidenced by their response to this question and usage of resources to substantiate their response.Student presented the key considerations to be taken into consideration for someone to protect their data on their computer and why they should take steps to do so. Student’s discussion addressed each key element (i.e., intrusion, issues such as ransomware, how incidents occur, etc.) in a clear manner and used resources to substantiate their response.Student explained at least three ways that a digital forensic practitioner can display their ethical practices and understanding of ethics in the profession. Student displayed solid/good critical thinking in this discussion and substantiated their response with  2 resources.Points Available: 16-17.915.9 pointsStudent explained what Cloud storage is, how it works, and what challenges and remedies are presented when attempting to acquire data from the Cloud in a limited/incomplete/incorrect manner. Student displayed limited or no critical thinking as evidenced by their response to this question and lack of usage of resources to substantiate their response.Student presented the key considerations to be taken into consideration for someone to protect their data on their computer and why they should take steps to do so in a limited/incomplete/incorrect manner.  Student’s discussion did not address each key element (i.e., intrusion, issues such as ransomware, how incidents occur, etc.) in a clear manner and/or response was limited/incomplete/incorrect. Student used 1 or less resources to substantiate their response.Student explained less than three ways that a digital forensic practitioner can display their ethical practices and understanding of ethics in the profession. Student displayed limited to no critical thinking in this discussion and substantiated their response with  1 or less resources. 

[shortposting]

Looking for a Similar Assignment? Let us take care of your classwork while you enjoy your free time! All papers are written from scratch and are 100% Original. Try us today! Use Code FREE20