- Words: 1595
- Length: 5 Pages
- Topic: Business - Management
- Paper #: 15509569
There is a difference in the approach to this challenge considering the two platforms, and the fact that they may be based on different configurations. Therefore, it is essential that proper techniques are instituted counter this.
Evidently, insider threats are a menace in the cloud computing environment, just as is the case in a normal organizational set up. Most of the threats posed by such individuals are detrimental to the