Jamsa (2013) listed10 cloud-based security issues developers must consider when designing for security.
List seven along with their pros and cons and their importance to security in the cloud. All seven should be used as headers in your paper. Submission will be checked for plagiarism via SafeAssign. Only one submission is allowed.
Required:
- 600 – 750 words
- APA 7 format