Question: What are the current security vulnerabilities in cloud computing architecture?
Outcome: To identify the current vulnerabilities and security loophole in cloud computing.
Question: What are the security techniques utilized to prevent breaches and unauthorized access into the cloud network?
Outcome: To identify the current cloud security methods implemented and assess its effectiveness.
Question: what security aspect of cloud computing needs improvement?
Outcome: To determine areas of improvement in cloud computing security.
Question: what are the benefits and potential pitfalls for companies to move all their services and systems into the cloud?
Outcome: To identify the pros and cons of cloud hosted service