Jamsa (2013) specifies five advantages cloud-based providers may have with respect to security. Additionally, the author specifies five security disadvantages to hosting applications and their data within the cloud.
Using these 10 advantages and disadvantages as Level 1 headings in a paper, summarize each in your own words. Then, explain how you believe each of the five advantages could actually become risks if IT security personnel do not embrace them.
The following are required: