Unit 5: Understanding of Cloud Security – Question Bank Why is security a major concern in cloud computing? How do different cloud computing service models vary in terms of built-in security? What is the concept of a security boundary in cloud computing, and how does it separate client and vendor responsibilities? With diagram explain the Security service boundary in cloud computing. Why is storing data in the cloud a particular concern for security? How can proxy and brokerage services help enhance security in cloud storage? What are some of the features that need to be considered for logging, auditing, and regulatory compliance in cloud computing systems? How can identity and related protocols be approached from a security standpoint in the cloud? What are the unique security risks associated with cloud computing, as highlighted by the Gartner Group? How can the risks in a cloud deployment be evaluated and analysed? What is the role of "golden" system image references in ma...