From your research, what are the risks associated with an employee using a service such as Dropbox to maintain and share company files? How should the risks be approached?

In this lab, you explored risks, threats, and vulnerabilities inherent in cloud computing, social
networking, and mobile computing. You read the National Institute of Standards and
Technology’s (NIST) Definition of Cloud Computing and reviewed the best practices put forth
by the Cloud Security Alliance (CSA) and European Network and Information Security Agency
(ENISA). You also used your research to identify the top three security risks and recommended
mitigations for each.
Lab Assessment Questions & Answers
1. What are the four security checklist recommendations from the ENISA guide that
customers who want to obtain cloud services should use?
2. Name five cloud security domains according to the CSA guide. How many are there in
3. According to the NIST publication, what three cloud service models are primarily
available for customers today?