This is a discussion question. No APA format needed but references are required.
Network Systems Design
What are some of the security risks with outsourcing cloud computing services to a third party organization and what are the methods to help counteract these risks?
What problems arise when organizations use a reactive method of intrusion detection and what are some requirements that can be added to a security policy to alleviate these problems?