Write two paragraphs (for each answer) Precede each answer with the question and its corresponding number.
1. In a DoD cloud application, the Mission Owner inherits compliance from the CSP’s Cloud Service Offering (CSO) for the security controls (or portions thereof) that the CSP meets and maintains. Figure A-1 depicts, in general terms, the varying degrees of compliance shared by the Mission Owner and the CSP as a function of the type of service offerings. Please discuss why the proportions are different for each type of service offering.
2. Using wireless communication in industrial control systems poses possible risks and vulnerabilities. According to NIST SP 800-82, what are some of the guidelines that have to be observed in ICS wireless applications?
1- APA 7th style
2-Pages numbers no coloring.
3- Free Plagiarism
5- Correct Crammer.
6- Clear and full answer as a master’s degree Student.
7- The Expert should have a good background in Cyber Security.
Please see the including (Reference materials)