Computer Science Homework Help

Implementation of Network Security On-Perm and Cloud Environments Discussion

 

I don’t understand this Computer Science question and need help to study.

 

How is the implementation of network security similar and different between on-perm and cloud environments? Give some examples.