Record:   Prev Next
Author Winkler, Vic (J. R. )
Title Securing the Cloud : Cloud Computer Security Techniques and Tactics
Imprint Saint Louis : Elsevier Science & Technology Books, 2011
book jacket
Descript 1 online resource (315 pages)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Note Front Cover -- Securing the Cloud: Cloud Computer Security Techniques and Tactics -- Copyright -- Dedication -- Table of Contents -- Acknowledgments -- About the Author -- About the Technical Editor -- Introduction -- Book Audience -- Terminology -- Risk, Perception of Risk and Cloud Computing -- Cloud Computing as a Tectonic Shift -- Structure of the Book -- Conclusion -- Chapter 1. Introduction to Cloud Computing and Security -- Understanding Cloud Computing -- The IT Foundation for Cloud -- The Bottom Line -- An Historical View: Roots of Cloud Computing -- A Brief Primer on Security: From 50,000 ft -- A Brief Primer on Architecture -- Security Architecture: A Brief Discussion -- Cloud Is Driving Broad Changes -- Summary -- Endnotes -- Chapter 2. Cloud Computing Architecture -- Cloud Reference Architecture -- Control over Security in the Cloud Model -- Making Sense of Cloud Deployment -- Making Sense of Services Models -- How Clouds Are Formed and Key Examples -- Real-world Cloud Usage Scenarios -- Summary -- Endnotes -- Chapter 3. Security Concerns, Risk Issues, and Legal Aspects -- Cloud Computing: Security Concerns -- Assessing Your Risk Tolerance in Cloud Computing -- Legal and Regulatory Issues -- Summary -- Endnotes -- Chapter 4. Securing the Cloud: Architecture -- Security Requirements for the Architecture -- Security Patterns and Architectural Elements -- Cloud Security Architecture -- Planning Key Strategies for Secure Operation -- Summary -- Endnotes -- Chapter 5. Securing the Cloud: Data Security -- Overview of Data Security in Cloud Computing -- Data Encryption: Applications and Limits -- Cloud Data Security: Sensitive Data Categorization -- Cloud Data Storage -- Cloud Lock-in (the Roach Motel Syndrome) -- Summary -- Endnotes -- Chapter 6. Securing the Cloud: Key Strategies and Best Practices
Overall Strategy: Effectively Managing Risk -- Overview of Security Controls -- The Limits of Security Controls -- Best Practices -- Security Monitoring -- Summary -- Endnotes -- Chapter 7. Security Criteria: Building an Internal Cloud -- Private Clouds: Motivation and Overview -- Security Criteria for Ensuring a Private Cloud -- Summary -- Endnotes -- Chapter 8. Security Criteria: Selecting an External Cloud Provider -- Selecting a CSP: Overview of Assurance -- Selecting a CSP: Overview of Risks -- Selecting a CSP: Security Criteria -- Summary -- Endnotes -- Chapter 9. Evaluating Cloud Security: An Information Security Framework -- Evaluating Cloud Security -- Checklists for Evaluating Cloud Security -- Metrics for the Checklists -- Summary -- Endnotes -- Chapter 10. Operating a Cloud -- From Architecture to Efficient and Secure Operations -- Security Operations Activities -- Summary -- Endnotes -- Index
As companies turn to burgeoning cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. Securing the Cloud discusses making the move to the cloud while securing your piece of it! The cloud offers flexibility, adaptability, scalability, and in the case of security-resilience. This book details the strengths and weaknesses of securing your company's information with different cloud approaches. Attacks can focus on your infrastructure, communications network, data, or services. The author offers a clear and concise framework to secure your business' assets while making the most of this new technology. Named The 2011 Best Identity Management Book by InfoSec Reviews Provides a sturdy and stable framework to secure your piece of the cloud, considering alternate approaches such as private vs. public clouds, SaaS vs. IaaS, and loss of control and lack of trust Discusses the cloud's impact on security roles, highlighting security as a service, data backup, and disaster recovery Details the benefits of moving to the cloud-solving for limited availability of space, power, and storage
Description based on publisher supplied metadata and other sources
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2020. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries
Link Print version: Winkler, Vic (J. R. ) Securing the Cloud : Cloud Computer Security Techniques and Tactics Saint Louis : Elsevier Science & Technology Books,c2011 9781597495929
Subject Cloud computing.;Computer security.;Computer networks -- Security measures
Electronic books
Alt Author Speake, Graham
Foxhoven, Patrick
Record:   Prev Next