Cover image for Securing the Cloud : Cloud Computer Security Techniques and Tactics.
Securing the Cloud : Cloud Computer Security Techniques and Tactics.
Title:
Securing the Cloud : Cloud Computer Security Techniques and Tactics.
Author:
Winkler, Vic (J.R.).
ISBN:
9781597495936
Personal Author:
Physical Description:
1 online resource (315 pages)
Contents:
Front Cover -- Securing the Cloud: Cloud Computer Security Techniques and Tactics -- Copyright -- Dedication -- Table of Contents -- Acknowledgments -- About the Author -- About the Technical Editor -- Introduction -- Book Audience -- Terminology -- Risk, Perception of Risk and Cloud Computing -- Cloud Computing as a Tectonic Shift -- Structure of the Book -- Conclusion -- Chapter 1. Introduction to Cloud Computing and Security -- Understanding Cloud Computing -- The IT Foundation for Cloud -- The Bottom Line -- An Historical View: Roots of Cloud Computing -- A Brief Primer on Security: From 50,000 ft -- A Brief Primer on Architecture -- Security Architecture: A Brief Discussion -- Cloud Is Driving Broad Changes -- Summary -- Endnotes -- Chapter 2. Cloud Computing Architecture -- Cloud Reference Architecture -- Control over Security in the Cloud Model -- Making Sense of Cloud Deployment -- Making Sense of Services Models -- How Clouds Are Formed and Key Examples -- Real-world Cloud Usage Scenarios -- Summary -- Endnotes -- Chapter 3. Security Concerns, Risk Issues, and Legal Aspects -- Cloud Computing: Security Concerns -- Assessing Your Risk Tolerance in Cloud Computing -- Legal and Regulatory Issues -- Summary -- Endnotes -- Chapter 4. Securing the Cloud: Architecture -- Security Requirements for the Architecture -- Security Patterns and Architectural Elements -- Cloud Security Architecture -- Planning Key Strategies for Secure Operation -- Summary -- Endnotes -- Chapter 5. Securing the Cloud: Data Security -- Overview of Data Security in Cloud Computing -- Data Encryption: Applications and Limits -- Cloud Data Security: Sensitive Data Categorization -- Cloud Data Storage -- Cloud Lock-in (the Roach Motel Syndrome) -- Summary -- Endnotes -- Chapter 6. Securing the Cloud: Key Strategies and Best Practices.

Overall Strategy: Effectively Managing Risk -- Overview of Security Controls -- The Limits of Security Controls -- Best Practices -- Security Monitoring -- Summary -- Endnotes -- Chapter 7. Security Criteria: Building an Internal Cloud -- Private Clouds: Motivation and Overview -- Security Criteria for Ensuring a Private Cloud -- Summary -- Endnotes -- Chapter 8. Security Criteria: Selecting an External Cloud Provider -- Selecting a CSP: Overview of Assurance -- Selecting a CSP: Overview of Risks -- Selecting a CSP: Security Criteria -- Summary -- Endnotes -- Chapter 9. Evaluating Cloud Security: An Information Security Framework -- Evaluating Cloud Security -- Checklists for Evaluating Cloud Security -- Metrics for the Checklists -- Summary -- Endnotes -- Chapter 10. Operating a Cloud -- From Architecture to Efficient and Secure Operations -- Security Operations Activities -- Summary -- Endnotes -- Index.
Abstract:
As companies turn to burgeoning cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. Securing the Cloud discusses making the move to the cloud while securing your piece of it! The cloud offers flexibility, adaptability, scalability, and in the case of security-resilience. This book details the strengths and weaknesses of securing your company's information with different cloud approaches. Attacks can focus on your infrastructure, communications network, data, or services. The author offers a clear and concise framework to secure your business' assets while making the most of this new technology. Named The 2011 Best Identity Management Book by InfoSec Reviews Provides a sturdy and stable framework to secure your piece of the cloud, considering alternate approaches such as private vs. public clouds, SaaS vs. IaaS, and loss of control and lack of trust Discusses the cloud's impact on security roles, highlighting security as a service, data backup, and disaster recovery Details the benefits of moving to the cloud-solving for limited availability of space, power, and storage.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Added Author:
Electronic Access:
Click to View
Holds: Copies: