Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống
1
/ 336 trang
THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng
Số trang
336
Dung lượng
5,44 MB
Nội dung
[...]... availability Chapter 5, Identity and Access Management Explains the identity and access management (IAM) practice and support capabilities for authentication, authorization, and auditing of users who access cloud services Chapter 6, Security Management in the Cloud Depicts security management frameworks and the standards that are relevant for the cloud Chapter 7, Privacy Introduces privacy aspects to consider... facet of cloud computing Some of these groups are established (e.g., the National Institute of Standards and Technology efforts to promote standardization in cloud computing), and some of them are brand new, having emerged only with the appearance of this new computing model (e.g., the Cloud Security Alliance’s promotion of security in cloud computing, or the Open Cloud Manifesto’s promotion of cloud. .. consider within the context of cloud computing, and analyzes the similarities and differences with traditional computing models Additionally, in this chapter we highlight legal and regulatory implications related to privacy in the cloud Chapter 8, Audit and Compliance Reveals the importance of audit and compliance functions within the cloud, and the various standards and frameworks to consider * Vaquero,... Security- As-a- [Cloud] Service Looks at a different facet of cloud computing security: security delivered as a service unto itself through the cloud This security- as-a- [cloud] service (SaaS) is also an emerging space, and in this chapter we look at what some of those cloudsecurity services are Chapter 11, The Impact of Cloud Computing on the Role of Corporate IT Looks at the impact of cloud computing... Infrastructure Security Describes the IT infrastructure security capabilities that cloud services generally offer IT infrastructure security refers to the established security capabilities at the network, host, and application levels Chapter 4, Data Securityand Storage Examines the current state of data securityand the storage of data in the cloud, including aspects of confidentiality, integrity, and availability... auditing, and compliance for both the 1 Download at WoWeBook.Com cloud service provider (CSP) and the customer Is security in cloud computing a bad thing? The answer depends on what you use cloud computing for, and your expectations If you are a large organization with significant resources to devote to a sophisticated information security program, you need to overcome a number of security, privacy, and. .. chant cloud computing good” while at the same time saying cloud security bad.” But what does that really mean? Exactly what is wrong with security in cloud computing? The purpose of this book is to answer those questions through a systematic investigation of what constitutes cloud computing and what security it offers As such, this book also explores the implications of cloud computing security on privacy, ... elasticity Cloud computing has generated significant interest in the marketplace and is forecasted for high growth, as illustrated in Figure 2-2, which highlights the recent notable cloud launches and the current and projected revenues for cloud- based services WHAT IS CLOUD COMPUTING? Download at WoWeBook.Com 9 FIGURE 2-2 Recent notable cloud launches (top) and spending on cloud- based services (bottom) Cloud. .. enterprise and the cloud Data centers and server farms Cloud- based services require large computing capacity and are hosted in data centers and server farms These distributed data centers and server farms span multiple locations and can be linked via internetworks providing distributed computing and service delivery capabilities A number of examples today illustrate the flexibility and scalability of cloud. .. potential of cloud computing and mask the complexity involved in extending existing IT management processes and practices to cloud services APIs offered by IaaS cloud service providers (CSPs) such as Amazon EC2, Sun Cloud, and GoGrid allow users to create and manage cloud resources, including compute, storage, and networking components In this case, use of the API is via HTTP The GET, POST, PUT, and DELETE . risks yet to be discovered and managed. Cloud Security and Privacy is a book for everyone who is interested in under- standing the risks and rewards of cloud computing and for those who seek to. PM Download at WoWeBook.Com Cloud Security and Privacy Download at WoWeBook.Com Download at WoWeBook.Com Cloud Security and Privacy Tim Mather, Subra Kumaraswamy, and Shahed Latif Beijing • Cambridge • Farnham • Köln • Sebastopol • Taipei • Tokyo Download. access cloud services. Chapter 6, Security Management in the Cloud Depicts security management frameworks and the standards that are relevant for the cloud. Chapter 7, Privacy Introduces privacy