securing the cloud cloud computer security techniques and tactics

315 360 0
securing the cloud cloud computer security techniques and tactics

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

[...]... considerations for security when adopting the cloud model Chapter 6: Securing the Cloud: Key Strategies and Best Practices Chapter 6 Securing the Cloud: Key Strategies and Best Practices” presents an overall cloud security strategy for effectively managing risk Also covered is a treatment of cloud security controls and a discussion of the limits of security controls in cloud computing The chapter also... and Legal Aspects Chapter 3 Security Concerns, Risk Issues, and Legal Aspects” takes a closer look at the security concerns and issues with clouds along with surveying the legal and regulatory considerations of different types of clouds Chapter 4: Securing the Cloud: Architecture Chapter 4 Securing the Cloud: Architecture” identifies a number of security requirements for cloud computing Proceeding... we refer to these as the SPI xxi xxii Introduction service model Developing guidelines entails a review and understanding of security principles, security risks, and security architecture What we aim to do is to describe the security issues associated with cloud computing and how to apply security to cloud computing We recognize that security requirements and solutions will vary greatly, and thus our... both cloud providers and cloud consumers From how we build IT systems and how we use them to how we organize and structure IT resources, cloud is refactoring the IT landscape Instead of uncrating computers and racking them in your server closet, the cloud allows for virtually downloading hardware and associated infrastructure By abstracting IT infrastructure and services to be relatively transparent, the. .. efficiently by a smaller staff per service increment then if you take the same computers and disperse them to many server rooms And there lies a further advantage for security Resource Elasticity Consumers of cloud resources can flex their use of computer resources (cycles, storage, bandwidth, and memory) as needed 7 8 CHAPTER 1 Introduction to Cloud Computing and Security • • Doing so with traditional approaches... common nature of these processes, the stand-alone era and even more so the PC launched the software industry As the software industry grew and alternative software packages arose, the cost of computing began to decrease The software industry has on the one hand brought powerful automation to anyone who could afford a computer, and on the other hand, we produced more and more software that was developed... for cloud security, discusses the major security considerations for building or selecting a cloud provider, and concludes with an examination of what it means to securely operate a cloud Chapter 1: Introduction to Cloud Computing and Security Chapter 1 “Introduction to Cloud Computing and Security presents an overview to cloud computing along with its IT foundations, the historical underpinnings, and. .. cabled and look the same Massive scale, a disciplined appearance, and repeated patterns are three qualities of successful cloud implementations These qualities are obviously not unique to the cloud, but they do contribute to the advantages of the cloud model And it isn’t simply the scale or the disciplined uniformity of a cloud infrastructure build: By developing appropriate repeated patterns and implementing... the NIST Cloud Computing Model, and identifies the essential characteristics of clouds Also covered is the SPI cloud service model (SaaS, PaaS, and IaaS) along with the four cloud delivery models (public, private, hybrid, and community) The chapter also covers the relative degree of security control a tenant or consumer has with the different models Chapter 3: Security Concerns, Risk Issues, and Legal... for cloud security and a discussion of security monitoring for cloud computing Chapter 7: Security Criteria: Building an Internal Cloud Chapter 7 Security Criteria: Building an Internal Cloud discusses the various motivations for embarking on a private cloud strategy along with an overview of what adopting a private cloud strategy entails in terms of benefits to both the enterprise and to security The . y0 w0 h1" alt="" Securing the Cloud Cloud Computer Security Techniques and Tactics This page intentionally left blank Securing the Cloud Cloud Computer Security Techniques and Tactics Vic (J.R.). Securing the Cloud: Architecture 89 Security Requirement s for the Architecture. 91 Physical Security 91 Cloud Security Standards and Policies . . . . . . . . . . . . . . . . . . . 93 Cloud Security. mindful of their own safety and the safety of others, including parties for whom they have a professional responsibility. To the fullest extent of the law, neither the Publisher nor the authors,

Ngày đăng: 31/05/2014, 01:54

Từ khóa liên quan

Mục lục

  • Front Cover

  • Securing the Cloud: Cloud Computer Security Techniques and Tactics

  • Copyright

  • Dedication

  • Table of Contents

  • Acknowledgments

  • About the Author

  • About the Technical Editor

  • Introduction

    • Book Audience

    • Terminology

    • Risk, Perception of Risk and Cloud Computing

    • Cloud Computing as a Tectonic Shift

    • Structure of the Book

    • Conclusion

    • Chapter 1. Introduction to Cloud Computing and Security

      • Understanding Cloud Computing

      • The IT Foundation for Cloud

      • The Bottom Line

      • An Historical View: Roots of Cloud Computing

      • A Brief Primer on Security: From 50,000 ft

      • A Brief Primer on Architecture

Tài liệu cùng người dùng

Tài liệu liên quan