Securing the Cloud : Cloud Computer Security Techniques and Tactics

By: Winkler, Vic (J.R.)Material type: TextTextSeries: eBooks on DemandPublisher: Saint Louis : Elsevier Science, 2014Description: 1 online resource (315 p.)ISBN: 9781597495936Subject(s): Cloud computing | Cloud computing | Computer networks - Security measures | Computer networks -- Security measures | Computer security | Computer securityGenre/Form: Electronic books.Additional physical formats: Print version:: Securing the Cloud : Cloud Computer Security Techniques and TacticsDDC classification: 005.8 LOC classification: QA76.585 .W56 2011Online resources: Click here to view this ebook.
Contents:
Front Cover; Securing the Cloud: Cloud Computer Security Techniques and Tactics; Copyright; Dedication; Table of Contents; Acknowledgments; About the Author; About the Technical Editor; Introduction; Book Audience; Terminology; Risk, Perception of Risk and Cloud Computing; Cloud Computing as a Tectonic Shift; Structure of the Book; Conclusion; Chapter 1. Introduction to Cloud Computing and Security; Understanding Cloud Computing; The IT Foundation for Cloud; The Bottom Line; An Historical View: Roots of Cloud Computing; A Brief Primer on Security: From 50,000 ft
A Brief Primer on ArchitectureSecurity Architecture: A Brief Discussion; Cloud Is Driving Broad Changes; Summary; Endnotes; Chapter 2. Cloud Computing Architecture; Cloud Reference Architecture; Control over Security in the Cloud Model; Making Sense of Cloud Deployment; Making Sense of Services Models; How Clouds Are Formed and Key Examples; Real-world Cloud Usage Scenarios; Summary; Endnotes; Chapter 3. Security Concerns, Risk Issues, and Legal Aspects; Cloud Computing: Security Concerns; Assessing Your Risk Tolerance in Cloud Computing; Legal and Regulatory Issues; Summary; Endnotes
Chapter 4. Securing the Cloud: ArchitectureSecurity Requirements for the Architecture; Security Patterns and Architectural Elements; Cloud Security Architecture; Planning Key Strategies for Secure Operation; Summary; Endnotes; Chapter 5. Securing the Cloud: Data Security; Overview of Data Security in Cloud Computing; Data Encryption: Applications and Limits; Cloud Data Security: Sensitive Data Categorization; Cloud Data Storage; Cloud Lock-in (the Roach Motel Syndrome); Summary; Endnotes; Chapter 6. Securing the Cloud: Key Strategies and Best Practices
Overall Strategy: Effectively Managing RiskOverview of Security Controls; The Limits of Security Controls; Best Practices; Security Monitoring; Summary; Endnotes; Chapter 7. Security Criteria: Building an Internal Cloud; Private Clouds: Motivation and Overview; Security Criteria for Ensuring a Private Cloud; Summary; Endnotes; Chapter 8. Security Criteria: Selecting an External Cloud Provider; Selecting a CSP: Overview of Assurance; Selecting a CSP: Overview of Risks; Selecting a CSP: Security Criteria; Summary; Endnotes; Chapter 9. Evaluating Cloud Security: An Information Security Framework
Evaluating Cloud SecurityChecklists for Evaluating Cloud Security; Metrics for the Checklists; Summary; Endnotes; Chapter 10. Operating a Cloud; From Architecture to Efficient and Secure Operations; Security Operations Activities; Summary; Endnotes; Index
Summary: As companies turn to burgeoning cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. <i>Securing the Cloud</i> discusses making the move to the cloud while securing your piece of it! The cloud offers flexibility, adaptability, scalability, and in the case of security-resilience. This book details the strengths and weaknesses of securing your company's information with different cloud approaches. Attacks can focus on your infrastructure, communicatio
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Call number URL Status Date due Barcode
Electronic Book UT Tyler Online
Online
QA76.585 .W56 2011 (Browse shelf) http://uttyler.eblib.com/patron/FullRecord.aspx?p=686827 Available EBL686827

Front Cover; Securing the Cloud: Cloud Computer Security Techniques and Tactics; Copyright; Dedication; Table of Contents; Acknowledgments; About the Author; About the Technical Editor; Introduction; Book Audience; Terminology; Risk, Perception of Risk and Cloud Computing; Cloud Computing as a Tectonic Shift; Structure of the Book; Conclusion; Chapter 1. Introduction to Cloud Computing and Security; Understanding Cloud Computing; The IT Foundation for Cloud; The Bottom Line; An Historical View: Roots of Cloud Computing; A Brief Primer on Security: From 50,000 ft

A Brief Primer on ArchitectureSecurity Architecture: A Brief Discussion; Cloud Is Driving Broad Changes; Summary; Endnotes; Chapter 2. Cloud Computing Architecture; Cloud Reference Architecture; Control over Security in the Cloud Model; Making Sense of Cloud Deployment; Making Sense of Services Models; How Clouds Are Formed and Key Examples; Real-world Cloud Usage Scenarios; Summary; Endnotes; Chapter 3. Security Concerns, Risk Issues, and Legal Aspects; Cloud Computing: Security Concerns; Assessing Your Risk Tolerance in Cloud Computing; Legal and Regulatory Issues; Summary; Endnotes

Chapter 4. Securing the Cloud: ArchitectureSecurity Requirements for the Architecture; Security Patterns and Architectural Elements; Cloud Security Architecture; Planning Key Strategies for Secure Operation; Summary; Endnotes; Chapter 5. Securing the Cloud: Data Security; Overview of Data Security in Cloud Computing; Data Encryption: Applications and Limits; Cloud Data Security: Sensitive Data Categorization; Cloud Data Storage; Cloud Lock-in (the Roach Motel Syndrome); Summary; Endnotes; Chapter 6. Securing the Cloud: Key Strategies and Best Practices

Overall Strategy: Effectively Managing RiskOverview of Security Controls; The Limits of Security Controls; Best Practices; Security Monitoring; Summary; Endnotes; Chapter 7. Security Criteria: Building an Internal Cloud; Private Clouds: Motivation and Overview; Security Criteria for Ensuring a Private Cloud; Summary; Endnotes; Chapter 8. Security Criteria: Selecting an External Cloud Provider; Selecting a CSP: Overview of Assurance; Selecting a CSP: Overview of Risks; Selecting a CSP: Security Criteria; Summary; Endnotes; Chapter 9. Evaluating Cloud Security: An Information Security Framework

Evaluating Cloud SecurityChecklists for Evaluating Cloud Security; Metrics for the Checklists; Summary; Endnotes; Chapter 10. Operating a Cloud; From Architecture to Efficient and Secure Operations; Security Operations Activities; Summary; Endnotes; Index

As companies turn to burgeoning cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. <i>Securing the Cloud</i> discusses making the move to the cloud while securing your piece of it! The cloud offers flexibility, adaptability, scalability, and in the case of security-resilience. This book details the strengths and weaknesses of securing your company's information with different cloud approaches. Attacks can focus on your infrastructure, communicatio

Description based upon print version of record.

There are no comments on this title.

to post a comment.