Securing the Cloud : Cloud Computer Security Techniques and TacticsMaterial type: TextSeries: eBooks on DemandPublisher: Saint Louis : Elsevier Science, 2014Description: 1 online resource (315 p.)ISBN: 9781597495936Subject(s): Cloud computing | Cloud computing | Computer networks - Security measures | Computer networks -- Security measures | Computer security | Computer securityGenre/Form: Electronic books.Additional physical formats: Print version:: Securing the Cloud : Cloud Computer Security Techniques and TacticsDDC classification: 005.8 LOC classification: QA76.585 .W56 2011Online resources: Click here to view this ebook.
|Item type||Current location||Call number||URL||Status||Date due||Barcode|
|Electronic Book||UT Tyler Online Online||QA76.585 .W56 2011 (Browse shelf)||http://uttyler.eblib.com/patron/FullRecord.aspx?p=686827||Available||EBL686827|
Front Cover; Securing the Cloud: Cloud Computer Security Techniques and Tactics; Copyright; Dedication; Table of Contents; Acknowledgments; About the Author; About the Technical Editor; Introduction; Book Audience; Terminology; Risk, Perception of Risk and Cloud Computing; Cloud Computing as a Tectonic Shift; Structure of the Book; Conclusion; Chapter 1. Introduction to Cloud Computing and Security; Understanding Cloud Computing; The IT Foundation for Cloud; The Bottom Line; An Historical View: Roots of Cloud Computing; A Brief Primer on Security: From 50,000 ft
A Brief Primer on ArchitectureSecurity Architecture: A Brief Discussion; Cloud Is Driving Broad Changes; Summary; Endnotes; Chapter 2. Cloud Computing Architecture; Cloud Reference Architecture; Control over Security in the Cloud Model; Making Sense of Cloud Deployment; Making Sense of Services Models; How Clouds Are Formed and Key Examples; Real-world Cloud Usage Scenarios; Summary; Endnotes; Chapter 3. Security Concerns, Risk Issues, and Legal Aspects; Cloud Computing: Security Concerns; Assessing Your Risk Tolerance in Cloud Computing; Legal and Regulatory Issues; Summary; Endnotes
Chapter 4. Securing the Cloud: ArchitectureSecurity Requirements for the Architecture; Security Patterns and Architectural Elements; Cloud Security Architecture; Planning Key Strategies for Secure Operation; Summary; Endnotes; Chapter 5. Securing the Cloud: Data Security; Overview of Data Security in Cloud Computing; Data Encryption: Applications and Limits; Cloud Data Security: Sensitive Data Categorization; Cloud Data Storage; Cloud Lock-in (the Roach Motel Syndrome); Summary; Endnotes; Chapter 6. Securing the Cloud: Key Strategies and Best Practices
Overall Strategy: Effectively Managing RiskOverview of Security Controls; The Limits of Security Controls; Best Practices; Security Monitoring; Summary; Endnotes; Chapter 7. Security Criteria: Building an Internal Cloud; Private Clouds: Motivation and Overview; Security Criteria for Ensuring a Private Cloud; Summary; Endnotes; Chapter 8. Security Criteria: Selecting an External Cloud Provider; Selecting a CSP: Overview of Assurance; Selecting a CSP: Overview of Risks; Selecting a CSP: Security Criteria; Summary; Endnotes; Chapter 9. Evaluating Cloud Security: An Information Security Framework
Evaluating Cloud SecurityChecklists for Evaluating Cloud Security; Metrics for the Checklists; Summary; Endnotes; Chapter 10. Operating a Cloud; From Architecture to Efficient and Secure Operations; Security Operations Activities; Summary; Endnotes; Index
As companies turn to burgeoning cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. <i>Securing the Cloud</i> discusses making the move to the cloud while securing your piece of it! The cloud offers flexibility, adaptability, scalability, and in the case of security-resilience. This book details the strengths and weaknesses of securing your company's information with different cloud approaches. Attacks can focus on your infrastructure, communicatio
Description based upon print version of record.