

Tim Mather is an experienced security professional who is currently pursing a graduate degree in information assurance full-time.
Meer over de auteursCloud Security and Privacy
An Enterpise Perspective on Risks and Compliance
Samenvatting
With 'Cloud Security and Privacy', you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications secure. Ideal for IT staffers, information security and privacy practitioners, business managers, service providers, and investors alike, this book offers you sound advice from three well-known authorities in the tech security world. You'll learn detailed information on cloud computing security that-until now-has been sorely lacking.
- Review the current state of data security and storage in the cloud
- Learn about identity and access management (IAM) practice for cloud services
- Discover which security management frameworks and standards are relevant
- Understand how privacy in the cloud compares with traditional computing models
- Learn about standards and frameworks for audit and compliance within the cloud
- Examine security delivered as a service-a different facet of cloud security
Specificaties
Over Subra Kumaraswamy
Over Shahed Latif
Inhoudsopgave
1. Introduction
-“Mind the Gap”
-The Evolution of Cloud Computing
-Summary
2. What Is Cloud Computing?
-Cloud Computing Defined
-The SPI Framework for Cloud Computing
-The Traditional Software Model
-The Cloud Services Delivery Model
-Cloud Deployment Models
-Key Drivers to Adopting the Cloud
-The Impact of Cloud Computing on Users
-Governance in the Cloud
-Barriers to Cloud Computing Adoption in the Enterprise
-Summary
3. Infrastructure Security
-Infrastructure Security: The Network Level
-Infrastructure Security: The Host Level
-Infrastructure Security: The Application Level
-Summary
4. Data Security and Storage
-Aspects of Data Security
-Data Security Mitigation
-Provider Data and Its Security
-Summary
5. Identity and Access Management
-Trust Boundaries and IAM
-Why IAM?
-IAM Challenges
-IAM Definitions
-IAM Architecture and Practice
-Getting Ready for the Cloud
-Relevant IAM Standards and Protocols for Cloud Services
-IAM Practices in the Cloud
-Cloud Authorization Management
-Cloud Service Provider IAM Practice
-Guidance
-Summary
6. Security Management in the Cloud
-Security Management Standards
-Security Management in the Cloud
-Availability Management
-SaaS Availability Management
-PaaS Availability Management
-IaaS Availability Management
-Access Control
-Security Vulnerability, Patch, and Configuration Management
-Summary
7. Privacy
-What Is Privacy?
-What Is the Data Life Cycle?
-What Are the Key Privacy Concerns in the Cloud?
-Who Is Responsible for Protecting Privacy?
-Changes to Privacy Risk Management and Compliance in Relation to Cloud Computing
-Legal and Regulatory Implications
-U.S. Laws and Regulations
-International Laws and Regulations
-Summary
8. Audit and Compliance
-Internal Policy Compliance
-Governance, Risk, and Compliance (GRC)
-Illustrative Control Objectives for Cloud Computing
-Incremental CSP-Specific Control Objectives
-Additional Key Management Control Objectives
-Control Considerations for CSP Users
-Regulatory/External Compliance
-Other Requirements
-Cloud Security Alliance
-Auditing the Cloud for Compliance
-Summary
9. Examples of Cloud Service Providers
-Amazon Web Services (IaaS)
-Google (SaaS, PaaS)
-Microsoft Azure Services Platform (PaaS)
-Proofpoint (SaaS, IaaS)
-RightScale (IaaS)
-Salesforce.com (SaaS, PaaS)
-Sun Open Cloud Platform
-Workday (SaaS)
-Summary
10. Security-As-a-[Cloud] Service
-Origins
-Today's Offerings
-Summary
11. The Impact of Cloud Computing on the Role of Corporate IT
-Why Cloud Computing Will Be Popular with Business Units
-Potential Threats of Using CSPs
-A Case Study Illustrating Potential Changes in the IT Profession Caused by Cloud Computing
=Governance Factors to Consider When Using Cloud Computing
=Summary
12. Conclusion, and the Future of the Cloud
-Analyst Predictions
-Survey Says?
-Security in Cloud Computing
-Program Guidance for CSP Customers
-The Future of Security in Cloud Computing
-Summary
A: SAS 70 Report content example
B: Systrust Report contents example
C: Open Security Architecture for Cloud computing
Glossary
Index
Anderen die dit boek kochten, kochten ook
Net verschenen
Rubrieken
- aanbestedingsrecht
- aansprakelijkheids- en verzekeringsrecht
- accountancy
- algemeen juridisch
- arbeidsrecht
- bank- en effectenrecht
- bestuursrecht
- bouwrecht
- burgerlijk recht en procesrecht
- europees-internationaal recht
- fiscaal recht
- gezondheidsrecht
- insolventierecht
- intellectuele eigendom en ict-recht
- management
- mens en maatschappij
- milieu- en omgevingsrecht
- notarieel recht
- ondernemingsrecht
- pensioenrecht
- personen- en familierecht
- sociale zekerheidsrecht
- staatsrecht
- strafrecht en criminologie
- vastgoed- en huurrecht
- vreemdelingenrecht