Data security in cloud computing. Volume ii /
This book covers not only information protection in cloud computing security and risk management, but also the plan, management, and in-depth implementation details needed to migrate existing applications to the cloud. Readers will have a greater comprehension of cloud engineering and the actions re...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
New York, New York :
Momentum Press,
2019.
|
Edición: | First edition. |
Colección: | Computer engineering foundations currents and trajectories collection
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Chapter 7. Secure cloud architecture. 7.1. Governance and comprehensive risk analysis
- Chapter 8. Risk and trust assessment
- Chapter 9. Managing risk in the cloud
- 10.1. Improvements ; 10.2. Multilevel authentication ; 10.3. Encryption ; 10.4. Password administration ; 10.5. Distributed servers
- Chapter 11. Cloud security risk management. 11.1. Risk in the cloud ; 11.2. Indirect measurements and metrics ; 11.3. Definitions of risk ; 11.4. Risk and cloud. 11.4.1. Security risks not particular to cloud computing ; 11.4.2. Cloud-specific hazards ; 11.4.3. Safety SLA for cloud services
- Chapter 12. Infrastructure-as-a-service (IAAS). 12.1. Considerations ; 12.2. Network ; 12.3. Security implications ; 12.4. Storage ; 12.5. Databases ; 12.6. Control
- Chapter 13. Cryptographic key management for data protection. 13.1. Key management system design dhoices ; 13.2. Cloud key management challenges ; 13.3. Cloud key management strategies ; 13.3.1. Establish trust in crypto module ; 13.3.2. Use key splitting techniques
- Chapter 14. Managing legal compliance risk and personal data protection. 14.1. Digital agenda for Europe ; 14.2. Addressing legal compliance ; 14.2.1. Precontractual phase ; 14.2.2. Step 1: Precontractual phase ; 14.2.3. Risks and opportunities for your cloud service client ; 14.2.4. Outsourcing cloud services ; 14.2.5. Step 2: Major issues in entering a cloud service contract ; 14.2.6. Jurisdiction and applicable law ; 14.2.7. Privacy roles ; 14.2.8. Amendments to the contract ; 14.2.9. Data location and transfers of data ; 14.2.10. Processing of personal data by subcontractors ; 14.2.11. Data subjects' rights (intervenability) ; 14.2.12. Step 3: Exiting a cloud service contract: major issues ; 14.2.13. Lock-in and interoperability ; 14.2.14. Service-level agreements ; 14.2.15. Termination of the contract
- Chapter 15. Future directions in cloud computing security. 15.1. Categories.