Cargando…

Data security in cloud computing. Volume ii /

This book covers not only information protection in cloud computing security and risk management, but also the plan, management, and in-depth implementation details needed to migrate existing applications to the cloud. Readers will have a greater comprehension of cloud engineering and the actions re...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: D'Agostino, Giulio (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York, New York : Momentum Press, 2019.
Edición:First edition.
Colección:Computer engineering foundations currents and trajectories collection
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Chapter 7. Secure cloud architecture. 7.1. Governance and comprehensive risk analysis
  • Chapter 8. Risk and trust assessment
  • Chapter 9. Managing risk in the cloud
  • 10.1. Improvements ; 10.2. Multilevel authentication ; 10.3. Encryption ; 10.4. Password administration ; 10.5. Distributed servers
  • Chapter 11. Cloud security risk management. 11.1. Risk in the cloud ; 11.2. Indirect measurements and metrics ; 11.3. Definitions of risk ; 11.4. Risk and cloud. 11.4.1. Security risks not particular to cloud computing ; 11.4.2. Cloud-specific hazards ; 11.4.3. Safety SLA for cloud services
  • Chapter 12. Infrastructure-as-a-service (IAAS). 12.1. Considerations ; 12.2. Network ; 12.3. Security implications ; 12.4. Storage ; 12.5. Databases ; 12.6. Control
  • Chapter 13. Cryptographic key management for data protection. 13.1. Key management system design dhoices ; 13.2. Cloud key management challenges ; 13.3. Cloud key management strategies ; 13.3.1. Establish trust in crypto module ; 13.3.2. Use key splitting techniques
  • Chapter 14. Managing legal compliance risk and personal data protection. 14.1. Digital agenda for Europe ; 14.2. Addressing legal compliance ; 14.2.1. Precontractual phase ; 14.2.2. Step 1: Precontractual phase ; 14.2.3. Risks and opportunities for your cloud service client ; 14.2.4. Outsourcing cloud services ; 14.2.5. Step 2: Major issues in entering a cloud service contract ; 14.2.6. Jurisdiction and applicable law ; 14.2.7. Privacy roles ; 14.2.8. Amendments to the contract ; 14.2.9. Data location and transfers of data ; 14.2.10. Processing of personal data by subcontractors ; 14.2.11. Data subjects' rights (intervenability) ; 14.2.12. Step 3: Exiting a cloud service contract: major issues ; 14.2.13. Lock-in and interoperability ; 14.2.14. Service-level agreements ; 14.2.15. Termination of the contract
  • Chapter 15. Future directions in cloud computing security. 15.1. Categories.