Автор: John R. Vacca
Издательство: CRC Press
Год: 2021
Страниц: 522
Язык: английский
Формат: epub
Размер: 19.1 MB
This handbook offers a comprehensive overview of cloud computing security technology and implementation while exploring practical solutions to a wide range of cloud computing security issues. As more organizations use cloud computing and cloud providers for data operations, the need for proper security in these and other potentially vulnerable areas has become a global priority for organizations of all sizes. Research efforts from academia and industry, as conducted and reported by experts in all aspects of security related to cloud computing, are gathered within one reference guide.
Section I discusses cloud computing essentials, such as cloud computing service models—like Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS), and Desktop as a Service (DaaS), including public, private, virtual private, and hybrid clouds. Cyber security fundamentals and software and data segregation security are also discussed.
Chapter 1, “Cloud Computing Essentials,” sets the stage for the rest of this book by presenting insight into the main idea of cloud computing, which is to outsource the management and delivery of software and hardware resources to third-party companies (cloud providers), which specialize in that particular service and can provide much better quality of service at lower costs in a convenient fashion. In addition, the authors also present an overview of key concepts and enabling technologies of cloud computing, including virtualization, load balancing, monitoring, scalability, and elasticity.
Chapter 2, “An Overview of Cloud Computing,” provides a detailed description of the basic concepts of cloud computing. Next is a discussion of the principal types of services typically offered by cloud providers. The chapter then looks at various deployment models for cloud systems, followed by an examination of two cloud computing reference architectures, developed by NIST and ITU-T, respectively. A consideration of these two different models provides insight into the nature of cloud computing...
Features:
- Covers patching and configuration vulnerabilities of a cloud server
- Evaluates methods for data encryption and long-term storage in a cloud server
- Demonstrates how to verify identity using a certificate chain and how to detect inappropriate changes to data or system configurations
Contents:
Foreword
Preface
SECTION I Introduction
CHAPTER 1 CLOUD COMPUTING ESSENTIALS
CHAPTER 2 AN OVERVIEW OF CLOUD COMPUTING
CHAPTER 3 CLOUD SECURITY BASELINES
CHAPTER 4 CLOUD SECURITY, PRIVACY AND TRUST BASELINES
CHAPTER 5 INFRASTRUCTURE AS A SERVICE (IAAS)
SECTION II Risk Analysis and Division of Responsibility
SECTION III Securing the Cloud Infrastructure
SECTION IV Operating System and Network Security
SECTION V Meeting Compliance Requirements
SECTION VI Preparing for Disaster Recovery
SECTION VII Advanced Cloud Computing Security
SECTION VIII Appendices
APPENDIX A: LIST OF TOP CLOUD COMPUTING SECURITY IMPLEMENTATION AND DEPLOYMENT COMPANIES
APPENDIX B: LIST OF CLOUD COMPUTING SECURITY PRODUCTS AND SERVICES
INDEX
Скачать Cloud Computing Security, 2nd Edition