官网首页设为首页收藏本站

世界资料网论坛

 找回密码
 立即注册
查看: 236|回复: 1
打印 上一主题 下一主题

Cloud Security and Privacy [复制链接]



Rank: 2

  • TA的每日心情
    无聊
    2017-4-10 22:03:45
  • 签到天数: 1 天

    连续签到: 1 天

    [LV.1]初来乍到

    金币
    27
    贡献
    4
    威望
    58
    在线时间
    1 小时
    注册时间
    2017-4-10
    最后登录
    2018-5-18
    积分
    58
    跳转到指定楼层
    楼主
    发表于 2017-4-10 22:02:38 |只看该作者 |倒序浏览
    C O N T E N T S
    PREFACE xi
    1 INTRODUCTION 1
    “Mind the Gap” 1
    The Evolution of Cloud Computing 2
    Summary 5
    2 WHAT IS CLOUD COMPUTING? 7
    Cloud Computing Defined 7
    The SPI Framework for Cloud Computing 11
    The Traditional Software Model 17
    The Cloud Services Delivery Model 17
    Cloud Deployment Models 22
    Key Drivers to Adopting the Cloud 26
    The Impact of Cloud Computing on Users 27
    Governance in the Cloud 30
    Barriers to Cloud Computing Adoption in the Enterprise 30
    Summary 34
    3 INFRASTRUCTURE SECURITY 35
    Infrastructure Security: The Network Level 36
    Infrastructure Security: The Host Level 44
    Infrastructure Security: The Application Level 49
    Summary 59
    4 DATA SECURITY AND STORAGE 61
    Aspects of Data Security 61
    Data Security Mitigation 65
    Provider Data and Its Security 66
    Summary 71
    5 IDENTITY AND ACCESS MANAGEMENT 73
    Trust Boundaries and IAM 73
    Why IAM? 74
    IAM Challenges 76
    IAM Definitions 76
    IAM Architecture and Practice 77
    Getting Ready for the Cloud 80
    Relevant IAM Standards and Protocols for Cloud Services 82
    IAM Practices in the Cloud 92
    Cloud Authorization Management 98
    Cloud Service Provider IAM Practice 99
    Guidance 104
    Summary 107
    6 SECURITY MANAGEMENT IN THE CLOUD 109
    Security Management Standards 112
    Security Management in the Cloud 113
    Availability Management 115
    SaaS Availability Management 117
    PaaS Availability Management 120
    IaaS Availability Management 122
    Access Control 124
    Security Vulnerability, Patch, and Configuration Management 130
    Summary 141
    7 PRIVACY 145
    What Is Privacy? 146
    What Is the Data Life Cycle? 146
    What Are the Key Privacy Concerns in the Cloud? 149
    Who Is Responsible for Protecting Privacy? 150
    Changes to Privacy Risk Management and Compliance in Relation to Cloud Computing 151
    Legal and Regulatory Implications 155
    U.S. Laws and Regulations 155
    International Laws and Regulations 162
    Summary 164
    8 AUDIT AND COMPLIANCE 167
    Internal Policy Compliance 168
    Governance, Risk, and Compliance (GRC) 170
    Illustrative Control Objectives for Cloud Computing 174
    Incremental CSP-Specific Control Objectives 179
    Additional Key Management Control Objectives 180
    Control Considerations for CSP Users 181
    Regulatory/External Compliance 182
    Other Requirements 192
    Cloud Security Alliance 192
    Auditing the Cloud for Compliance 194
    Summary 202
    9 EXAMPLES OF CLOUD SERVICE PROVIDERS 203
    Amazon Web Services (IaaS) 203
    Google (SaaS, PaaS) 205
    Microsoft Azure Services Platform (PaaS) 206
    Proofpoint (SaaS, IaaS) 207
    RightScale (IaaS) 208
    Salesforce.com (SaaS, PaaS) 210
    Sun Open Cloud Platform 211
    Workday (SaaS) 213
    Summary 213
    10 SECURITY-AS-A-[CLOUD] SERVICE 217
    Origins 218
    Today’s Offerings 220
    Summary 223
    11 THE IMPACT OF CLOUD COMPUTING ON THE ROLE OF CORPORATE IT 225
    Why Cloud Computing Will Be Popular with Business Units 226
    Potential Threats of Using CSPs 228
    A Case Study Illustrating Potential Changes in the IT Profession Caused by Cloud Computing 230
    Governance Factors to Consider When Using Cloud Computing 235
    Summary 236
    12 CONCLUSION, AND THE FUTURE OF THE CLOUD 239
    Analyst Predictions 240
    Survey Says? 242
    Security in Cloud Computing 245
    Program Guidance for CSP Customers 257
    The Future of Security in Cloud Computing 260
    Summary 265
    A SAS 70 REPORT CONTENT EXAMPLE 267
    B SYSTRUST REPORT CONTENT EXAMPLE 273
    C OPEN SECURITY ARCHITECTURE FOR CLOUD COMPUTING 279
    GLOSSARY 293
    INDEX 299

    附件: 你需要登录才可以下载或查看附件。没有帐号?立即注册
    论坛提供多种方式获取金币,比如每日红包、每日签到、上传资料赚金币、不定期红包、充值等,完全可以满足大家的下载需要(以后还会陆续推出其他获取金币的方式),请勿做单纯的伸手党。

    上传资料即奖励5金币,详情见:http://bbs.infoeach.com/thread-17539-1-1.html
    

    Rank: 9Rank: 9Rank: 9

  • TA的每日心情
    奋斗
    2018-6-4 09:36:15
  • 签到天数: 49 天

    连续签到: 1 天

    [LV.5]常住居民I

    金币
    77875
    贡献
    10433
    威望
    425487
    在线时间
    7237 小时
    注册时间
    2012-2-28
    最后登录
    2025-5-13
    积分
    425487

    突出贡献

    沙发
    发表于 2017-4-11 11:28:59 |只看该作者
    谢谢您的分享,金币已奖励!
    论坛提供多种方式获取金币,比如每日红包、每日签到、上传资料赚金币、不定期红包、充值等,完全可以满足大家的下载需要(以后还会陆续推出其他获取金币的方式),请勿做单纯的伸手党。

    上传资料即奖励5金币,详情见:http://bbs.infoeach.com/thread-17539-1-1.html
    您需要登录后才可以回帖 登录 | 立即注册

    免责声明|Archiver|手机版|( 京ICP备14017250号-1 京公网安备 11010602005955号)  

    GMT+8, 2025-5-16 01:07

    Powered by Discuz!

    © 2009-2016 Infoeach.com

    特别提醒:禁止发布任何违反国家法律、法规的言论与图片等内容;世界资料网是非营利性交流网站,旨在建立一个供大家学习和交流文献资料的平台。论坛文章和资料均由热心网友自由上传或发表,版权归原作者所有,只做为交流学习之用,本论坛言论纯属发表者个人意见,与“世界资料网”立场无关;如您(单位或个人)认为本网站某部分内容有侵权嫌疑,敬请立即联系我们,我们将在第一时间予以更正,联系邮箱kefu@infoeach.com
    回顶部