My Account Log in

1 option

Cloud computing security : foundations and challenges / edited by John R. Vacca.

O'Reilly Online Learning: Academic/Public Library Edition Available online

O'Reilly Online Learning: Academic/Public Library Edition
Format:
Book
Contributor:
Vacca, John R., editor.
Language:
English
Subjects (All):
Cloud computing--Security measures.
Computer networks--Security measures.
Data protection.
Computer security.
Physical Description:
1 online resource (522 pages) : illustrations
Edition:
Second edition.
Place of Publication:
Boca Raton, FL : CRC Press, Taylor & Francis Group, 2021.
Summary:
This handbook offers a comprehensive overview of cloud computing security technology and implementation while exploring practical solutions to a wide range of cloud computing security issues. As more organizations use cloud computing and cloud providers for data operations, the need for proper security in these and other potentially vulnerable areas has become a global priority for organizations of all sizes. Research efforts from academia and industry, as conducted and reported by experts in all aspects of security related to cloud computing, are gathered within one reference guide. Features Covers patching and configuration vulnerabilities of a cloud server Evaluates methods for data encryption and long-term storage in a cloud server Demonstrates how to verify identity using a certificate chain and how to detect inappropriate changes to data or system configurations John R. Vacca is an information technology consultant and internationally known author of more than 600 articles in the areas of advanced storage, computer security, and aerospace technology. John was also a configuration management specialist, computer specialist, and the computer security official (CSO) for NASA's space station program (Freedom) and the International Space Station Program from 1988 until his retirement from NASA in 1995.
Contents:
Cover
Half Title
Title Page
Copyright Page
Dedication
Table of Contents
Foreword
Preface
Acknowledgments
About the Editor
Contributors
Section I Introduction
Chapter 1 Cloud Computing Essentials
1.1 Introduction to Cloud Computing
1.2 Characteristics of Cloud Computing
1.3 Cloud Computing Models
1.3.1 Service Models
1.3.1.1 Infrastructure-as-a-Service
1.3.1.2 Platform-as-a-Service
1.3.1.3 Software-as-a-Service
1.3.2 Deployment Models
1.4 Cloud Services and Technologies
1.5 Research Challenges
1.6 Summary
Further Reading
2.7 ITU-T Cloud Computing Reference Architecture
2.7.1 Cloud Computing Actors
2.7.2 Layered Architecture
2.7.3 ITU-T Cloud Computing Functional Reference Architecture
2.8 Network Requirements for Cloud Computing
2.9 Summary
References
Chapter 3 Cloud Security Baselines
3.1 Introduction
3.2 An Overview of Computer Security
3.3 Vulnerabilities and Attacks
3.3.1 Application Layer
3.3.2 Operating System Layer
3.3.3 Hypervisor, Storage, Hardware, and Network
3.3.4 Cloud Security Mechanisms
3.3.4.1 Data Security
3.3.4.2 Digital Signature
3.3.4.3 Hashing
3.3.5 Virtualization Security
3.4 Privacy and Security in Cloud Storage Services
3.4.1 Cloud Data Protection Models
3.4.2 Enforcing Access Control Policies in the Cloud
3.4.3 Other Possible Causes of Data Leakage in the Cloud
3.5 Privacy and Security in Multiclouds
3.5.1 Desired Security and Privacy Properties in Multiclouds
3.5.2 Ensuring Security, Privacy, and Reliability in Multiclouds
3.6 Cloud Accountability
3.7 Summary
Chapter 4 Cloud Security, Privacy and Trust Baselines
4.1 Introduction
4.2 Understanding the Threats
4.3 Classification and Countermeasures
4.3.1 Infrastructure and Host Threats
4.3.1.1 Natural Disasters That Can Harm Critical Infrastructure
4.3.1.2 Unauthorized Physical Access to Facilities or Equipment
4.3.1.3 Deficient Training/Negligence of Employees
4.3.1.4 Dumpster Diving
4.3.1.5 Password Guessing
4.3.1.6 Unauthorized Access to Data or Information Technology Systems
4.3.1.7 Compromise of Operational Security Logs
4.3.1.8 Network Breaks
4.3.1.9 Privilege Escalation
4.3.1.10 Insecure or Ineffective Data Deletion
4.3.1.11 Malicious Scanning or Observation
Notes:
Description based on: online resource; title from pdf title page (COMPUTERSCIENCEnetBase, viewed January 8, 2021)
Includes bibliographical references and index.
ISBN:
9780429619649
0429619642
9780429055126
0429055129
9780429621796
0429621795
OCLC:
1193069843
Publisher Number:
KE73628
9780429619649

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

We want your feedback!

Thanks for using the Penn Libraries new search tool. We encourage you to submit feedback as we continue to improve the site.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account