Jump to ratings and reviews
Rate this book

Cloud Computing Protected: Security Assessment Handbook

Rate this book
Cloud Computing Protected describes the most important security challenges that organizations face as they seek to adopt public cloud services and implement their own cloud-based infrastructure.These emerging technologies introduce new Virtualization hinders monitoring and can lead to server sprawl.- Multi-tenancy exposes risks of data leakage to co-tenants.- Outsourcing reduces both control and visibility over services and data.- Internet delivery increases the exposure of valuable information assets.- Ambiguity in jurisdiction and national laws complicates compliance.- Lack of standardization can lead to lock-in binding customers to providers.Fortunately, there are also many security benefits that customers can enjoy as they implement cloud Specialized providers can invest in best-in-class tools and expertise.- Contractual terms can define the function and scope of critical services.- Public services undergo scrutiny from the collective worldwide community.- Subscribing to multiple providers increases redundancy.- Global reach facilitates early alerts and consistent policy enforcement.This book looks at these and other areas where the advent of cloud computing has the opportunity to influence security risks, safeguards and processes.

412 pages, Paperback

First published January 18, 2013

1 person is currently reading
11 people want to read

About the author

John Rhoton

24 books1 follower

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
6 (54%)
4 stars
5 (45%)
3 stars
0 (0%)
2 stars
0 (0%)
1 star
0 (0%)
No one has reviewed this book yet.