Cybersecurity With Cloud Computing

Cybersecurity With Cloud Computing

Website or Online Data - 2015
Rate this:
How do you keep your organization's files, applications, and accounts safe on the cloud? It starts with a considered design approach. In these videos, Malcolm Shore outlines the major cloud security risks, some of which have resulted in service disruptions at companies like Azure, Dropbox, Google, and Amazon, and shows how to plan for and minimize risk when it comes to your own cloud deployments. He introduces concepts such as software as a service (SaaS) and infrastructure as a service, and the differences between public and private clouds. Then, after reviewing the cloud security best practices from the Cloud Security Alliance and the European Network and Information Security Agency (ENISA), Malcolm shows how to use SABSA, a popular security requirements mapping approach, to figure out the business requirements for a successful and secure cloud deployment of your own.
Learn how to plan for and minimize risk when deploying cloud services such as Dropbox, Amazon Web Services, and Azure at your organization.
Publisher: Carpenteria, CA :, 2015
Copyright Date: ©2015
Additional Contributors: (Firm)
Call Number: eResearch


From the critics

Community Activity


Add a Comment

There are no comments for this title yet.


Add Age Suitability

There are no ages for this title yet.


Add a Summary

There are no summaries for this title yet.


Add Notices

There are no notices for this title yet.


Add a Quote

There are no quotes for this title yet.

Explore Further


Subject Headings


Find it at DCL

To Top