
CSA Guide to Cloud Computing
Implementing Cloud Privacy and Security
Description
Key Features
- Your one-stop source for comprehensive understanding of cloud security from the foremost thought leaders in the industry
- Insight into the most current research on cloud privacy and security, compiling information from CSA's global membership
- Analysis of future security and privacy issues that will impact any enterprise that uses cloud computing
Readership
Table of Contents
- Forewords
- About the Authors
- About the Cloud Security Alliance
- Acknowledgments
- CSA Guide to Cloud Computing—Introduction
- Chapter 1. Cloud Computing, What is it and What’s the Big Deal?
- Defining Cloud Computing
- Economic Opportunities for Cloud Computing
- The Cloud is “Not” Secure
- Chapter 2. Selecting and Engaging with a Cloud Service Provider
- Security, Trust and Assurance Repository Initiative
- Engaging with the Cloud Service Provider
- Chapter 3. The Cloud Threat Landscape
- The Cloud Threat Landscape
- Notorious Nine
- Additional Cloud Threats
- Chapter 4. Secure Cloud for Mobile Computing
- Mobile Top Threats: Evil 8.0
- Addressing the Threat: Mobile Components for Consideration
- Chapter 5. Making the Move into the Cloud
- Cloud Computing Checklist
- Security for the Cloud
- Chapter 6. Certification for Cloud Service Providers
- Certification for Cloud Service Providers
- Chapter 7. The Privacy Imperative
- Does Cloud Computing Make My Data Any Less Private?
- Privacy Level Agreement
- Data Protection Certification
- Chapter 8. Cloud Security Alliance Research
- Big Data Working Group
- Cloud Data Governance
- CloudCERT
- CloudTrust Protocol
- Enterprise Architecture Working Group
- Incident Management and Forensics
- Innovation Initiative
- Security as a Service
- Security Guidance for Critical Areas of Focus in Cloud Computing
- Software Defined Perimeter
- Chapter 9. Dark Clouds, What to Do In The Event of a Security Incident
- Building a Security Incident Response Team
- Incident Response Challenges in the Cloud
- The Future
- Chapter 10. The Future Cloud
- More, More, and More
- Cloud Computing for Critical Infrastructure
- Defining the Security Requirements for Tomorrow’s Cloud
- Appendix
- Index
Product details
- No. of pages: 236
- Language: English
- Copyright: © Syngress 2014
- Published: September 22, 2014
- Imprint: Syngress
- eBook ISBN: 9780124201859
- Paperback ISBN: 9780124201255
About the Authors
Raj Samani
He previously worked across numerous public sector organisations, in many cyber security and research orientated working groups across Europe. Examples include the midata Interoperability Board, as well as representing DIGITALEUROPE on the Smart Grids Reference Group established by the European Commission in support of the Smart Grid Mandate.
In addition, Raj is currently the Cloud Security Alliance’s Strategic Advisor for EMEA having previously served as the Vice President for Communications in the ISSA UK Chapter where he presided over the award of Chapter Communications Programme of the Year 2008 and 2009, having previously established the UK mentoring programme. He is also on the advisory council for the Infosecurity Europe show, Infosecurity Magazine, and expert on both searchsecurity.co.uk, and Infosec portal, and regular columnist on Computer Weekly. He has had numerous security papers published, and appeared on television (ITV and More4) commenting on computer security issues. He has also provided assistance in the 2006 RSA Wireless Security Survey and part of the consultation committee for the RIPA Bill (Part 3).