26,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 6-10 Tagen
payback
13 °P sammeln
  • Broschiertes Buch

The aim of this Book is to critically investigate the security management policy in the Cloud computing, and also review on those emerging threats which affect the Confidentiality, Integrity and Availability of Cloud computing services. The study is done using an extensive literature review, and analysis implementation of Cloud threat models. Investigation was put on, on the proposed threat model, using a functional model framework design, and the threat model was used to evaluate the vulnerability of Cloud computing services based on threat model for the Cloud, and threat model for service…mehr

Produktbeschreibung
The aim of this Book is to critically investigate the security management policy in the Cloud computing, and also review on those emerging threats which affect the Confidentiality, Integrity and Availability of Cloud computing services. The study is done using an extensive literature review, and analysis implementation of Cloud threat models. Investigation was put on, on the proposed threat model, using a functional model framework design, and the threat model was used to evaluate the vulnerability of Cloud computing services based on threat model for the Cloud, and threat model for service users. A scenario on the overview of how the attacks take place was also presented. The findings provide us with the fact that Cloud remote services are vulnerable to attacks. In most case the C.I.A of Cloud services were compromised with the assistance of an Insider, and also external threats only succeeds when the Cloud virtual system design is weak. Thus vulnerable virtual system design caneasily be penetrated using Man-in-the Middle attack and Distributed Denial of Service attacks (DDOS). All these attacks are characterized by gathering user confidential informations.
Autorenporträt
I am passionate in Network and Cloud Security with some years of experience in security of information, system engineering and administration.My prior experience includes technical and hybrid roles in cloud security and management. I implement pratical and palatable risk management strategy, solution and secure operation in Cloud.