Muutke küpsiste eelistusi

E-raamat: Practical Cloud Security: A Cross-Industry View [Taylor & Francis e-raamat]

(CloudGov Network, LLC, Washington, District of Columbia, USA), (National Cybersecurity Institute, Washington, District of Columbia, USA)
  • Formaat: 238 pages
  • Ilmumisaeg: 30-Sep-2020
  • Kirjastus: CRC Press
  • ISBN-13: 9781315370194
  • Taylor & Francis e-raamat
  • Hind: 110,79 €*
  • * hind, mis tagab piiramatu üheaegsete kasutajate arvuga ligipääsu piiramatuks ajaks
  • Tavahind: 158,27 €
  • Säästad 30%
  • Formaat: 238 pages
  • Ilmumisaeg: 30-Sep-2020
  • Kirjastus: CRC Press
  • ISBN-13: 9781315370194

Melvin Greer and Kevin Jackson have assembled a comprehensive guide to industry-specific cybersecurity threats and provide a detailed risk management framework required to mitigate business risk associated with the adoption of cloud computing. This book can serve multiple purposes, not the least of which is documenting the breadth and severity of the challenges that today’s enterprises face, and the breadth of programmatic elements required to address these challenges. This has become a boardroom issue: Executives must not only exploit the potential of information technologies, but manage their potential risks.



 



 



Key Features





  • • Provides a cross-industry view of contemporary cloud computing security challenges, solutions, and lessons learned



    • Offers clear guidance for the development and execution of industry-specific cloud computing business and cybersecurity strategies



    • Provides insight into the interaction and cross-dependencies between industry business models and industry-specific cloud computing security requirements

  • Foreword xi
    Extended Multimedia Content xvii
    Introduction xix
    Chapter 1 Cloud User Perceptions
    1(2)
    Chapter 2 Economics of Cloud Computing
    3(14)
    Chapter 3 Process and Sources
    17(2)
    Chapter 4 Industry-Specific Findings
    19(12)
    4.1 Official Titles
    19(1)
    4.2 Highest Level of Education
    20(1)
    4.3 Industry Representation
    21(1)
    4.4 Organizational Reporting
    21(3)
    4.5 Ability to Enforce Compliance
    24(1)
    4.6 Method That Best Prepares Someone to Become a Ciso
    25(1)
    4.7 Cyberattacks: A Major Threat to Industry
    26(1)
    4.8 Top Five It/Cybersecurity Priorities in the Next 12 Months
    27(1)
    4.9 Which Security Standards/Frameworks are Most Effective?
    28(1)
    4.10 Workforce and Talent
    29(2)
    Chapter 5 Cloud Computing
    31(32)
    5.1 Rise of The Internet
    32(1)
    5.2 The Transformation
    32(1)
    5.3 Key Characteristics of Cloud Computing
    32(2)
    5.4 Cloud Computing Deployment Models
    34(4)
    5.4.1 Public Cloud
    34(1)
    5.4.2 Benefits of Public Clouds
    35(1)
    5.4.3 Private Cloud
    36(1)
    5.4.4 Benefits of Private Clouds
    37(1)
    5.4.5 Hybrid Cloud
    37(1)
    5.4.6 Benefits of Hybrid Clouds
    37(1)
    5.4.7 Community Cloud
    38(1)
    5.5 Cloud Computing Service Models
    38(2)
    5.6 General Cloud Computing Benefits
    40(2)
    5.7 Cloud Use Cases
    42(4)
    5.8 Cloud Computing Technologies
    46(11)
    5.8.1 Commodity Hardware
    46(1)
    5.8.2 Network Speed
    47(1)
    5.8.3 Pervasive High-Quality Access
    47(1)
    5.8.4 Data Storage Architectures
    48(2)
    5.8.5 Data Centers
    50(1)
    5.8.6 Virtualization
    51(1)
    5.8.7 Hypervisor
    52(1)
    5.8.8 Hardware Virtualization Types
    53(1)
    5.8.9 Desktop Virtualization
    53(1)
    5.8.10 Software Virtualization
    54(1)
    5.8.11 Memory Virtualization
    55(1)
    5.8.12 Storage Virtualization
    55(1)
    5.8.13 Data Virtualization
    55(1)
    5.8.14 Network Virtualization
    56(1)
    5.8.15 Emerging Cloud Technologies
    56(1)
    5.9 Cloud Adoption Trends
    57(6)
    5.9.1 Data Sent to High-Risk Cloud Services
    60(3)
    Chapter 6 Cybersecurity
    63(26)
    6.1 Introduction
    63(3)
    6.2 Managing Risk in the Cloud
    66(14)
    6.2.1 The Risk Management Framework
    68(4)
    6.2.2 Cloud Providers Risk Management Process
    72(1)
    6.2.3 Cloud Consumers Risk Management Process
    73(7)
    6.3 Cybercrime
    80(4)
    6.3.1 The Hype
    80(1)
    6.3.2 The Facts
    81(1)
    6.3.3 Cyberattack Vectors
    82(1)
    6.3.4 Occurrence of Cyberattacks
    83(1)
    6.3.5 Cost of Successful Cyberattacks
    84(1)
    6.4 Education and Training
    84(1)
    6.5 Trends
    85(1)
    6.6 Global
    86(3)
    Chapter 7 Cloud Computing Vulnerabilities
    89(28)
    7.1 Organizational Reporting
    99(1)
    7.1.1 It/Cybersecurity Executive Title
    99(1)
    7.2 Organizational Budget Management
    99(2)
    7.3 Operational Planning
    101(7)
    7.3.1 Key Required Resources
    101(1)
    7.3.2 Key Future Initiatives
    101(1)
    7.3.3 Quality of Network It/Cybersecurity
    102(1)
    7.3.4 Number of Security Breaches Experienced in the Past 2 Years
    103(1)
    7.3.5 Most Recent It/Cybersecurity Risk Assessment
    104(1)
    7.3.6 Source For Comparative It/Cybersecurity Metrics
    104(1)
    7.3.7 Security Standards/Frameworks Used
    105(1)
    7.3.8 New Technology Strategy Posture
    106(1)
    7.3.9 Cybersecurity Staffing Source
    106(1)
    7.3.10 Cyber Defense Priorities
    107(1)
    7.4 Threat Expectations
    108(3)
    7.4.1 Type of Attack
    108(1)
    7.4.2 Type of Attackers
    108(1)
    7.4.3 Application Security Risks
    109(2)
    7.5 Cybersecurity Operations
    111(6)
    7.5.1 Number of Security Positions
    111(1)
    7.5.2 Key Ciso Activities
    112(5)
    Chapter 8 General Cybersecurity Threat By Industry
    117(22)
    8.1 Energy/Utilities
    120(2)
    8.1.1 Vertical View (Alertlogic_Energy Sector_Cloud Security Report.Pdf)
    120(1)
    8.1.2 Energy-Specific Vulnerabilities
    120(2)
    8.2 Banking/Finance
    122(3)
    8.2.1 Vertical View
    122(1)
    8.2.2 General
    122(3)
    8.3 Healthcare
    125(2)
    8.3.1 Vertical View
    125(1)
    8.3.2 General
    126(1)
    8.3.3 Retail Pharmacies
    126(1)
    8.4 Information Technology Outsourcing
    127(1)
    8.4.1 General
    127(1)
    8.5 Education
    128(1)
    8.5.1 General
    128(1)
    8.6 Cybersecurity Consulting Service
    128(3)
    8.7 Government/Military
    131(8)
    8.7.1 Us Federal Sector
    131(1)
    8.7.1.1 Federal
    132(1)
    8.7.7.2 Insider Threats
    133(1)
    8.7.1.3 Stolen Credentials
    133(1)
    8.7.1.4 The Need For Compliance
    133(1)
    8.7.1.5 Controlling Costs and Risk
    133(1)
    8.7.1.6 Civilian Agencies
    134(1)
    8.7.1.7 Defense
    134(1)
    8.7.1.8 Intelligence Community
    135(1)
    8.7.2 State and Local
    136(1)
    8.7.2.1 State Security Breach Disclosure Laws
    136(3)
    Chapter 9 Application Security By Industry
    139(6)
    9.1 Policy Compliance
    139(1)
    9.2 Internally Versus Externally Developed Applications
    140(1)
    9.3 Application Flaw Density
    140(1)
    9.4 Application Remediation
    141(1)
    9.5 High-Profile Vulnerabilities
    142(3)
    Chapter 10 Cloud Computing and Cybersecurity Education Challenges
    145(30)
    10.1 Industry Vertical Knowledge
    145(1)
    10.1.1 Regulated Industries
    145(1)
    10.1.2 Unregulated Industries
    146(1)
    10.2 A Global Cybersecurity View
    146(1)
    10.3 Global Legal Framework Knowledge
    147(2)
    10.4 Ciso Training, Education, and Certification
    149(3)
    10.5 Hybrid It Infrastructure Management
    152(2)
    10.6 Risk Management Frameworks
    154(2)
    10.7 Key Educational Topics: Critical Threats to Cloud Security
    156(3)
    10.8 Next Steps For Educating The Cybersecurity Workforce
    159(4)
    10.9 National Cybersecurity Workforce Framework
    163(1)
    10.10 United States Nice
    163(12)
    References
    171(4)
    Chapter 11 Next-Generation Business Models and Strategies
    175(4)
    11.1 Strategic Reinvention
    175(1)
    11.1.1 Customer Value Propositions
    175(1)
    11.1.2 Value Chains
    176(1)
    11.2 Better Decisions
    176(1)
    11.3 Deeper Collaboration
    177(2)
    Reference
    177(2)
    Appendix A Oncloud Training Security Offerings 179(2)
    Appendix B Relevant Articles and Publications 181(12)
    Appendix C Cloud Computing For The Business of Government 193(4)
    Appendix D Implementation of Cloud Brokerage 197(6)
    Appendix E The Web Services and Service-Oriented Architecture Revolution---Using Web Services to Deliver 203(4)
    Appendix F Software as a Service Inflection Point---Using Cloud Computing to Achieve Business Agility 207(6)
    Appendix G Fitara and Fedramp---Accelerating Federal Cloud Adoption 213(8)
    Index 221
    Melvin B. Greer Jr., is Managing Director of the Greer Institute for Leadership and Innovation, focused on research and development. Melvin uses his knowledge in graph analytics, machine learning and cognitive computing to accelerate transformation of data into a strategic asset for federal agencies and global enterprises. His systems and software engineering experience has resulted in patented inventions in cloud computing, synthetic biology and IoT bio-sensors for edge analytics. Greer is a member of the American Association for the Advancement of Science (AAAS) and US National Academy of Science, Engineering and Medicine.





    Kevin L. Jackson is a globally recognized cloud computing expert, independent thought leader with IBM and Dell, founder and author of award-winning "Cloud Musings" blog and US Black Engineer & Information Technology Magazine Cybervisionary. Jackson has also been recognized as a "Top 100 Cybersecurity Influencer and Brand" by Onalytica (2015), a Huffington Post Top 100 Cloud Computing Experts on Twitter (2013), a "Top 50 Cloud Computing Blogger for IT Integrators" by CRN (2015) and a "Top 5 Must Read Cloud Blog" by BMC Software (2015). He is also a Fellow of the National Cyber Security Institute.