Muutke küpsiste eelistusi

Securing Cloud and Mobility: A Practitioner's Guide [Kõva köide]

  • Formaat: Hardback, 228 pages, kõrgus x laius: 234x156 mm, kaal: 580 g
  • Ilmumisaeg: 11-Feb-2013
  • Kirjastus: Taylor & Francis Inc
  • ISBN-10: 1439850550
  • ISBN-13: 9781439850558
Teised raamatud teemal:
  • Formaat: Hardback, 228 pages, kõrgus x laius: 234x156 mm, kaal: 580 g
  • Ilmumisaeg: 11-Feb-2013
  • Kirjastus: Taylor & Francis Inc
  • ISBN-10: 1439850550
  • ISBN-13: 9781439850558
Teised raamatud teemal:
"A comprehensive reference on virtualization and security, a technology widely accepted but not yet adopted, this book offers a pragmatic approach to end-point virtualization. Through its use of academic research paired with real world implementation, this text covers network, server, and endpoint aspects of virtualization and provides readers with project templates and resource planning examples. The book offers in-depth coverage of implementation plans, process consideration points, and resource planning. Topics covered include horizontal and vertical segregation, server hardening, monitoring and auditing, configuration management, change management, and incident management"--

Although virtualization is a widely accepted technology, there are few books dedicated to virtualization and security. Filling this need, Securing Cloud and Mobility: A Practitioner's Guide explains how to secure the multifaceted layers of private and public cloud deployments as well as mobility infrastructures. With comprehensive coverage that includes network, server, and endpoint security, it provides a strategic view of the security implications of virtualization and cloud computing.

The book begins by deconstructing the terminology of cloud computing. It explains how to establish a secure framework within the virtualized environment and breaks down the various deployment and service models for cloud computing.

For private clouds, it discusses the issues of physical versus logical segmentation, securing orchestration, encryption services, threat intelligence, and identity management. For public clouds, it provides three frameworks for reviewing cloud services: cursory, in-depth, and outsourced.

On the mobility side, the text discusses the three major mobile architectures: Apple IOS, Android, and Blackberry. Filled with real-world examples, it addresses the various mobile management approaches, secure mobile code development and standards, and the emerging threats to both cloud and mobility.

Laying out decision-making frameworks to help you secure your virtual environment, the book includes coverage of physical and virtual segregation, orchestration security, threat intelligence, identity management, cloud security assessments, cloud encryption services, audit and compliance, certifications, and secure mobile architecture. It includes helpful implementation considerations, technical decision points, and process flows to supply you with practical guidance on how to navigate the undulating terrains of cloud and mobility.

List of Figures
xiii
List of Tables
xv
Part I Rethinking IT and Security
Chapter 1 Tectonic Shifts
3(8)
1.1 Disruptive Forces
3(1)
1.2 Deconstructing Cloud Computing
3(4)
1.2.1 NIST Definition
3(1)
1.2.2 The Three Service Models
4(2)
1.2.3 The Four Deployment Models
6(1)
1.3 The Rise of Mobility
7(2)
1.4 New IT
9(1)
References
10(1)
Chapter 2 The Evolving Threat Landscape
11(28)
2.1 From Cryptographers to World Leaders
11(1)
2.2 The Changing Threat Landscape
12(2)
2.3 Hacktivists
14(5)
2.3.1 Motivation
14(1)
2.3.2 Modus Operandi
15(1)
2.3.3 Hacktivism and Cloud
16(1)
2.3.4 Hacktivism and Mobility
17(1)
2.3.5 Hacktivism and Security
17(2)
2.4 Organized Cyber Crime
19(6)
2.4.1 Motivation
19(1)
2.4.2 Modus Operandi
19(1)
2.4.3 Organized Crime and Cloud
20(2)
2.4.4 Organized Crime and Mobility
22(2)
2.4.5 Organized Crime and Security
24(1)
2.5 Cyber Espionage and Terrorism
25(4)
2.5.1 Motivation
25(1)
2.5.2 Modus Operandi
26(1)
2.5.3 Cyber Espionage, Terrorism, and Cloud
27(1)
2.5.4 Cyber Espionage, Terrorism, and Mobility
27(1)
2.5.5 Cyber Espionage, Terrorism, and Security
28(1)
2.6 Hackers for Hire
29(3)
2.6.1 Motivation and Modus Operandi
29(1)
2.6.2 Hackers for Hire and the Cloud
30(1)
2.6.3 Hackers for Hire and Mobility
30(1)
2.6.4 Hackers for Hire and Security
31(1)
2.7 Insider Threat
32(1)
References
33(6)
Part II Deconstructing Cloud Security
Chapter 3 Cloud Dialogues
39(14)
3.1 Point of Cloud
39(1)
3.2 Capability
40(1)
3.3 Financials
41(1)
3.4 Agility
42(1)
3.5 Security
43(3)
3.6 Licensing
46(3)
3.7 Service Level Agreements
49(1)
References
50(3)
Part III Securing Private Cloud Computing
Chapter 4 Segmentation and the Private Cloud
53(12)
4.1 Physical and Logical Segmentation
53(1)
4.2 Physical Segmentation
54(2)
4.3 Physical and Virtual Segmentation
56(2)
4.4 Highly Optimized Segmentation Model
58(2)
4.5 Production-Based Segmentation Model
60(1)
4.6 Storage Segmentation Model
60(5)
Chapter 5 Orchestration and Cloud Management
65(10)
5.1 What Is Orchestration?
65(1)
5.2 Benefits and Challenges
65(3)
5.3 Information Security Considerations
68(7)
5.3.1 Secure Service Delivery Workflows
69(1)
5.3.2 Secure Resource Delivery Automation
69(3)
5.3.3 Secure Orchestration Management
72(1)
5.3.4 Security Monitoring
72(3)
Chapter 6 Encryption Services
75(18)
6.1 Holistic Encryption Strategy
75(1)
6.2 Scope Reduction
76(1)
6.3 Transport Layer Encryption
77(2)
6.3.1 Secure Socket Layer (SSL)
77(1)
6.3.2 Virtual Private Networks (VPNs)
77(1)
6.3.3 Secure Shell (SSH)
78(1)
6.3.4 Secure File Transfer Protocol (SFTP)
78(1)
6.3.5 Transport Layer Security (TLS)
79(1)
6.4 Data Layer Encryption
79(9)
6.4.1 Database Encryption
80(1)
6.4.2 File Encryption
80(3)
6.4.3 Encryption Appliances
83(1)
6.4.4 Disk Encryption
84(2)
6.4.5 Virtualization Encryption
86(2)
6.5 Key Management Life Cycle
88(3)
References
91(2)
Chapter 7 Threat Intelligence
93(10)
7.1 Security Threats to Private Cloud
93(2)
7.2 Threat Prevention Strategies
95(1)
7.3 Threat Detection Toolset
95(4)
7.4 Making Threat Detection Intelligent
99(4)
Chapter 8 Identity Management for Private Clouds
103(12)
8.1 Layers of Identities
103(2)
8.2 Challenges of Disparate Identity Repositories
105(1)
8.3 Centralizing Identity Repositories
106(9)
8.3.1 Entitlements Aggregator
106(2)
8.3.2 Authoritative Sources of Identities
108(1)
8.3.3 Administrative Access
109(1)
8.3.4 Task User Access
109(1)
8.3.5 Central Identity Repository
110(5)
Part IV Securing Public Clouds
Chapter 9 Enterprise Cloud Governance
115(10)
9.1 Security Exposure of Public Cloud Use
115(1)
9.2 Corporate Cloud Use Policy
116(2)
9.3 Cloud Request Form
118(2)
9.4 Cloud Approval Workflow
120(3)
References
123(2)
Chapter 10 Cursory Cloud Use Review
125(8)
10.1 Overview
125(1)
10.2 Interview with Cloud Service Provider
126(4)
10.3 Cursory Review-Assessment Report
130(3)
Chapter 11 In-Depth Cloud Assessment
133(22)
11.1 Overview
133(1)
11.2 Interview with the Requestor
134(2)
11.3 Security Governance
136(2)
11.4 Data Protection
138(4)
11.4.1 Overview
138(1)
11.4.2 Data Protection Questions for All Service Models
139(1)
11.4.3 SaaS Data Protection Questions
139(2)
11.4.4 PaaS Data Protection Questions
141(1)
11.4.5 IaaS Data Protection Questions
142(1)
11.5 Security Architecture
142(2)
11.6 Application Security
144(1)
11.6.1 Overview
144(1)
11.6.2 SaaS Application Security
144(1)
11.6.3 PaaS Application Security
145(1)
11.7 Identity and Access Management
145(4)
11.7.1 Overview
145(1)
11.7.2 Identity Access Management for CSP Staff
146(1)
11.7.3 Identity and Access Management for CSP Customers
147(2)
11.8 Compliance
149(2)
11.9 Electronic Discovery
151(1)
11.10 Closing the Loop
152(1)
References
153(2)
Chapter 12 Third-Party Cloud Assessment
155(6)
12.1 Overview
155(1)
12.2 Selecting an Assessor
156(1)
12.3 Finalizing the SOW
156(2)
12.4 Closing the Loop
158(3)
Part V Securing Mobile
Chapter 13 Mobile Security Infrastructure
161(8)
13.1 Overview
161(1)
13.2 BlackBerry® Enterprise Server Architecture
161(2)
13.3 Exchange to Support iOS, Android™, and Windows® Phone
163(2)
References
165(4)
Chapter 14 The Mobile Client Itself
169(14)
14.1 Overview
169(1)
14.2 Tablet and Smart Phone Security Issues
169(1)
14.3 Bring Your Own Device (BYOD)
170(2)
14.4 Lack of Encryption
172(1)
14.5 Lack of Good Authentication and Password Controls
173(1)
14.6 Unfiltered Mobile Apps
174(1)
14.7 Saying No Is a Tricky Business
175(1)
14.8 Updating Mobile Standards and Searching for Solutions
175(2)
14.9 Performing Sanity Testing
177(2)
14.10 Garnering Executive Support and the Big Win
179(2)
References
181(2)
Chapter 15 Connecting to Enterprise and Third-Party Applications from Mobile Devices
183(10)
15.1 Overview
183(1)
15.2 Connecting to Exchange
183(1)
15.3 Connecting via VPN
184(2)
15.4 Connecting to Microsoft SharePoint® 2010 or Later
186(1)
15.5 Connecting to a Desktop or Server
187(2)
15.6 Connecting to File Shares
189(1)
15.7 Connecting to or Installing Third-Party Applications
190(1)
References
191(2)
Chapter 16 Creating Secure Mobile Applications
193(10)
16.1 Mobile Application Development in Your Organization
193(1)
16.2 Start with the Stakeholders
194(2)
16.3 Step through the Entire SDLC
196(4)
16.4 Guidelines Regarding Enterprise App Store/Google® Play
200(1)
16.4.1 Overview of Infrastructure
200(1)
16.4.2 Overview of Environment Setup and General Controls
200(1)
16.4.3 A Note about Publishing Your Apps
201(1)
16.4.3.1 Dealing with the Apple® App Store
201(1)
16.4.3.2 Dealing with Android's Google Play
201(1)
References
201(2)
Index 203
Lim, Ian; Coolidge, E. Coleen ; Hourani, Paul