Cover von Cybersecurity with Cloud Computing wird in neuem Tab geöffnet
E-Medium

Cybersecurity with Cloud Computing

0 Bewertungen
Autor/Künstler: Suche nach diesem Verfasser Shore, Malcolm
Jahr: 2015
Verlag: LinkedIn
Mediengruppe: download
Vorbestellbar: Ja Nein
Voraussichtlich entliehen bis:
Link zu einem externen Medieninhalt - wird in neuem Tab geöffnet

Exemplare

BibliothekStandortSignaturStatusRückgabedatum
Zweigstelle: onleihe Standort 2: Signatur: Status: Zum Downloaden Frist:

Inhalt

How do you keep your organization''s files, applications, and accounts safe on the cloud? It starts with a considered design approach. In these videos, Malcolm Shore outlines the major cloud security risks, some of which have resulted in service disruptions at companies like Azure, Dropbox, Google, and Amazon, and shows how to plan for and minimize risk when it comes to your own cloud deployments. He introduces concepts such as software as a service (SaaS) and infrastructure as a service, and the differences between public and private clouds. Then, after reviewing the cloud security best practices from the Cloud Security Alliance and the European Network and Information Security Agency (ENISA), Malcolm shows how to use SABSA, a popular security requirements mapping approach, to figure out the business requirements for a successful and secure cloud deployment of your own.

Bewertungen

0 Bewertungen
0 Bewertungen
0 Bewertungen
0 Bewertungen
0 Bewertungen

Details

Autor/Künstler: Suche nach diesem Verfasser Shore, Malcolm
Jahr: 2015
Verlag: LinkedIn
Suche nach dieser Systematik
Suche nach diesem Interessenskreis
Beschreibung: 02:25:30.00
Suche nach dieser Beteiligten Person
Mediengruppe: download