<i>Cloud Storage Security: A Practical Guide</i> introduces and discusses the risks associated with cloud-based data storage from a security and privacy perspective. Gain an in-depth understanding of the risks and benefits of cloud storage illustrated using a Use-Case methodology. The authors also p
Cloud storage security a practical guide
β Scribed by Wheeler, Aaron;Winburn, Michael
- Publisher
- Elsevier
- Year
- 2015
- Tongue
- English
- Leaves
- 145
- Series
- Computer science reviews and trends
- Edition
- Online-Ausg
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Cloud Storage Security: A Practical Guideintroduces and discusses the risks associated with cloud-based data storage from a security and privacy perspective. Gain an in-depth understanding of the risks and benefits of cloud storage illustrated using a Use-Case methodology. The authors also provide a checklist that enables the user, as well as the enterprise practitioner to evaluate what security and privacy issues need to be considered when using the cloud to store personal and sensitive information.
β¦ Table of Contents
Front Cover......Page 1
Cloud Storage Security......Page 4
Copyright Page......Page 5
Contents......Page 6
1.1.1 Definitions......Page 8
1.1.2 History......Page 9
1.2 Privacy and Security Concepts and Issues......Page 10
1.2.1 Your Data Versus Other Peopleβs Data......Page 14
1.2.2 Getting Your Data In and Out of the Cloud......Page 17
1.2.3.1 Legal Threats......Page 19
1.2.3.2 Criminal Threats......Page 21
1.3.1 What Is It?......Page 22
1.3.2 Case Studies: Comparison of Cloud Storage Security......Page 23
1.4 Cloud-Based Data Sharing......Page 26
References......Page 28
2 Application Data in the Cloud......Page 30
2.1.1 Email......Page 31
2.1.2 Background......Page 32
2.1.3.2 Security Concepts......Page 34
2.1.3.5 Data-in-Motion......Page 35
2.1.3.8 Information Collected by Email Service Providers......Page 36
2.1.3.10 How Email Service Providers Use the Information......Page 38
2.1.3.12 From Googleβs Terms of Service......Page 39
2.1.3.14 From Yahoo! Privacy Policy......Page 40
2.2.1 Background......Page 41
2.2.2.2 Security Concepts......Page 42
2.2.2.6 Data-at-Rest......Page 43
2.2.2.7 Facility Security......Page 44
2.2.2.10 Encryption......Page 45
2.3.1 Social Media as Cloud Storage......Page 47
2.3.2.2 Security Concepts......Page 48
2.3.2.4 Twitter......Page 49
2.3.2.5 Twitter Privacy Policy......Page 50
2.3.2.6 Facebook......Page 51
2.3.2.7 How Facebook Uses Data They Collect......Page 54
2.4.1 Background......Page 55
2.4.2.3 Google Docs......Page 56
2.4.2.6 Privacy......Page 57
2.5.1 Background......Page 58
2.5.2.3 Efficacy and Oversight......Page 59
2.5.2.4 Privacy and Security......Page 60
References......Page 61
3 Privacy Challenges......Page 64
3.1 Who Wants Your Data?......Page 65
3.2 Privacy and Security Incidents in the News......Page 69
3.3 Legal Issues......Page 70
3.3.2 Location, Location, Location......Page 71
3.3.3 Employers and Insurance Companies......Page 72
3.3.5 Law Enforcement......Page 73
3.3.6 Lifestyle and Psychological Profiling......Page 74
3.4.2 Authoritarian Governments......Page 75
3.4.3 Friends......Page 76
References......Page 78
4.1 Legal Responsibility When Handling Other Peopleβs Data......Page 82
4.2.1 HIPAA......Page 84
4.2.1.2 Administrative Safeguards......Page 87
4.2.1.3 Technical Safeguards......Page 88
4.2.2 Dodd-Frank......Page 90
4.2.3 GrammβLeachβBliley Act......Page 92
4.2.4 SOX......Page 94
4.3 Cloud Storage Provider and Compliance......Page 95
4.4 Laws and Regulations of Other Countries......Page 96
4.4.1.1 Benefits for EU Citizens......Page 97
4.4.1.2 Benefits for Business......Page 98
4.4.2.1 Data Protection Principles......Page 100
4.4.2.2 Regulation and Enforcement......Page 101
4.4.3 India β Information Technology Act 2000 (IT Act)......Page 102
4.4.3.2 Privacy Policy Compliance......Page 103
4.5 Summary......Page 104
References......Page 105
5.1 Two-factor Authentication......Page 106
5.2 Encrypt Yourself......Page 108
5.3 Secure Email for Cloud Storage......Page 109
5.4 Passwords and Encryption Keys......Page 110
5.6 Delete Private Data......Page 112
5.7 Personal or Distributed Cloud Storage......Page 113
5.8 Security-as-a-Service......Page 117
5.9 Summary......Page 118
References......Page 119
6.1.1 Cloud Providerβs Physical Security......Page 120
6.1.3 Encryption/Decryption......Page 121
6.1.4 Authentication and Access Control......Page 122
6.2.1 Evaluating Data and User Access......Page 123
6.3 Cloud Data Privacy and Security Checklist......Page 125
6.3.4 Cloud Provider Network Security......Page 126
6.3.8 File Content Deletion......Page 127
6.3.12 Passwords......Page 128
6.3.15 Other Things to Consider When Storing Data in the Cloud......Page 129
Reference......Page 130
7.1.1 Encryption by Default......Page 132
7.1.4 Anonymity Networks......Page 133
7.1.6 Home Clouds......Page 134
7.1.7 Security Versus Safety......Page 135
7.2.1 Cloud of Things......Page 136
7.2.2 Future Data Storage......Page 138
7.2.3 Quantum Memory......Page 139
7.2.4 The Future of Storage Technology β DNA......Page 140
7.2.5 Biology to Computer Science......Page 142
7.2.6 DNA Storage and Security......Page 143
7.2.7 The Cloud β Data, Information, Questions......Page 144
References......Page 145
π SIMILAR VOLUMES
With their rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. This hands-on book guides you through security best practices for multivendor cloud environments, whether your company plans to move legacy on-premises projects
Intro; Copyright; Table of Contents; Preface; Conventions Used in This Book; O'Reilly Online Learning Platform; How to Contact Us; Acknowledgments; Chapter 1. Principles and Concepts; Least Privilege; Defense in Depth; Threat Actors, Diagrams, and Trust Boundaries; Cloud Delivery Models; The Cloud S
<span>With rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. In this updated second edition, you'll examine security best practices for multivendor cloud environments, whether your company plans to move legacy on-premises
With rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. In this updated second edition, you'll examine security best practices for multivendor cloud environments, whether your company plans to move legacy on-premises proje
1 online resource (1 volume) :