Book description
NoneTable of contents
- Cover
- About the Author
- Title Page
- Copyright Page
- Dedication
- Contents at a Glance
- Contents
- Foreword
- Acknowledgments
- Introduction
- Chapter 1 Cloud Computing Concepts and Architectures
- Chapter 2 Governance and Enterprise Risk Management
-
Chapter 3 Legal Issues, Contracts, and Electronic Discovery
- Legal Frameworks Governing Data Protection and Privacy
- Regional Examples
- Contracts and Provider Selection
-
Electronic Discovery
- Possession, Custody, and Control
- Relevant Cloud Applications and Environment
- Searchability and E-Discovery Tools
- Preservation
- Data Retention Laws and Recordkeeping Obligations
- Data Collection
- Forensics
- Reasonable Integrity
- Direct Access
- Native Production
- Authentication
- Cooperation Between Provider and Client in E-Discovery
- Response to a Subpoena or Search Warrant
- Chapter Review
- Chapter 4 Compliance and Audit Management
- Chapter 5 Information Governance
- Chapter 6 Management Plane and Business Continuity
- Chapter 7 Infrastructure Security
- Chapter 8 Virtualization and Containers
- Chapter 9 Incident Response
- Chapter 10 Application Security
- Chapter 11 Data Security and Encryption
- Chapter 12 Identity, Entitlement, and Access Management
-
Chapter 13 Security as a Service
- Potential Benefits and Concerns of SecaaS
-
Major Categories of SaaS Offerings
- Identity, Entitlement, and Access Management Services
- Cloud Access Security Broker
- Web Security Gateway
- E-mail Security
- Security Assessment
- Web Application Firewall
- Intrusion Detection/Prevention
- Security Information and Event Management (SIEM)
- Encryption and Key Management
- Business Continuity and Disaster Recovery
- Security Management
- Distributed Denial of Service Protection
- Chapter Review
- Chapter 14 Related Technologies
-
Chapter 15 ENISA Cloud Computing: Benefits, Risks, and Recommendations for Information Security
-
Security Benefits of Cloud
- Security and the Benefits of Scale
- Security as a Market Differentiator
- Standardized Interfaces for Managed Security Services
- Rapid, Smart Scaling of Resources
- Audit and Evidence Gathering
- Timely, Effective, and Efficient Updates and Defaults
- Audit and SLAs Force Better Risk Management
- Benefits of Resource Concentration
- Top Security Risks
- Five Key Legal Issues Common Across All Scenarios
-
Additional Items for the Exam
- Open Virtualization Format
- VM Hopping
- Economic Denial of Service
- Licensing Risks
- Risk Concerns of a Cloud Provider Being Acquired
- Data Controller vs. Data Processor Definitions
- Guest System Monitoring in IaaS Responsibilities
- User Provisioning Vulnerability
- Underlying Vulnerability in Loss of Governance
- Risks R.1–R.35 and Underlying Vulnerabilities
- Chapter Review
-
Security Benefits of Cloud
- Appendix A Cloud Computing Security Policy Examples
- Appendix B About the Online Content
- Glossary
- Index
Product information
- Title: CCSK Certificate of Cloud Security Knowledge All-in-One Exam Guide
- Author(s):
- Release date:
- Publisher(s): McGraw-Hill
- ISBN: None
You might also like
book
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide, 2nd Edition
The only official study guide for the new CCSP exam (ISC)2 CCSP Certified Cloud Security Professional …
audiobook
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide
The only official study guide for the new CCSP exam (ISC)2 CCSP Certified Cloud Security Professional …
book
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide, 3rd Edition
The only official study guide for the new CCSP exam objectives effective from 2022-2025 (ISC)2 CCSP …
book
CCISO Certified Chief Information Security Officer All-in-One Exam Guide
100% coverage of every objective for the EC-Council’s Certified Chief Information Security Officer exam Take the …