Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
The cloud security ecosystem : technical, legal, business and management issues
Ko R., Choo R., Syngress Publishing, Waltham, MA, 2015. 570 pp. Type: Book (978-0-128015-95-7)
Date Reviewed: Nov 19 2015

Cloud computing has been around for quite a few years. However, according to the RightScale 2015 State of the Cloud Report (http://www.rightscale.com/lp/2015-state-of-the-cloud-report), security is still the major concern of users. We have all heard cases of major security breaches and data being hacked. Still, cloud computing is here to stay and we will all one day use the services it provides. Therefore, how can we reinforce the security of cloud computing? This book fills a large vacuum by providing in-depth knowledge of the security issues related to cloud computing.

The book begins with a relatively detailed introduction to the cloud computing ecosystem. Then the book follows E. W. Deming’s four-step quality management approach: plan, do, check, and act. Part 1 covers the plan phase. It includes the threats, risks, and requirements of cloud computing security. Part 2 is on the do phase, discussing current security approaches and challenges. Part 3 discusses the check phase, detailing forensics and incident responses after security troubles. Finally, Part 4 is on actions for improving security systems using governance and auditing.

With 22 chapters and 500-plus pages, it is a heavyweight book. Everyone can take from it what they want. However, it is an edited book, so each chapter has different authors. As a result, the chapter styles are inconsistent. For example, some have references while others don’t.

Cloud computing will only become more prevalent and important. With its popularity, it will become an obvious target for villains. To defend hackers, we will have to arm ourselves with knowledge and defense weapons. This book is a good starting point.

Reviewer:  R. S. Chang Review #: CR143964 (1602-0116)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Security and Protection (K.6.5 )
 
 
Security and Protection (C.2.0 ... )
 
 
Distributed Systems (C.2.4 )
 
 
General (C.2.0 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
CIRCAL and the representation of communication, concurrency, and time
Milne G. ACM Transactions on Programming Languages and Systems 7(2): 270-298, 1985. Type: Article
Oct 1 1985
Computer security risk management
Palmer I., Potter G., Van Nostrand Reinhold Co., New York, NY, 1989. Type: Book (9780442302900)
Apr 1 1991
Computers at risk
, National Academy Press, Washington, DC, 1991. Type: Book (9780309043885)
Oct 1 1991
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy