Computing Reviews

The cloud security ecosystem :technical, legal, business and management issues
Ko R., Choo R., Syngress Publishing,Waltham, MA,2015. 570 pp.Type:Book
Date Reviewed: 11/19/15

Cloud computing has been around for quite a few years. However, according to the RightScale 2015 State of the Cloud Report (http://www.rightscale.com/lp/2015-state-of-the-cloud-report), security is still the major concern of users. We have all heard cases of major security breaches and data being hacked. Still, cloud computing is here to stay and we will all one day use the services it provides. Therefore, how can we reinforce the security of cloud computing? This book fills a large vacuum by providing in-depth knowledge of the security issues related to cloud computing.

The book begins with a relatively detailed introduction to the cloud computing ecosystem. Then the book follows E. W. Deming’s four-step quality management approach: plan, do, check, and act. Part 1 covers the plan phase. It includes the threats, risks, and requirements of cloud computing security. Part 2 is on the do phase, discussing current security approaches and challenges. Part 3 discusses the check phase, detailing forensics and incident responses after security troubles. Finally, Part 4 is on actions for improving security systems using governance and auditing.

With 22 chapters and 500-plus pages, it is a heavyweight book. Everyone can take from it what they want. However, it is an edited book, so each chapter has different authors. As a result, the chapter styles are inconsistent. For example, some have references while others don’t.

Cloud computing will only become more prevalent and important. With its popularity, it will become an obvious target for villains. To defend hackers, we will have to arm ourselves with knowledge and defense weapons. This book is a good starting point.

Reviewer:  R. S. Chang Review #: CR143964 (1602-0116)

Reproduction in whole or in part without permission is prohibited.   Copyright 2024 ComputingReviews.com™
Terms of Use
| Privacy Policy