Cloud Computing Security Handbook
This Book by LIMSbook.com is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Cloud Computing Security Handbook: Regulatory Compliance and Best Practices
LabLynx Press
Table of Contents
- Chapter: 1. Introduction to Cloud Computing
- Chapter: 2. Regulatory Compliance and Standards
- Legal aspects of computing
- United States law
- Children's Online Privacy Protection Act
- Federal Information Security Management Act of 2002
- FedRAMP
- Gramm–Leach–Bliley Act
- Health Information Technology for Economic and Clinical Health Act
- Health Insurance Portability and Accountability Act
- Sarbanes–Oxley Act
- Laws elsewhere
- Data Protection Directive
- General Data Protection Regulation
- Standards and best practices
- AS 8015
- COBIT
- Corporate governance of information technology
- Corporate Governance of ICT
- ISO/IEC 27000
- ISO/IEC 38500
- Payment Card Industry Data Security Standard
- Chapter: 3. Security
- Security
- Computer security
- Network security
- Information security
- Cloud computing security
- Security as a service
- Encryption and other security methods
- Attribute-based encryption
- Bring your own encryption
- Digital transaction management
- Homomorphic encryption
- Key distribution
- Secret sharing
- Audit trail
- Security testing and management
- Vulnerability management
- Information security management
- Information technology security audit
- IT Baseline Protection Catalogs
- Business continuity planning
- Data recovery
- Cloud Security Alliance
- Chapter: 4. Risk Management