Limit search to available items
Book Cover
E-book
Author Wheeler, Aaron, author

Title Cloud storage security : a practical guide / Aaron Wheeler, Michael Winburn
Published Amsterdam, Netherlands : Elsevier, [2015]

Copies

Description 1 online resource
Series Computer Science Reviews and Trends
Computer science reviews and trends.
Contents Front Cover; Cloud Storage Security; Copyright Page; Contents; 1 Data in the Cloud; 1.1 Definitions and History; 1.1.1 Definitions; 1.1.2 History; 1.2 Privacy and Security Concepts and Issues; 1.2.1 Your Data Versus Other People's Data; 1.2.2 Getting Your Data In and Out of the Cloud; 1.2.3 Legal Versus Criminal Threats; 1.2.3.1 Legal Threats; 1.2.3.2 Criminal Threats; 1.3 Cloud Storage; 1.3.1 What Is It?; 1.3.2 Case Studies: Comparison of Cloud Storage Security; 1.4 Cloud-Based Data Sharing; 1.5 Summary; References; 2 Application Data in the Cloud; 2.1 Applications; 2.1.1 Email
2.1.2 Background2.1.3 Case Studies: Comparison of Cloud-Based Email Security (Gmail, Outlook.com (Hotmail), Yahoo! Mail); 2.1.3.1 Questions; 2.1.3.2 Security Concepts; 2.1.3.3 Personally Identifiable Information (PII); 2.1.3.4 Methods and Results; 2.1.3.5 Data-in-Motion; 2.1.3.6 Data at Rest; 2.1.3.7 Physical Security; 2.1.3.8 Information Collected by Email Service Providers; 2.1.3.9 From Google's Privacy Policy; 2.1.3.10 How Email Service Providers Use the Information; 2.1.3.11 Where Email Service Providers Differ; 2.1.3.12 From Google's Terms of Service
2.1.3.13 From Outlook.com Privacy Policy2.1.3.14 From Yahoo! Privacy Policy; 2.1.3.15 Measures That Can Be Taken to Increase Security and Privacy; 2.1.3.16 Conclusion; 2.2 Cloud Backup Services; 2.2.1 Background; 2.2.2 Case Studies: Comparison of Cloud-Based Backup Security; 2.2.2.1 Questions; 2.2.2.2 Security Concepts; 2.2.2.3 Methods and Results; 2.2.2.4 Carbonite; 2.2.2.5 Data-in-Motion; 2.2.2.6 Data-at-Rest; 2.2.2.7 Facility Security; 2.2.2.8 Mozy; 2.2.2.9 Data in Motion and at Rest; 2.2.2.10 Encryption; 2.2.2.11 Privacy; 2.2.2.12 Conclusion; 2.3 Social Media
2.3.1 Social Media as Cloud Storage2.3.2 Case Studies: Comparison of Social Media Security (Facebook and Twitter); 2.3.2.1 Questions; 2.3.2.2 Security Concepts; 2.3.2.3 Methods and Results; 2.3.2.4 Twitter; 2.3.2.5 Twitter Privacy Policy; 2.3.2.6 Facebook; 2.3.2.7 How Facebook Uses Data They Collect; 2.3.2.8 Conclusion; 2.4 Office Suites; 2.4.1 Background; 2.4.2 Case Studies: Comparison of Cloud-Based Office Suite Security (Microsoft Office 365 and Google Docs); 2.4.2.1 Questions; 2.4.2.2 Security Concepts; 2.4.2.3 Google Docs; 2.4.2.4 Privacy; 2.4.2.5 Microsoft Office 365; 2.4.2.6 Privacy
2.4.2.7 Conclusion2.5 Health Apps; 2.5.1 Background; 2.5.2 Case Studies; 2.5.2.1 Security Concepts; 2.5.2.2 Questions; 2.5.2.3 Efficacy and Oversight; 2.5.2.4 Privacy and Security; 2.5.2.5 Conclusion; 2.6 Summary; References; 3 Privacy Challenges; 3.1 Who Wants Your Data?; 3.2 Privacy and Security Incidents in the News; 3.3 Legal Issues; 3.3.1 Travel; 3.3.2 Location, Location, Location; 3.3.3 Employers and Insurance Companies; 3.3.4 Litigation and e-Discovery; 3.3.5 Law Enforcement; 3.3.6 Lifestyle and Psychological Profiling; 3.4 Criminals, Authoritarian Governments, and Friends
Summary Cloud Storage Security: A Practical Guide introduces and discusses the risks associated with cloud-based data storage from a security and privacy perspective. Gain an in-depth understanding of the risks and benefits of cloud storage illustrated using a Use-Case methodology. The authors also provide a checklist that enables the user, as well as the enterprise practitioner to evaluate what security and privacy issues need to be considered when using the cloud to store personal and sensitive information
Bibliography Includes bibliographical references
Notes Vendor-supplied metadata
Subject Cloud computing -- Security measures
Data protection.
COMPUTERS -- Computer Literacy.
COMPUTERS -- Computer Science.
COMPUTERS -- Data Processing.
COMPUTERS -- Hardware -- General.
COMPUTERS -- Information Technology.
COMPUTERS -- Machine Theory.
COMPUTERS -- Reference.
Data protection
Form Electronic book
Author Winburn, Michael, author
LC no. 2017287331
ISBN 9780128029312
0128029315
0128029307
9780128029305