Effectiveness of Strategies For Successful Cloud Exploitation Strategies for Securing Cloud Environments
Main Article Content
Authors
Abstract
In this paper we present strategies for successful cloudexploitation. Cloud computing is becoming more and more more main brook, itbecomes harder to differentiate between the generic securities issues that anIT manager needs to tackle, from those that are specific to cloud computing.Things like roles andresponsibilities, secureapplication development, leastprivilege and many more apply equally well in traditionalenvironments as they do in the cloud.
Downloads
Download data is not yet available.
Article Details
Section
Articles