Effectiveness of Strategies For Successful Cloud Exploitation

Strategies for Securing Cloud Environments

Authors

  • Meena Mehta Author

Keywords:

strategies, successful, cloud exploitation, cloud computing, generic securities issues, IT manager, roles and responsibilities, secure application development, least privilege, traditional environments

Abstract

In this paper we present strategies for successful cloudexploitation. Cloud computing is becoming more and more more main brook, itbecomes harder to differentiate between the generic securities issues that anIT manager needs to tackle, from those that are specific to cloud computing.Things like roles andresponsibilities, secureapplication development, leastprivilege and many more apply equally well in traditionalenvironments as they do in the cloud.

Downloads

Download data is not yet available.

Published

2013-02-01