Information Security and Cloud Computing
2021
In this chapter, we will start by examining traditional information security and aspects of confidentiality, integrity, and access control. We will look at ways to protect data at rest, during transit, and in use. Then the security concerns arising out of cloud operating models will be examined. We will present seven recommended security practices to protect data in the cloud. Lastly, role of ML for cybersecurity will be investigated.
- Correction
- Source
- Cite
- Save
- Machine Reading By IdeaReader
15
References
0
Citations
NaN
KQI