Information Security and Cloud Computing

2021 
In this chapter, we will start by examining traditional information security and aspects of confidentiality, integrity, and access control. We will look at ways to protect data at rest, during transit, and in use. Then the security concerns arising out of cloud operating models will be examined. We will present seven recommended security practices to protect data in the cloud. Lastly, role of ML for cybersecurity will be investigated.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    15
    References
    0
    Citations
    NaN
    KQI
    []