|Join hundreds of InfoSec professionals at our upcoming |
[Global AppSec Amsterdam, September 23-27]
Cloud-10 Service and Data Integration
R6: Service and Data Integration
Companies that are planning to adopt cloud must make sure that their proprietary data is adequately protected as it traverses through the internet between the end user and the cloud data center(s). Cloud computing models increase the risks associated with interception of data in transit, eventhough these risks are not unique to cloud. Cloud providers must ensure that they use SSL and/or tighter encryption protocols to secure data in transit
References: Babcock, C. (2009, September). Hybrid Clouds. InformationWeek,(1240), 15-19. Retrieved December 20, 2009, from ABI/INFORM Global. (Document ID: 1865633581). Byrne, T. (2009, April). Clouding Over. EContent, 32(3), 37. Retrieved December 20, 2009, from ABI/INFORM Global. (Document ID: 1675328451). de Assuncao, M. D., di Costanzo, A., & Buyya, R. (2009). Evaluating the cost-benefit of using cloud computing to extend the capacity of clusters. Paper presented at the HPDC '09: Proceedings of the 18th ACM International Symposium on High Performance Distributed Computing, Garching, Germany. 141-150. Retrieved from http://doi.acm.org.library.capella.edu/10.1145/1551609.1551635 Hoover, J. (2009, April). GE Puts The Cloud Model To The Test. InformationWeek,(1226), 32-33. Retrieved December 20, 2009, from ABI/INFORM Global. (Document ID: 1682898981).