The Essentials of Cloud Hosting
As cloud computing becomes more common, it is useful to learn what it is about and how to
benfit from it. Where it should be applied and also where not to apply it.
How to assess enterprise governance, risk assessment, and manage ever larger cloud
computing environments.
We shall begin by defining cloud computing, then describing the various service delivery
models of a cloud computing architecture, and the ways in which clouds can be deployed,
followed by a deeper review of the security and privacy issues related to cloud computing
environments.
We shall examine cloud computing models, look into the threat model and security issues
related to data and computation outsourcing, and explore practical applications of secure
cloud computing. Using the confidentiality, integrity, and availability of data model we will
examine the threats and security implications to effect poorly established and maintained
cloud computing environment.