top of page

The Essentials of Cloud Hosting

As cloud computing becomes more common, it is useful to learn what it is about and how to

benfit from it. Where it should be applied and also where not to apply it.

How to assess enterprise governance, risk assessment, and manage ever larger cloud

computing environments.

We shall begin by defining cloud computing, then describing the various service delivery

models of a cloud computing architecture, and the ways in which clouds can be deployed,

followed by a deeper review of the security and privacy issues related to cloud computing

environments.

We shall examine cloud computing models, look into the threat model and security issues

related to data and computation outsourcing, and explore practical applications of secure

cloud computing. Using the confidentiality, integrity, and availability of data model we will

examine the threats and security implications to effect poorly established and maintained

cloud computing environment.

bottom of page