cloud computing dummies phần 7

Nếu các cá nhân trong công ty thực sự giống như sản phẩm, bạn có thể thêm các gói cho đến khi bạn hỗ trợ tất cả 50 người sử này không có ý nghĩa gì về mô hình doanh thu cho các nhà cung cấp và làm thế nào các khách hàng nên suy nghĩ về cân nhắc chi phí | 176 Part IV Managing the Cloud a company building or accesses corporate information either from within the company s perimeters or from any external location. A company planning to secure its IT environment will generally focus on the broad range of potential vulnerabilities to its data center as well as ways to safeguard sensitive corporate customer and partner information wherever it is located. A company s software applications may include lots of built-in application and data level protections such as authentication authorization and encryption but there are many situations where these protections aren t enough. The following section provides an overview of the types of security risks that companies should consider in any IT environment including the cloud. Even when cloud operators have good security physical network OS application infrastructure it is your company s responsibility to protect and secure your applications and information. Security services at both the application and the infrastructure level must be a top consideration for organizations. Given the importance of security in the cloud environment you might assume that a major cloud services provider would have a set of comprehensive service level agreements for its customers. In fact many of the standard agreements are intended to protect the service provider not the customer. Therefore a company really must understand the contract. The risks are lower if you re using storage on a temporary basis than if you re using a cloud service as a replacement for a critical service that touches your customers. Currently the IT industry faces a problem Security approaches including perimeter security are becoming less effective. To understand why you must know how security threats arise. About 70 percent of security breaches are caused by insiders or by people getting help from insiders . Insiders rarely get caught. The cloud environment can have some of the same .

Bấm vào đây để xem trước nội dung
TỪ KHÓA LIÊN QUAN
TÀI LIỆU MỚI ĐĂNG
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.