Optimizing security of cloud computing within the DoD

Doctoral thesis OPEN
Antedomenico, Noemi (2010)
  • Publisher: Monterey, California. Naval Postgraduate School
  • Subject: Risk management | Computer security | Cryptography | Cloud computing
    acm: ComputingMilieux_LEGALASPECTSOFCOMPUTING

Approved for public release; distribution is unlimited What countermeasures best strengthen the confidentiality, integrity and availability (CIA) of the implementation of cloud computing within the DoD? This question will be answered by analyzing threats and countermeasures within the context of the ten domains comprising the Certified Information System Security Professional (CISSP) Common Body of Knowledge (CBK). The ten domains that will be used in this analysis include access control; telecommunications and network security; information security governance and risk management; application security; cryptography; security architecture and design; operations security; business continuity planning and disaster planning; legal regulations, compliance, and investigation; and physical security. The results of this research provide a comprehensive guide for any DoD entity attempting to secure its cloud solution. US Air Force (USAF) author
Share - Bookmark