Cloud Policy

Cloud Policy
Author: Jennifer Holt
Publisher: MIT Press
Total Pages: 327
Release: 2024-09-17
Genre: Political Science
ISBN: 0262548062

How the United States’ regulation of broadband pipelines, digital platforms, and data—together understood as “the cloud”—has eroded civil liberties, democratic principles, and the foundation of the public interest over the past century. Cloud Policy is a policy history that chronicles how the past century of regulating media infrastructure in the United States has eroded global civil liberties as well as democratic principles and the foundation of the public interest. Jennifer Holt explores the long arc of regulating broadband pipelines, digital platforms, and the data centers that serve as the cloud’s storage facilities—an evolution that is connected to the development of nineteenth- and twentieth-century media and networks, including railroads, highways, telephony, radio, and television. In the process, Cloud Policy unearths the lasting inscriptions of policy written for an analog era and markets that no longer exist on the contemporary governance of digital cloud infrastructure. Cloud Policy brings together numerous perspectives that have thus far remained largely siloed in their respective fields of law, policy, economics, and media studies. The resulting interdisciplinary argument reveals a properly scaled view of the massive challenge facing policymakers today. Holt also addresses the evolving role of the state in the regulation of global cloud infrastructure and the growing influence of corporate gatekeepers and private sector self-governance. Cloud policy’s trajectory, as Holt explains, has enacted a transformation in the cultural valuation of infrastructure as civic good, turning it into a tool of commercial profit generation. Despite these current predicaments, the book’s historical lens ultimately helps the reader to envision restorative interventions and new forms of activism to create a more equitable future for infrastructure policy.


Ahead in the Cloud

Ahead in the Cloud
Author: Stephen Orban
Publisher: Createspace Independent Publishing Platform
Total Pages: 334
Release: 2018-03-27
Genre:
ISBN: 9781981924318

Cloud computing is the most significant technology development of our lifetimes. It has made countless new businesses possible and presents a massive opportunity for large enterprises to innovate like startups and retire decades of technical debt. But making the most of the cloud requires much more from enterprises than just a technology change. Stephen Orban led Dow Jones's journey toward digital agility as their CIO and now leads AWS's Enterprise Strategy function, where he helps leaders from the largest companies in the world transform their businesses. As he demonstrates in this book, enterprises must re-train their people, evolve their processes, and transform their cultures as they move to the cloud. By bringing together his experiences and those of a number of business leaders, Orban shines a light on what works, what doesn't, and how enterprises can transform themselves using the cloud.


Data Localization Laws and Policy

Data Localization Laws and Policy
Author: W. Kuan Hon
Publisher: Edward Elgar Publishing
Total Pages: 489
Release: 2017
Genre: Cloud computing
ISBN: 1786431971

Countries are increasingly introducing data localization laws, threatening digital globalization and inhibiting cloud computing adoption despite its acknowledged benefits. This multi-disciplinary book analyzes the EU restriction (including the Privacy Shield and General Data Protection Regulation) through a cloud computing lens, covering historical objectives and practical problems, showing why the focus should move from physical data location to effective jurisdiction over those controlling access to intelligible data, and control of access to data through security.


The Cloud Security Ecosystem

The Cloud Security Ecosystem
Author: Raymond Choo
Publisher: Syngress
Total Pages: 571
Release: 2015-06-01
Genre: Computers
ISBN: 0128017805

Drawing upon the expertise of world-renowned researchers and experts, The Cloud Security Ecosystem comprehensively discusses a range of cloud security topics from multi-disciplinary and international perspectives, aligning technical security implementations with the most recent developments in business, legal, and international environments. The book holistically discusses key research and policy advances in cloud security – putting technical and management issues together with an in-depth treaties on a multi-disciplinary and international subject. The book features contributions from key thought leaders and top researchers in the technical, legal, and business and management aspects of cloud security. The authors present the leading edge of cloud security research, covering the relationships between differing disciplines and discussing implementation and legal challenges in planning, executing, and using cloud security. - Presents the most current and leading-edge research on cloud security from a multi-disciplinary standpoint, featuring a panel of top experts in the field - Focuses on the technical, legal, and business management issues involved in implementing effective cloud security, including case examples - Covers key technical topics, including cloud trust protocols, cryptographic deployment and key management, mobile devices and BYOD security management, auditability and accountability, emergency and incident response, as well as cloud forensics - Includes coverage of management and legal issues such as cloud data governance, mitigation and liability of international cloud deployment, legal boundaries, risk management, cloud information security management plans, economics of cloud security, and standardization efforts


Privacy and Security for Cloud Computing

Privacy and Security for Cloud Computing
Author: Siani Pearson
Publisher: Springer Science & Business Media
Total Pages: 313
Release: 2012-08-28
Genre: Computers
ISBN: 144714189X

This book analyzes the latest advances in privacy, security and risk technologies within cloud environments. With contributions from leading experts, the text presents both a solid overview of the field and novel, cutting-edge research. A Glossary is also included at the end of the book. Topics and features: considers the various forensic challenges for legal access to data in a cloud computing environment; discusses privacy impact assessments for the cloud, and examines the use of cloud audits to attenuate cloud security problems; reviews conceptual issues, basic requirements and practical suggestions for provisioning dynamically configured access control services in the cloud; proposes scoped invariants as a primitive for analyzing a cloud server for its integrity properties; investigates the applicability of existing controls for mitigating information security risks to cloud computing environments; describes risk management for cloud computing from an enterprise perspective.


In Transit

In Transit
Author:
Publisher:
Total Pages: 584
Release: 1912
Genre: Bus lines
ISBN:

Vols. include the Proceedings of the association's 12th-27th annual conventions.


Government Cloud Procurement

Government Cloud Procurement
Author: Kevin McGillivray
Publisher: Cambridge University Press
Total Pages: 315
Release: 2021-12-16
Genre: Law
ISBN: 1108837670

An essential, in-depth analysis of the key legal issues that governments face when adopting cloud computing services.


Multi-Cloud Architecture and Governance

Multi-Cloud Architecture and Governance
Author: Jeroen Mulder
Publisher: Packt Publishing Ltd
Total Pages: 413
Release: 2020-12-11
Genre: Computers
ISBN: 1800201915

A comprehensive guide to architecting, managing, implementing, and controlling multi-cloud environments Key Features Deliver robust multi-cloud environments and improve your business productivity Stay in control of the cost, governance, development, security, and continuous improvement of your multi-cloud solution Integrate different solutions, principles, and practices into one multi-cloud foundation Book DescriptionMulti-cloud has emerged as one of the top cloud computing trends, with businesses wanting to reduce their reliance on only one vendor. But when organizations shift to multiple cloud services without a clear strategy, they may face certain difficulties, in terms of how to stay in control, how to keep all the different components secure, and how to execute the cross-cloud development of applications. This book combines best practices from different cloud adoption frameworks to help you find solutions to these problems. With step-by-step explanations of essential concepts and practical examples, you’ll begin by planning the foundation, creating the architecture, designing the governance model, and implementing tools, processes, and technologies to manage multi-cloud environments. You’ll then discover how to design workload environments using different cloud propositions, understand how to optimize the use of these cloud technologies, and automate and monitor the environments. As you advance, you’ll delve into multi-cloud governance, defining clear demarcation models and management processes. Finally, you’ll learn about managing identities in multi-cloud: who’s doing what, why, when, and where. By the end of this book, you’ll be able to create, implement, and manage multi-cloud architectures with confidenceWhat you will learn Get to grips with the core functions of multiple cloud platforms Deploy, automate, and secure different cloud solutions Design network strategy and get to grips with identity and access management for multi-cloud Design a landing zone spanning multiple cloud platforms Use automation, monitoring, and management tools for multi-cloud Understand multi-cloud management with the principles of BaseOps, FinOps, SecOps, and DevOps Define multi-cloud security policies and use cloud security tools Test, integrate, deploy, and release using multi-cloud CI/CD pipelines Who this book is for This book is for architects and lead engineers involved in architecting multi-cloud environments, with a focus on getting governance right to stay in control of developments in multi-cloud. Basic knowledge of different cloud platforms (Azure, AWS, GCP, VMWare, and OpenStack) and understanding of IT governance is necessary.


Research Anthology on Artificial Intelligence Applications in Security

Research Anthology on Artificial Intelligence Applications in Security
Author: Management Association, Information Resources
Publisher: IGI Global
Total Pages: 2253
Release: 2020-11-27
Genre: Computers
ISBN: 1799877485

As industries are rapidly being digitalized and information is being more heavily stored and transmitted online, the security of information has become a top priority in securing the use of online networks as a safe and effective platform. With the vast and diverse potential of artificial intelligence (AI) applications, it has become easier than ever to identify cyber vulnerabilities, potential threats, and the identification of solutions to these unique problems. The latest tools and technologies for AI applications have untapped potential that conventional systems and human security systems cannot meet, leading AI to be a frontrunner in the fight against malware, cyber-attacks, and various security issues. However, even with the tremendous progress AI has made within the sphere of security, it’s important to understand the impacts, implications, and critical issues and challenges of AI applications along with the many benefits and emerging trends in this essential field of security-based research. Research Anthology on Artificial Intelligence Applications in Security seeks to address the fundamental advancements and technologies being used in AI applications for the security of digital data and information. The included chapters cover a wide range of topics related to AI in security stemming from the development and design of these applications, the latest tools and technologies, as well as the utilization of AI and what challenges and impacts have been discovered along the way. This resource work is a critical exploration of the latest research on security and an overview of how AI has impacted the field and will continue to advance as an essential tool for security, safety, and privacy online. This book is ideally intended for cyber security analysts, computer engineers, IT specialists, practitioners, stakeholders, researchers, academicians, and students interested in AI applications in the realm of security research.