dc.contributor.author |
Carroll, M
|
|
dc.contributor.author |
Van der Merwe, A
|
|
dc.contributor.author |
Kotzé, Paula
|
|
dc.date.accessioned |
2011-09-29T10:03:17Z |
|
dc.date.available |
2011-09-29T10:03:17Z |
|
dc.date.issued |
2011-08 |
|
dc.identifier.citation |
Carroll, M, Van der Merwe, A, and Kotzé, P. 2011. Secure cloud computing: benefits, risks and controls. ISSA 2011. Hayatt Regency Hotel, Rosebank, 15-17, August 2011, pp 9 |
en_US |
dc.identifier.isbn |
978-1-4577-1482-5 |
|
dc.identifier.uri |
http://hdl.handle.net/10204/5184
|
|
dc.description |
ISSA 2011. Hayatt Regency Hotel, Rosebank, 15-17, August 2011 |
en_US |
dc.description.abstract |
Cloud computing presents a new model for IT service delivery and it typically involves over-a-network, on-demand, self-service access, which is dynamically scalable and elastic, utilising pools of often virtualized resources. Through these features, cloud computing has the potential to improve the way businesses and IT operate by offering fast start-up, flexibility, scalability and cost efficiency. Even though cloud computing provides compelling benefits and cost-effective options for IT hosting and expansion, new risks and opportunities for security exploits are introduced. Standards, policies and controls are therefore of the essence to assist management in protecting and safeguarding systems and data. Management should understand and analyse cloud computing risks in order to protect systems and data from security exploits. The focus of this paper is on mitigation for cloud computing security risks as a fundamental step towards ensuring secure cloud computing environments |
en_US |
dc.language.iso |
en |
en_US |
dc.relation.ispartofseries |
Workflow request;7129 |
|
dc.subject |
Cloud computing |
en_US |
dc.subject |
IT service delivery |
en_US |
dc.subject |
ISSA 2011 |
en_US |
dc.subject |
Information security |
en_US |
dc.subject |
Information technology |
en_US |
dc.title |
Secure cloud computing: benefits, risks and controls |
en_US |
dc.type |
Article |
|
dc.identifier.apacitation |
Carroll, M., Van der Merwe, A., & Kotzé, P. (2011). Secure cloud computing: benefits, risks and controls. http://hdl.handle.net/10204/5184 |
en_ZA |
dc.identifier.chicagocitation |
Carroll, M, A Van der Merwe, and Paula Kotzé "Secure cloud computing: benefits, risks and controls." (2011) http://hdl.handle.net/10204/5184 |
en_ZA |
dc.identifier.vancouvercitation |
Carroll M, Van der Merwe A, Kotzé P. Secure cloud computing: benefits, risks and controls. 2011; http://hdl.handle.net/10204/5184. |
en_ZA |
dc.identifier.ris |
TY - Article
AU - Carroll, M
AU - Van der Merwe, A
AU - Kotzé, Paula
AB - Cloud computing presents a new model for IT service delivery and it typically involves over-a-network, on-demand, self-service access, which is dynamically scalable and elastic, utilising pools of often virtualized resources. Through these features, cloud computing has the potential to improve the way businesses and IT operate by offering fast start-up, flexibility, scalability and cost efficiency. Even though cloud computing provides compelling benefits and cost-effective options for IT hosting and expansion, new risks and opportunities for security exploits are introduced. Standards, policies and controls are therefore of the essence to assist management in protecting and safeguarding systems and data. Management should understand and analyse cloud computing risks in order to protect systems and data from security exploits. The focus of this paper is on mitigation for cloud computing security risks as a fundamental step towards ensuring secure cloud computing environments
DA - 2011-08
DB - ResearchSpace
DP - CSIR
KW - Cloud computing
KW - IT service delivery
KW - ISSA 2011
KW - Information security
KW - Information technology
LK - https://researchspace.csir.co.za
PY - 2011
SM - 978-1-4577-1482-5
T1 - Secure cloud computing: benefits, risks and controls
TI - Secure cloud computing: benefits, risks and controls
UR - http://hdl.handle.net/10204/5184
ER -
|
en_ZA |