Cloud Computing Security - Risks and Mitigation Strategies

Cloud Computing Security - Risks and Mitigation Strategies

via YouTube Direct link

Inter-VM Attacks

18 of 33

18 of 33

Inter-VM Attacks

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Cloud Computing Security - Risks and Mitigation Strategies

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Topics
  3. 3 What is Cloud Computing?
  4. 4 Cloud Service Architectures as Layers
  5. 5 Cloud Service Models Abstraction Layers
  6. 6 Multi-Tenancy
  7. 7 Cloud Deployment Architectures
  8. 8 Data Loss
  9. 9 Downtimes
  10. 10 Phishing
  11. 11 Password Cracking
  12. 12 Botnets and Malware
  13. 13 Virtualization Security Features: Isolation
  14. 14 Virtualization Security Features: Snapshot
  15. 15 State Restore
  16. 16 Complexity
  17. 17 Hypervisor Security
  18. 18 Inter-VM Attacks
  19. 19 Scaling
  20. 20 Transience
  21. 21 Data Lifetime
  22. 22 Accountability
  23. 23 No Security Perimeter
  24. 24 Larger Attack Surface
  25. 25 New Side Channels
  26. 26 Lack of Auditability
  27. 27 Regulatory Compliance
  28. 28 Certifications
  29. 29 Data Security
  30. 30 Public Key Cryptography
  31. 31 An Analogy: Alice's Jewelry Store
  32. 32 Homomorphic Public-key Encryption
  33. 33 References

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.