Completed
Transience
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Cloud Computing Security - Risks and Mitigation Strategies
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Topics
- 3 What is Cloud Computing?
- 4 Cloud Service Architectures as Layers
- 5 Cloud Service Models Abstraction Layers
- 6 Multi-Tenancy
- 7 Cloud Deployment Architectures
- 8 Data Loss
- 9 Downtimes
- 10 Phishing
- 11 Password Cracking
- 12 Botnets and Malware
- 13 Virtualization Security Features: Isolation
- 14 Virtualization Security Features: Snapshot
- 15 State Restore
- 16 Complexity
- 17 Hypervisor Security
- 18 Inter-VM Attacks
- 19 Scaling
- 20 Transience
- 21 Data Lifetime
- 22 Accountability
- 23 No Security Perimeter
- 24 Larger Attack Surface
- 25 New Side Channels
- 26 Lack of Auditability
- 27 Regulatory Compliance
- 28 Certifications
- 29 Data Security
- 30 Public Key Cryptography
- 31 An Analogy: Alice's Jewelry Store
- 32 Homomorphic Public-key Encryption
- 33 References