Optimizing security of cloud computing within the DoD

Loading...
Thumbnail Image
Authors
Antedomenico, Noemi
Subjects
Advisors
Denning, Dorothy E.
Lewis, Ted
Michael, James Bret
Date of Issue
2010-12
Date
Publisher
Monterey, California. Naval Postgraduate School
Language
Abstract
What countermeasures best strengthen the confidentiality, integrity and availability (CIA) of the implementation of cloud computing within the DoD? This question will be answered by analyzing threats and countermeasures within the context of the ten domains comprising the Certified Information System Security Professional (CISSP) Common Body of Knowledge (CBK). The ten domains that will be used in this analysis include access control; telecommunications and network security; information security governance and risk management; application security; cryptography; security architecture and design; operations security; business continuity planning and disaster planning; legal regulations, compliance, and investigation; and physical security. The results of this research provide a comprehensive guide for any DoD entity attempting to secure its cloud solution.
Type
Thesis
Description
Series/Report No
Department
Security Studies
Organization
Naval Postgraduate School (U.S.)
Identifiers
NPS Report Number
Sponsors
Funder
Format
xiv, 91 p.
Citation
Distribution Statement
Approved for public release; distribution is unlimited.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Collections