Cookies must be enabled to use this web application.

To allow this site to use cookies, use the steps that apply to your browser below. If your browser is not listed below, or if you have any questions regarding this site, please contact us.

Microsoft Internet Explorer
  • 1. Select "Internet Options" from the Tools menu.
  • 2. Click on the "Privacy" tab.
  • 3. Click the "Default" button.
  • 4. Click "OK" to save changes.
Chrome Chrome
  • 1. Click the "Spanner" icon in the top right of the browser.
  • 2. Click Options and change to the "Under the Hood" tab.
  • 3. Scroll down until you see "Cookie settings:".
  • 4. Set this to "Allow all cookies".
Firefox Firefox
  • 1. Go to the "Tools" menu and select "Options".
  • 2. Click the "Privacy" icon on the top of the window.
  • 3. Click on the "Cookies" tab.
  • 4. Check the box corresponding to "Allow sites to set Cookies.
  • 5. Click "OK" to save changes.
Opera Opera
  • 1. Click on the "Tools" menu and then click Preferences.
  • 2. Change to the Advanced tab, and to the cookie section.
  • 3. Select "Accept cookies only from the site I visit" or "Accept cookies".
  • 4. Ensure "Delete new cookies when exiting Opera" is not ticked.
  • 5. Click OK.
Netscape and Mozilla Suite Netscape and Mozilla Suite
  • 1. Select "Preferences" from the Edit menu.
  • 2. Click on the arrow next to "Privacy & Security".
  • 3. Under "Privacy & Security" select "Cookies".
  • 4. Select "Enable all cookies".
  • 5. Click "OK" to save changes.
Safari Safari
  • 1. Click on the "Cog" icon in Safari.
  • 2. Click Preferences.
  • 3. Change to the Security tab.
  • 4. Select "Only from sites I visit" or "Allow".
  • 5. Close the dialog using the cross.
Book Image Not Available
Book details
  • Genre:COMPUTERS
  • SubGenre:Internet / Security
  • Language:English
  • Pages:80
  • eBook ISBN:9781618429971

Cloud Computing

Security Compliance and Governance

by Russell Ballantine

Book Image Not Available
Overview
A concise and useful analysis of the legal issues facing both cloud providers and their customers.
Description
The technical awareness of the legal system with regards to cloud technologies is increasing. The courts are beginning to take a useful, pragmatic and well balanced approach to evaluating the fairness and effectiveness of service provider T&C’s in meeting customer information security requirements and obligations. The concept of what is reasonable is central to this balance. It is also nothing new. This after all is what corporate diligence is all about. However, achieving this reasonableness requires real understanding of well known terms such as: vulnerability, threat, risk and exposure within a new technical landscape. A common question asked by senior management when faced with a technical issue of security is “well what really is the risk?” Unfortunately the expertise of most security professionals often doesn’t extend to the legal environment where these risks eventually manifest themselves. The difficulty in answering the question arises because a big part of the answer lies with a company’s ability to contract effectively with its customers. For a service provider, poor governance of cloud security issues equates to poor corporate diligence and a tangible risk to business reputation.
About the author
Russell Ballantine has worked in the Internet and information security field for over 15 years. Previously having worked for British Telecom, Thus Plc and Motorola he now works for Cable and Wireless WorldWide as a senior Technical Specialist. He is a certified CISSP and has an LLM in IT and Telecoms Law from the University of Strathclyde, Glasgow.
Thanks for submitting a review!

Your review will need to be approved by the author before being posted.

See Inside
Session Expiration WarningYour session is due to expire.

Your online session is due to expire shortly.
Would you like to extend your session and remain logged in?

Session Expired

Your session has expired.We're sorry, but your online session has expired.
Please log back into your account to continue.