The CCSK Guide provides reliable and accurate information to cloud security professionals. We hope individuals seeking the Certificate of Cloud Security Knowledge will find further information specifically targeted at their CCSK pursuit.
Please review the user agreement for the forums and testing services. CCSK Guide requires registration before use of the testing services. We hope you find this service useful, and good luck on the exam!
As mentioned in an earlier article, data protection is enforced b network devices, operating systems, or applications. Experts have argued that this approach is fundamentally flawed, especially given the trend towards de-perimeterization. Common issues The main goal of network devices, operating systems, applications, etc. is not security. Their inclusion as part of the enforcement mechanism [...]
Earning a positive return on investment (ROI) when adopting cloud services depends on carefully examining costs and benefits, to ensure that the migration will pay off. Sounds easy enough, right? Not everyone agrees. According to David Linthicum of InfoWorld, “The ability to determine the ROI of cloud computing is not a simple modeling exercise, as [...]
Developments in technology, particularly computers and the internet, have accelerated the generation and amassing of huge amounts of data. Data comes from two main sources: 1) The conversion of physical matter into electronic representations and 2) The creation of new data that was either not useful or not possible in the pre-digital world. The large [...]
Intellectual property lawyers voice their frustrations with cloud computing contracts, which sometimes state that service providers bear no liability should anything go wrong with their service. Should something go wrong, the customer takes full responsibility. According to Tanya Forsheit, founding partner of InfoLawGroup, “The cloud providers try to convey a take-it-or-leave-it attitude for their contracts, [...]
The Jericho Forum’s Cloud Cube Model points out the flaws in a perimeter-based approach to security. Since the introduction of the model, many products and companies have claimed to be “Jericho Compliant,” though it is not 100 percent clear what this means. The Jericho Forum has suggested that “collaboration oriented architecture” will come to replace [...]