1st Edition

Protecting Information Assets and IT Infrastructure in the Cloud

By Ravi Das, Preston de Guise Copyright 2019
    318 Pages
    by Auerbach Publications

    318 Pages
    by Auerbach Publications

    Today, many businesses and corporations are moving their on premises IT Infrastructure to the Cloud. There are numerous advantages to do doing so, including on-demand service, scalability, and fixed pricing. As a result, the Cloud has become a popular target of cyber-based attacks. Although an ISP is often charged with keeping virtual infrastructure secure, it is not safe to assume this. Back-up measures must be taken. This book explains how to guard against cyber-attacks by adding another layer of protection to the most valuable data in the Cloud: customer information and trade secrets.

    Introduction to the Cloud Computing Environment. Amazon Web Services. Threats and Risks to Cloud Infrastructure and Risk Mitigation Strategies. Cloud Data Protection. Conclusinons.


    Ravi Das has been an Information Technology professional for over 20 years. His vast experience includes software configuration management, database administration and IT security, with a specialization in biometrics. He has written and published two books through CRC Press and is currently working on his third. His accomplishments also include a comprehensive online training book for the CSA + exam.
    Ravi holds an M.S. in Agribusiness Economics (International Trade) from Southern Illinois University, and an MBA (MIS/Computer Science) from Bowling Green State University.
    He is a Business Development Specialist/Technical Writer for BN.Net, Inc., a leading technical communications firm based in Greater Chicago.

    Preston de Guise has been working with data recovery products for his entire career – designing, implementing and supporting solutions for governments, universities, and businesses ranging from SMEs to Fortune 500 companies. This broad exposure to industry verticals and business sizes has enabled Preston to understand not only the technical requirements of data recovery, but the management and procedural aspects too.