Optimizing Security of Cloud Computing within the DoD
Abstract:
What countermeasures best strengthen the confidentiality, integrity and availability CIA of the implementation of cloud computing within the DoD This question will be answered by analyzing threats and countermeasures within the context of the ten domains comprising the Certified Information System Security Professional CISSP Common Body of Knowledge CBK. The ten domains that will be used in this analysis include access control telecommunications and network security information security governance and risk management application security cryptography security architecture and design operations security business continuity planning and disaster planning legal regulations, compliance, and investigation and physical security. The results of this research provide a comprehensive guide for any DoD entity attempting to secure its cloud solution.