Page 112 - CISSO_Prep_ Guide
P. 112

Cloud Computing

            Over the past few years, a lot of organizations have moved to
            cloud computing as a model for data processing and storage. The
            use of a cloud-based service such as Software as a Service (SaaS)
            is an excellent way to support business requirements without the
            need  to  install  and  maintain  applications  on  every  desktop.
            Instead, all an employee needs to be able to access corporate data,
            and application functionality is a web connection and a browser.
            The  hosting  company  does  all  application  patches,  stores,  and
            processes data, generates reports, and provides protection for the
            data. As with any outsourced service, the need to ensure that data
            is being protected is available when required, and can be retrieved
            in case of termination of the contract.

            Other  cloud-based  services  such  as  Storage  on  Demand,
            Infrastructure  as  a  Service,  Platform  as  a  Service  and  email
            hosting are all popular since it removes the requirement for the
            outsourcing organization to manage, acquire and maintain their
            own IT infrastructure. The security professional must ensure that
            the network connections to the hosting company are secure and
            that the hosting company has backups and disaster recovery plans.



            Mobile Computing
            Many services provided by organizations today are moving onto
            mobile  platforms  such  as  online  banking  and  email.  These
            services  are  run  using  mobile  applications  and  application
            program interfaces (APIs), often on top of legacy systems and
            more traditional information systems. This requires attention to
            the coding practices of the organization and the choice of APIs
            used. Using an insecure or older API may present an attack vector
   107   108   109   110   111   112   113   114   115   116   117