Wednesday
Sep112013

Sept/Oct 2013

Securing The Cloud

Download Entire September/October 2013 Issue (PDF 13.5MB)

View Online Digital Flipbook Version (Requires Adobe Flash)

Table of Contents
(click below to download individual articles from the September/October 2013 issue)

From the Sponsor
by Roberta Stempfley
Download Article (PDF)

What Does the Future Hold for Cloud Computing?
by David Zage, Dustin Franklin, and Vincent Urias
The topic of cloud computing continues to generate significant interest among information technology and government decision makers even as they hesitate to adopt cloud solutions due to security concerns.
Download Article (PDF)

The Art of Cyber Bank Robbery: Stealing Your Money Through Insidious Attacks
by Aditya K. Sood and Richard J. Enbody
Cyber criminals are using advanced attacks to exploit online banking systems and services to covertly steal money.
Download Article (PDF)

Digital Forensics in the Cloud
by Shams Zawoad and Ragib Hasan
Today's cloud computing architectures often lack support for computer forensic investigations.
Download Article (PDF)

User-Centric Identity Management: A Future Vision for IdM
by Marc Novakouski
Identity management is the complex and constantly evolving practice of identifying individuals and controlling their access to a network and connected resources.
Download Article (PDF)

Building a Resilient Service-Oriented Architecture Environment
by Quyen L. Nguyen and Arun Sood
Using Self-Cleansing Intrusion Tolerance to build an SOA environment that is resilient in the face of hostile attacks.
Download Article (PDF)

Applying Software Assurance Concepts to the Cloud
by Randall Brooks and John Whited
Developers must understand their attack surface and threat environment to ensure that they have focused on “building security into” their applications.
Download Article (PDF)

Cloud Shifts the Burden of Security to Development
by Arthur Hicken
Engineers are extremely well poised to perform tasks critical for securing applications if certain key obstacles are overcome.
Download Article (PDF)

The Active Shooter System
by LTC Phillip G. Burns
The proposed Logical Active Shooter System is a referential architecture that guides the securing of data as DoD migrates to a Joint Information Environment.
Download Article (PDF)

BackTalk
by David A. Cook,
Download Article (PDF)