information security

(redirected from cloud computing security)
Also found in: Encyclopedia.

information security

The protection of information and information systems against unauthorized access or modification of information, whether in storage, processing, or transit, and against denial of service to authorized users. Information security includes those measures necessary to detect, document, and counter such threats. Information security is composed of computer security and communications security. Also called INFOSEC. See also communications security; computer security; information security; information system.
Dictionary of Military and Associated Terms. US Department of Defense 2005.
References in periodicals archive ?
Lio, "A cloud computing security solution based on fully homomorphic encryption," in Proc.
He also recently served as CRO at Comodo, a cyber security provider, where he managed the sales team and successfully launched a new line of end point protection and cloud computing security products.
The combined patents along with the other ZitoVault patents will further enable ZitoVault to provide global virtual distributed cloud computing security frameworks.
Parul, Cloud computing security issues: An analysis, Institute of Electrical and Electronics Engineers Inc., 2016.
Cloud computing security is a unique situation of lasting risks, because its implementation requires millions of dollars in infrastructure and security but it is not exempt from security risks, due to different types of attack.
2nd ACM Workshop Cloud Computing Security (CCSW'10), pp: 3142.
"Cloud computing security processes should be designed to
First, the DoD Cloud Computing Security Requirements Guide applies when a cloud solution is being used to process data on the department's behalf.
Some of threats to cloud computing security are discussed here:
Cloud Computing Security: Foundations and Challenges
The DoD Cloud Computing Security Requirements Guide (CC SRG) outlines the security model by which DoD will leverage cloud computing along with the security controls and requirements necessary for using cloud-based solutions.