Corpus ID: 214714411

Cybersecurity in the AWS Cloud

@article{Soltys2020CybersecurityIT,
  title={Cybersecurity in the AWS Cloud},
  author={Michael Soltys},
  journal={ArXiv},
  year={2020},
  volume={abs/2003.12905}
}
This paper re-examines the content of a standard advanced course in Cybersecurity from the perspective of Cloud Computing. More precisely, we review the core concepts of Cybersecurity, as presented in a senior undergraduate or graduate class, in light of the Amazon Web Services (AWS) cloud. 
WordPress on AWS: a Communication Framework
TLDR
Together, AWS and WordPress offer an attractive, effective and inexpensive way for companies, both large and small, to maintain their presence on the web. Expand

References

SHOWING 1-10 OF 81 REFERENCES
Cloud Security
TLDR
This special issue on cloud security aims to address the importance of protecting and securing cloud platforms, infrastructures, hosted applications, and data storage. Expand
Cloudifying the Curriculum with AWS
TLDR
This paper examines simple ways to accomplish curriculum cloudification using Amazon Web Services (AWS), for Computer Science and other disciplines such as Business, Communication and Mathematics. Expand
Software aspects of strategic defense systems
  • D. Parnas
  • Computer Science, Engineering
  • CACM
  • 1985
A former member of the SDIO Panel on Computing in Support of Battle Management explains why he believes the “Star Wars” effort will not achieve its stated goals.
Reaching for the "cloud"
Cloud computing is an emerging new computing paradigm for delivering computing services. The approach relies on a number of existing technologies e.g., the Internet, virtualization and grid computi...
Security Best Practices
The cloud is changing the way our businesses operate. Business owners, employees, and contractors work anywhere in the world, work at any time of the day, and use many types of devices to accessExpand
The case for disappearing cyber security
A proposal for keeping cyber security both out of sight and out of mind for end users.
Kubernetes on AWS
TLDR
This chapter spins up a basic cluster without configuration ofubernetes, a cluster manager for Docker (and rkt) containers. Expand
Reaching for the "cloud": How SMEs can manage
  • N. Sultan
  • Computer Science
  • Int. J. Inf. Manag.
  • 2011
TLDR
It is argued in this article that cloud computing is likely to prove commercially viable for many small and medium enterprises (SMEs) due to its flexibility and pay-as-you-go cost structure, particularly in the current climate of economic difficulties. Expand
Fundamentals of Cryptography
This chapter discusses how information security is the discipline that provides protection of information from intrusion and accidental or incidental loss. It also provides a framework for theExpand
What is Security
The chapter presents a fundamental definition of Risk. The chapter discusses the function of the security programs in theory. First, in the real world, it is important to remember that not all lossesExpand
...
1
2
3
4
5
...