Abstract
Based on the results of this thesis, recommended actions for Cloud Computing users and the four phases of their IT risk management process. These advises are presented in sections 5.1 to 5.4. Additionally, we provide recommended actions for providers of Cloud Computing services in section 5.5.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Fachmedien Wiesbaden
About this chapter
Cite this chapter
Ackermann, T. (2013). Recommended Actions. In: IT Security Risk Management. Springer Gabler, Wiesbaden. https://doi.org/10.1007/978-3-658-01115-4_5
Download citation
DOI: https://doi.org/10.1007/978-3-658-01115-4_5
Publisher Name: Springer Gabler, Wiesbaden
Print ISBN: 978-3-658-01114-7
Online ISBN: 978-3-658-01115-4
eBook Packages: Business and EconomicsBusiness and Management (R0)