\select@language {ngerman}
\contentsline {section}{\numberline {1}Einleitung \it \bfseries \relax \fontsize {6}{7}\selectfont \par@update SP}{1}{section.1}
\contentsline {subsection}{\numberline {1.1}Motivation}{1}{subsection.1.1}
\contentsline {subsection}{\numberline {1.2}Aufbau}{2}{subsection.1.2}
\contentsline {section}{\numberline {2}Einf\IeC {\"u}hrung: Cloud Computing \it \bfseries \relax \fontsize {6}{7}\selectfont \par@update SP}{2}{section.2}
\contentsline {subsection}{\numberline {2.1}Definition \& Eigenschaften}{2}{subsection.2.1}
\contentsline {subsection}{\numberline {2.2}R\IeC {\"u}ckbesinnung auf alte Werte}{4}{subsection.2.2}
\contentsline {subsection}{\numberline {2.3}Eckpfeiler des Cloud Computing}{6}{subsection.2.3}
\contentsline {subsection}{\numberline {2.4}Service Modelle}{8}{subsection.2.4}
\contentsline {subsection}{\numberline {2.5}Deployment Modelle}{10}{subsection.2.5}
\contentsline {section}{\numberline {3}Risiko Management \it \bfseries \relax \fontsize {6}{7}\selectfont \par@update JR}{12}{section.3}
\contentsline {subsection}{\numberline {3.1}Beurteilen von Risiken}{13}{subsection.3.1}
\contentsline {subsection}{\numberline {3.2}Sicherheitskontrollma\IeC {\ss }nahmen}{15}{subsection.3.2}
\contentsline {section}{\numberline {4}Die Cloud und ihre Risiken \it \bfseries \relax \fontsize {6}{7}\selectfont \par@update SP}{18}{section.4}
\contentsline {subsection}{\numberline {4.1}\IeC {\"U}berblick}{18}{subsection.4.1}
\contentsline {subsection}{\numberline {4.2}Virtualisierung}{20}{subsection.4.2}
\contentsline {subsection}{\numberline {4.3}Provisioning \& Deprovisioning}{22}{subsection.4.3}
\contentsline {section}{\numberline {5}Daten Sicherheit \it \bfseries \relax \fontsize {6}{7}\selectfont \par@update JR}{24}{section.5}
\contentsline {subsection}{\numberline {5.1}Sicherheitsbedenken der Cloudnutzer}{24}{subsection.5.1}
\contentsline {subsection}{\numberline {5.2}Organisatorische Verantwortlichkeiten - Eigent"umer und Verwalter}{26}{subsection.5.2}
\contentsline {subsection}{\numberline {5.3}Data at Rest}{26}{subsection.5.3}
\contentsline {subsection}{\numberline {5.4}Data in Motion}{27}{subsection.5.4}
\contentsline {subsection}{\numberline {5.5}Datenverschl"usselung}{28}{subsection.5.5}
\contentsline {subsubsection}{\numberline {5.5.1}"Uberblick Kryptographischer Techniken}{29}{subsubsection.5.5.1}
\contentsline {paragraph}{Symmetrische Verschl\IeC {\"u}sselung}{29}{section*.2}
\contentsline {paragraph}{Asymmetrische Verschl\IeC {\"u}sselung}{29}{section*.3}
\contentsline {subsubsection}{\numberline {5.5.2}Fehler in Bezug auf Datenverschl"usselung}{30}{subsubsection.5.5.2}
\contentsline {subsection}{\numberline {5.6}Authentifikation und Identit"aten}{31}{subsection.5.6}
\contentsline {subsection}{\numberline {5.7}Verchl"usselung f"ur Data in Motion}{32}{subsection.5.7}
\contentsline {subsection}{\numberline {5.8}Verschl"usselung f"ur Data at Rest}{33}{subsection.5.8}
\contentsline {subsection}{\numberline {5.9}Cloud Lock-In}{34}{subsection.5.9}
\contentsline {paragraph}{Metadaten}{35}{section*.4}
\contentsline {paragraph}{Verhindern des Cloud Lock-In}{35}{section*.5}
\contentsline {subsection}{\numberline {5.10}Zusammenfassung}{37}{subsection.5.10}
\contentsline {section}{\numberline {6}Sichere Cloud Architekturen \it \bfseries \relax \fontsize {6}{7}\selectfont \par@update SP}{39}{section.6}
\contentsline {subsection}{\numberline {6.1}Anforderungen an die Architektur}{39}{subsection.6.1}
\contentsline {subsection}{\numberline {6.2}Security Monitoring}{40}{subsection.6.2}
\contentsline {subsection}{\numberline {6.3}Wichtige Sicherheitskomponenten \& Security Pattern}{40}{subsection.6.3}
\contentsline {subsection}{\numberline {6.4}Sicherheits--Architektur am Beispiel}{40}{subsection.6.4}
\contentsline {section}{Literatur}{41}{subsection.6.4}
