SlideShare a Scribd company logo
1 of 2
Precisely why is ccsp useful for cloud
computing?
The particular Certified Cloud Safety Professional (CCSP) qualification ensures that impair
security specialists have got the needed knowledge, abilities, and abilities in cloud safety
design, implementation, structure, operations, controls, in addition to compliance with
regulating frameworks. A CCSP implements information safety expertise to some impair
computing environment in addition to demonstrates competence within cloud security
structure, design, progress, in addition to service orchestration. This particular professional
capability is usually validated against the globally acknowledged physique of knowledge.
The particular CCSP is a great outstanding credential that will complements and builds up
upon existing qualifications and academic applications, including (ISC)²’s Qualified
Information Systems Safety Professional (CISSP) in addition to CSA’s Certificate associated
with Cloud Security Information (CCSK).
Understand Cloud Computing Concepts
Cloud Computing Definitions
Cloud Computing Roles (e.g., cloud service customer, cloud service provider, cloud service
partner, cloud service broker)
Key Cloud Computing Characteristics (e.g., on-demand self-service, broad network access,
multi-tenancy, rapid elasticity and scalability, resource pooling, measured service)
Building Block Technologies (e.g., virtualization, storage, networking, databases,
orchestration)
Describe Cloud Reference Architecture
Cloud Computing Activities
Cloud Service Capabilities (e.g., application capability types, platform capability types,
infrastructure capability types)
Then, Cloud Service Categories, Infrastructure as a Service (IaaS), Platform as a Service
(PaaS))
Cloud Deployment Models (e.g., public, private, hybrid, community)
Cloud Shared Considerations (e.g., interoperability, portability, reversibility, availability,
security, privacy, resiliency, performance, governance, maintenance and versioning, service
levels and Service Level Agreements (SLA), auditability, regulatory)
Impact of Related Technologies (e.g., machine learning, artificial intelligence, blockchain,
Internet of Things (IoT), containers, quantum computing)
Understand Security Concepts Relevant to Cloud
Computing
Cryptography and Key Management
Access Control
Data and Media Sanitization (e.g., overwriting, cryptographic erase)
Network Security (e.g., network security groups)
Virtualization Security (e.g., hypervisor security, container security)
Common Threats
Understand the Design Principles of Secure Cloud
Computing
Cloud Secure Data Lifecycle
Cloud-based Disaster Recovery (DR) and Business Continuity (BC) planning
Cost-Benefit Analysis
Functional Security Requirements
Security Considerations for Different Cloud Categories), Infrastructure as a Service (IaaS),
Platform as a Service (PaaS)) (e.g., Software as a Service (SaaS), Infrastructure as a Service
(IaaS), Platform as a Service (PaaS))

More Related Content

What's hot

A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
 
Cloud computing 9 cloud deployment models and security concerns
Cloud computing 9 cloud deployment models and security concernsCloud computing 9 cloud deployment models and security concerns
Cloud computing 9 cloud deployment models and security concernsVaibhav Khanna
 
Coding serbia meetup 29.09.2015.
Coding serbia meetup 29.09.2015.Coding serbia meetup 29.09.2015.
Coding serbia meetup 29.09.2015.Matija Gobec
 
Making secret sharing based cloud storage usable
Making secret sharing based  cloud storage usableMaking secret sharing based  cloud storage usable
Making secret sharing based cloud storage usableYing wei (Joe) Chou
 
Design of a small scale and failure-resistent iaa s cloud using openstack
Design of a small scale and failure-resistent iaa s cloud using openstackDesign of a small scale and failure-resistent iaa s cloud using openstack
Design of a small scale and failure-resistent iaa s cloud using openstackYing wei (Joe) Chou
 

What's hot (7)

Webair-Facilities
Webair-FacilitiesWebair-Facilities
Webair-Facilities
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
 
Cloud computing 9 cloud deployment models and security concerns
Cloud computing 9 cloud deployment models and security concernsCloud computing 9 cloud deployment models and security concerns
Cloud computing 9 cloud deployment models and security concerns
 
Coding serbia meetup 29.09.2015.
Coding serbia meetup 29.09.2015.Coding serbia meetup 29.09.2015.
Coding serbia meetup 29.09.2015.
 
Making secret sharing based cloud storage usable
Making secret sharing based  cloud storage usableMaking secret sharing based  cloud storage usable
Making secret sharing based cloud storage usable
 
Design of a small scale and failure-resistent iaa s cloud using openstack
Design of a small scale and failure-resistent iaa s cloud using openstackDesign of a small scale and failure-resistent iaa s cloud using openstack
Design of a small scale and failure-resistent iaa s cloud using openstack
 
A safety design of
A safety design ofA safety design of
A safety design of
 

Similar to Precisely why is ccsp useful for cloud computing (vocal media)

Explore the comprehensive CISSP Certification Course syllabus with InfosecTra...
Explore the comprehensive CISSP Certification Course syllabus with InfosecTra...Explore the comprehensive CISSP Certification Course syllabus with InfosecTra...
Explore the comprehensive CISSP Certification Course syllabus with InfosecTra...InfosecTrain Education
 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksWilliam McBorrough
 
Cloud computing-course-description-and-syllabus-spring2014
Cloud computing-course-description-and-syllabus-spring2014Cloud computing-course-description-and-syllabus-spring2014
Cloud computing-course-description-and-syllabus-spring2014hajlaoui jaleleddine
 
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhShah Sheikh
 
Cloud Security Architecture.pptx
Cloud Security Architecture.pptxCloud Security Architecture.pptx
Cloud Security Architecture.pptxMoshe Ferber
 
Unit-I: Introduction to Cloud Computing
Unit-I: Introduction to Cloud ComputingUnit-I: Introduction to Cloud Computing
Unit-I: Introduction to Cloud ComputingDivya S
 
Trustworthy service oriented architecture and platform for cloud computing (2...
Trustworthy service oriented architecture and platform for cloud computing (2...Trustworthy service oriented architecture and platform for cloud computing (2...
Trustworthy service oriented architecture and platform for cloud computing (2...Ioannis Polyzos
 
Cloud computingintroduction
Cloud computingintroductionCloud computingintroduction
Cloud computingintroductionKhelender Sasan
 
Cloud strategy briefing 101
Cloud strategy briefing 101 Cloud strategy briefing 101
Cloud strategy briefing 101 Predrag Mitrovic
 
Cc unit 2 ppt
Cc unit 2 pptCc unit 2 ppt
Cc unit 2 pptDr VISU P
 
Cloud security for financial services
Cloud security for financial servicesCloud security for financial services
Cloud security for financial servicesMoshe Ferber
 
Cloud computing-course-description-and-syllabus-spring2013
Cloud computing-course-description-and-syllabus-spring2013Cloud computing-course-description-and-syllabus-spring2013
Cloud computing-course-description-and-syllabus-spring2013uoitc
 
Cloud security Presentation
Cloud security PresentationCloud security Presentation
Cloud security PresentationAjay p
 
Towards secure cloud data management
Towards secure cloud data managementTowards secure cloud data management
Towards secure cloud data managementambitlick
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
 
Cloud Ecosystems A Perspective
Cloud Ecosystems A PerspectiveCloud Ecosystems A Perspective
Cloud Ecosystems A Perspectivejmcdaniel650
 
Introduction on various types of Cloud Services.
Introduction on various types of Cloud Services.Introduction on various types of Cloud Services.
Introduction on various types of Cloud Services.pihukikahnaji45
 

Similar to Precisely why is ccsp useful for cloud computing (vocal media) (20)

Explore the comprehensive CISSP Certification Course syllabus with InfosecTra...
Explore the comprehensive CISSP Certification Course syllabus with InfosecTra...Explore the comprehensive CISSP Certification Course syllabus with InfosecTra...
Explore the comprehensive CISSP Certification Course syllabus with InfosecTra...
 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and Risks
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing-course-description-and-syllabus-spring2014
Cloud computing-course-description-and-syllabus-spring2014Cloud computing-course-description-and-syllabus-spring2014
Cloud computing-course-description-and-syllabus-spring2014
 
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
 
Cloud Security Architecture.pptx
Cloud Security Architecture.pptxCloud Security Architecture.pptx
Cloud Security Architecture.pptx
 
Unit-I: Introduction to Cloud Computing
Unit-I: Introduction to Cloud ComputingUnit-I: Introduction to Cloud Computing
Unit-I: Introduction to Cloud Computing
 
Trustworthy service oriented architecture and platform for cloud computing (2...
Trustworthy service oriented architecture and platform for cloud computing (2...Trustworthy service oriented architecture and platform for cloud computing (2...
Trustworthy service oriented architecture and platform for cloud computing (2...
 
Cloud computingintroduction
Cloud computingintroductionCloud computingintroduction
Cloud computingintroduction
 
Cloud Breach - Forensics Audit Planning
Cloud Breach - Forensics Audit PlanningCloud Breach - Forensics Audit Planning
Cloud Breach - Forensics Audit Planning
 
Cloud strategy briefing 101
Cloud strategy briefing 101 Cloud strategy briefing 101
Cloud strategy briefing 101
 
Cc unit 2 ppt
Cc unit 2 pptCc unit 2 ppt
Cc unit 2 ppt
 
Cloud security for financial services
Cloud security for financial servicesCloud security for financial services
Cloud security for financial services
 
Cloud computing-course-description-and-syllabus-spring2013
Cloud computing-course-description-and-syllabus-spring2013Cloud computing-course-description-and-syllabus-spring2013
Cloud computing-course-description-and-syllabus-spring2013
 
Cloud security Presentation
Cloud security PresentationCloud security Presentation
Cloud security Presentation
 
Towards secure cloud data management
Towards secure cloud data managementTowards secure cloud data management
Towards secure cloud data management
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
 
Cloud Ecosystems A Perspective
Cloud Ecosystems A PerspectiveCloud Ecosystems A Perspective
Cloud Ecosystems A Perspective
 
UNIT III - ppt.pptx
UNIT III - ppt.pptxUNIT III - ppt.pptx
UNIT III - ppt.pptx
 
Introduction on various types of Cloud Services.
Introduction on various types of Cloud Services.Introduction on various types of Cloud Services.
Introduction on various types of Cloud Services.
 

Recently uploaded

Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 

Recently uploaded (20)

Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 

Precisely why is ccsp useful for cloud computing (vocal media)

  • 1. Precisely why is ccsp useful for cloud computing? The particular Certified Cloud Safety Professional (CCSP) qualification ensures that impair security specialists have got the needed knowledge, abilities, and abilities in cloud safety design, implementation, structure, operations, controls, in addition to compliance with regulating frameworks. A CCSP implements information safety expertise to some impair computing environment in addition to demonstrates competence within cloud security structure, design, progress, in addition to service orchestration. This particular professional capability is usually validated against the globally acknowledged physique of knowledge. The particular CCSP is a great outstanding credential that will complements and builds up upon existing qualifications and academic applications, including (ISC)²’s Qualified Information Systems Safety Professional (CISSP) in addition to CSA’s Certificate associated with Cloud Security Information (CCSK). Understand Cloud Computing Concepts Cloud Computing Definitions Cloud Computing Roles (e.g., cloud service customer, cloud service provider, cloud service partner, cloud service broker) Key Cloud Computing Characteristics (e.g., on-demand self-service, broad network access, multi-tenancy, rapid elasticity and scalability, resource pooling, measured service) Building Block Technologies (e.g., virtualization, storage, networking, databases, orchestration) Describe Cloud Reference Architecture Cloud Computing Activities Cloud Service Capabilities (e.g., application capability types, platform capability types, infrastructure capability types) Then, Cloud Service Categories, Infrastructure as a Service (IaaS), Platform as a Service (PaaS)) Cloud Deployment Models (e.g., public, private, hybrid, community) Cloud Shared Considerations (e.g., interoperability, portability, reversibility, availability, security, privacy, resiliency, performance, governance, maintenance and versioning, service levels and Service Level Agreements (SLA), auditability, regulatory) Impact of Related Technologies (e.g., machine learning, artificial intelligence, blockchain, Internet of Things (IoT), containers, quantum computing)
  • 2. Understand Security Concepts Relevant to Cloud Computing Cryptography and Key Management Access Control Data and Media Sanitization (e.g., overwriting, cryptographic erase) Network Security (e.g., network security groups) Virtualization Security (e.g., hypervisor security, container security) Common Threats Understand the Design Principles of Secure Cloud Computing Cloud Secure Data Lifecycle Cloud-based Disaster Recovery (DR) and Business Continuity (BC) planning Cost-Benefit Analysis Functional Security Requirements Security Considerations for Different Cloud Categories), Infrastructure as a Service (IaaS), Platform as a Service (PaaS)) (e.g., Software as a Service (SaaS), Infrastructure as a Service (IaaS), Platform as a Service (PaaS))