咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Analysis of Insiders Attack Mi... 收藏

Analysis of Insiders Attack Mitigation Strategies

作     者:Zulkefli Mohd Yusop Jemal H. Abawajy 

作者机构:Parallel and Distributed Computing Lab School of Information Technology Deakin University Victoria Australia 

出 版 物:《Procedia - Social and Behavioral Sciences》 

年 卷 期:2014年第129卷

页      面:611-618页

主  题:Cloud Computing Insider Attacks Malicious Insider Collusions Mitigation Strategies Cloud Computing Security Data Security. 

摘      要:Insider threat has become a serious information security issues within organizations. In this paper, we analyze the problem of insider threats with emphases on the Cloud computing platform. Security is one of the major anxieties when planning to adopt the Cloud. This paper will contribute towards the conception of mitigation strategies that can be relied on to solve the malicious insider threats. While Cloud computing relieves organizations from the burden of the data management and storage costs, security in general and the malicious insider threats in particular is the main concern in cloud environments. We will analyses the existing mitigation strategies to reduce malicious insiders threats in Cloud computing.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分