Cloud Attack and Risk Assessment Taxonomy

被引:40
作者
Juliadotter, Nina Viktoria [1 ]
Choo, Kim-Kwang Raymond [2 ]
机构
[1] Univ New South Wales Canberra, Cybersecur, Canberra, ACT, Australia
[2] Univ S Australia, Sch Informat Technol & Math Sci, Adelaide, SA 5001, Australia
关键词
attack taxonomy; cloud; cloud and the law; risk assessment; security;
D O I
10.1109/MCC.2015.2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As businesses' dependence on cloud services increases, these services are vulnerable to security incidents, data breaches, and other malicious activities. To mitigate risks to the confidentiality, integrity, and availability of assets, as well as to minimize losses to cloud service providers and users, particularly organizational users, the attack risk elements must be identified, classified, quantified, and prioritized. This column presents a conceptual cloud attack and risk assessment taxonomy. © 2015 IEEE.
引用
收藏
页码:14 / 20
页数:7
相关论文
共 25 条
[1]   A survey of information security incident handling in the cloud [J].
Ab Rahman, Nurul Hidayah ;
Choo, Kim-Kwang Raymond .
COMPUTERS & SECURITY, 2015, 49 :45-69
[2]  
Alperovitch D., 2011, CISC VIS NETW IND GL
[3]  
[Anonymous], 2013, APT TAL CLOAK 3 DAGG
[4]  
[Anonymous], 2014, CISC VIS NETW IND GL
[5]  
Choo K.K. R., 2014, ICTs and the Millennium Development Goals, P81, DOI [DOI 10.1007/978-1-4899-7439-6_6, 10.1007/978-1-4899-7439-6_6]
[6]   Organised crime groups in cyberspace: a typology [J].
Choo, Kim-Kwang Raymond .
TRENDS IN ORGANIZED CRIME, 2008, 11 (03) :270-295
[7]  
Copeland Michael V., 2013, Wired!
[8]   A taxonomy of networks and computer attacks [J].
Hansman, S ;
Hunt, R .
COMPUTERS & SECURITY, 2005, 24 (01) :31-43
[9]  
Higgins K.H., 2014, INFORM WEEK DARK REA
[10]  
Juliadotter N., 2015, CLOUD SECUR IN PRESS