Cloud Attack and Risk Assessment Taxonomy

被引:38
作者
Juliadotter, Nina Viktoria [1 ]
Choo, Kim-Kwang Raymond [2 ]
机构
[1] Univ New South Wales Canberra, Cybersecur, Canberra, ACT, Australia
[2] Univ S Australia, Sch Informat Technol & Math Sci, Adelaide, SA 5001, Australia
来源
IEEE CLOUD COMPUTING | 2015年 / 2卷 / 01期
关键词
attack taxonomy; cloud; cloud and the law; risk assessment; security;
D O I
10.1109/MCC.2015.2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As businesses' dependence on cloud services increases, these services are vulnerable to security incidents, data breaches, and other malicious activities. To mitigate risks to the confidentiality, integrity, and availability of assets, as well as to minimize losses to cloud service providers and users, particularly organizational users, the attack risk elements must be identified, classified, quantified, and prioritized. This column presents a conceptual cloud attack and risk assessment taxonomy. © 2015 IEEE.
引用
收藏
页码:14 / 20
页数:7
相关论文
共 50 条
  • [41] RISK ASSESSMENT OF ATTACK-INDUCED CASCADE IN COMPLEX NETWORKS
    Bao, Zhe-Jing
    Yan, Wen-Jun
    Guo, Chuang-Xin
    INTERNATIONAL JOURNAL OF MODERN PHYSICS C, 2011, 22 (08): : 765 - 773
  • [42] Methodology for Risk Assessment of Road Bridges Endangered by Blast Attack
    Sykora, Miroslav
    Manas, Pavel
    INTERNATIONAL CONFERENCE ON MILITARY TECHNOLOGIES (ICMT 2015), 2015, : 333 - 338
  • [43] RISK ASSESSMENT OF A SOLAR ATTACK ACCORDING TO ISO 31000 STANDARD
    Lavrnic, Igor
    Basic, Ana
    Viduka, Dejan
    ENGINEERING REVIEW, 2021, 41 (01) : 120 - 128
  • [44] Risk Assessment of Attack in Autonomous Vehicle based on a Decision Tree
    Ftaimi, Sara
    Mazri, Tomader
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (07) : 792 - 801
  • [45] Data Governance Taxonomy: Cloud versus Non-Cloud
    Al-Ruithe, Majid
    Benkhelifa, Elhadj
    Hameed, Khawar
    SUSTAINABILITY, 2018, 10 (01)
  • [46] Exploring Attack Graphs for Security Risk Assessment: A Probabilistic Approach
    GAO Ni
    HE Yiyue
    WuhanUniversityJournalofNaturalSciences, 2018, 23 (02) : 171 - 177
  • [47] A Taxonomy and Holistic Approach to Risk Assessment of Network-Centric Systems
    Rashmi Jain
    Dinesh Verma
    John V. Farr
    OPSEARCH, 2005, 42 (2) : 83 - 97
  • [48] A Review of Security Risk Assessment Methods in Cloud Computing
    Alturkistani, Fatimah M.
    Emam, Ahmed Z.
    NEW PERSPECTIVES IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 1, 2014, 275 : 443 - 453
  • [49] Security Risk Assessment on Cloud: A Systematic Mapping Study
    Annunziata, Giusy
    Sheykina, Alexandra
    Palomba, Fabio
    De Lucia, Andrea
    Catolino, Gemma
    Ferrucci, Filomena
    PROCEEDINGS OF 2024 28TH INTERNATION CONFERENCE ON EVALUATION AND ASSESSMENT IN SOFTWARE ENGINEERING, EASE 2024, 2024, : 604 - 613
  • [50] Risk Management for Outsourcing to the Cloud Security Risks and Safeguards as Selection Criteria for Extern Cloud Services
    Viehmann, Johannes
    2014 IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS (ISSREW), 2014, : 293 - 295