Cloud attack and risk assessment taxonomy
Date
2015
Authors
Juliadotter, N.V.J.
Choo, K.K.R.
Editors
Advisors
Journal Title
Journal ISSN
Volume Title
Type:
Journal article
Citation
IEEE Cloud Computing, 2015; 2(1):14-20
Statement of Responsibility
Conference Name
Abstract
As businesses' dependence on cloud services increases, these services are vulnerable to security incidents, data breaches, and other malicious activities. To mitigate risks to the confidentiality, integrity, and availability of assets, as well as to minimize losses to cloud service providers and users, particularly organizational users, the attack risk elements must be identified, classified, quantified, and prioritized. This column presents a conceptual cloud attack and risk assessment taxonomy.
School/Discipline
Dissertation Note
Provenance
Description
Access Status
Rights
Copyright 2015 IEEE