透過您的圖書館登入
IP:3.137.157.45

並列摘要


Cloud computing has emerged from the legacy system; consequently, threats applicable in legacy system are equally applicable to cloud computing. In addition, cloud specific new threats have also emerged due to the various reasons including, multi-tenancy, access from anywhere, control of cloud, etc. Considering the significance of cloud security, this work is an attempt to identify the major threat factors to cloud security that may be critical in cloud environment. It also highlights the various methods employed by the attackers to cause the damage. To accomplish our objective, we have reviewed the major publication related to cyber security. It is revealed that cyber-attacks are industry specific and vary significantly from one industry type to another. Finally, we have conducted the case study on cyber-attacks that are already occurred in cloud paradigm. Cyber-attacks were highlighted by categorizing them into phishing attacks and distributed denial of services. This work will be profoundly helpful to the industry and researchers in understanding the various cloud specific cyber-attack and enable them to evolve the strategy to counter them more effectively.

被引用紀錄


孫一寧(2012)。網路成癮測量量表與腦波測量之比較分析〔碩士論文,淡江大學〕。華藝線上圖書館。https://doi.org/10.6846/TKU.2012.00461
余秀玲(2004)。布拉格反射器之反射光譜研究〔碩士論文,中原大學〕。華藝線上圖書館。https://doi.org/10.6840/cycu200400411
劉志成(2000)。組織基因工程與組織(文化)變遷之研究-以陳水扁之台北市政為例〔碩士論文,元智大學〕。華藝線上圖書館。https://www.airitilibrary.com/Article/Detail?DocID=U0009-0112200611311460
呂紹宇(2006)。組織基因工程與組織合併之研究-以電信業合併案為例〔碩士論文,元智大學〕。華藝線上圖書館。https://www.airitilibrary.com/Article/Detail?DocID=U0009-1607200615364700

延伸閱讀