Cloud Attack and Risk Assessment Taxonomy

被引:39
|
作者
Juliadotter, Nina Viktoria [1 ]
Choo, Kim-Kwang Raymond [2 ]
机构
[1] Univ New South Wales Canberra, Cybersecur, Canberra, ACT, Australia
[2] Univ S Australia, Sch Informat Technol & Math Sci, Adelaide, SA 5001, Australia
来源
IEEE CLOUD COMPUTING | 2015年 / 2卷 / 01期
关键词
attack taxonomy; cloud; cloud and the law; risk assessment; security;
D O I
10.1109/MCC.2015.2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As businesses' dependence on cloud services increases, these services are vulnerable to security incidents, data breaches, and other malicious activities. To mitigate risks to the confidentiality, integrity, and availability of assets, as well as to minimize losses to cloud service providers and users, particularly organizational users, the attack risk elements must be identified, classified, quantified, and prioritized. This column presents a conceptual cloud attack and risk assessment taxonomy. © 2015 IEEE.
引用
收藏
页码:14 / 20
页数:7
相关论文
共 50 条
  • [21] Survey: Risk Assessment for Cloud Computing
    Drissi, S.
    Houmani, H.
    Medromi, H.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2013, 4 (12) : 143 - 148
  • [22] RISK ASSESSMENT METHOD OF CLOUD ENVIRONMENT
    Zboril, Martin
    COMPUTING AND INFORMATICS, 2022, 41 (05) : 1186 - 1206
  • [23] Security Risk Assessment of Cloud Carrier
    Lenkala, Swetha Reddy
    Shetty, Sachin
    Xiong, Kaiqi
    PROCEEDINGS OF THE 2013 13TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND GRID COMPUTING (CCGRID 2013), 2013, : 442 - 449
  • [24] Cloud Computing: A Risk Assessment Model
    Shameli-Sendi, Alireza
    Cheriet, Mohamed
    2014 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E), 2014, : 147 - 152
  • [25] A CLOUD ADOPTION RISK ASSESSMENT MODEL
    Cayirci, Erdal
    Garaga, Alexandr
    de Oliveira, Anderson Santana
    Roudier, Yves
    2014 IEEE/ACM 7TH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC), 2014, : 908 - 913
  • [26] Cloud Computing Potability with Risk Assessment
    Chopra, A.
    Prasad, P. W. C.
    Alsadoon, Abeer
    Ali, S. H.
    Elchouemi, A.
    2016 4TH IEEE INTERNATIONAL CONFERENCE ON MOBILE CLOUD COMPUTING, SERVICES, AND ENGINEERING (MOBILECLOUD 2016), 2016, : 53 - 59
  • [27] A Risk Assessment Framework for Cloud Computing
    Djemame, Karim
    Armstrong, Django
    Guitart, Jordi
    Macias, Mario
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2016, 4 (03) : 265 - 278
  • [28] Assessment of asthma attack risk using an online risk checker
    Broadbent, Catherine
    Kennington, Erika
    Walker, Samantha
    EUROPEAN RESPIRATORY JOURNAL, 2017, 50
  • [29] Exploring risk flow attack graph for security risk assessment
    Dai, Fangfang
    Hu, Ying
    Zheng, Kangfeng
    Wu, Bin
    IET INFORMATION SECURITY, 2015, 9 (06) : 344 - 353
  • [30] A Taxonomy for Risk Assessment of Cyberattacks on Critical Infrastructure (TRACI)
    Plachkinovа, Miloslava
    Vо, Ace
    Communications of the Association for Information Systems, 2023, 52