A Cloud Security RiskManagement Strategy

被引:7
|
作者
Choo, Kim-Kwang Raymond [1 ]
机构
[1] Univ South Australia, Sch Informa Technol & Math Sci, Adelaide, SA, Australia
来源
IEEE CLOUD COMPUTING | 2014年 / 1卷 / 02期
关键词
cloud; law; risk management; security;
D O I
10.1109/MCC.2014.27
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Given the threat of security breaches, to both cloud service providers and organizational cloud service users, cloud security and privacy are growing public policy concerns as well a salient area of inquiry for researchers. To ensure organizational competitiveness, cloud service providers and organizational cloud service users must make detailed preparations to act against cyberthreats before they occur, and to recover from malicious cyberactivities when such threats succeed. A cloud security risk-management strategy should be a dynamic document that's regularly reviewed by stakeholders, and should include policies and objectives that align with the organization's needs. © 2014 IEEE.
引用
收藏
页码:52 / 56
页数:5
相关论文
共 50 条
  • [21] Security in the Cloud
    Anthes, Gary
    COMMUNICATIONS OF THE ACM, 2010, 53 (11) : 16 - 18
  • [22] Research of Data Security Strategy MC-R Based on Cloud Computing
    Li Ling
    Mei Shengmin
    Zhang Hairong
    Tang Haiyan
    COMPUTER SCIENCE AND TECHNOLOGY (CST2016), 2017, : 349 - 365
  • [23] Empirical Analysis of Security Enabled Cloud Computing Strategy Using Artificial Intelligence
    Tadeo, Diego Antonio Garcia
    John, S. Franklin
    Bhaumik, Ankan
    Neware, Rahul
    Yamsani, Nagendar
    Kapila, Dhiraj
    2021 INTERNATIONAL CONFERENCE ON COMPUTING SCIENCES (ICCS 2021), 2021, : 83 - 85
  • [24] Smart grid data security storage strategy based on cloud computing platform
    Jiang, Xin
    Yang, Qifan
    Ji, Wen
    Chen, Yanshu
    Cai, Yuxiang
    Li, Xiaoming
    2021 6TH INTERNATIONAL CONFERENCE ON SMART GRID AND ELECTRICAL AUTOMATION (ICSGEA 2021), 2021, : 69 - 74
  • [25] Security-aware intermediate data placement strategy in scientific cloud workflows
    Wei Liu
    Su Peng
    Wei Du
    Wei Wang
    Guo Sun Zeng
    Knowledge and Information Systems, 2014, 41 : 423 - 447
  • [26] An Intelligent Data Flow Security Strategy Model of Cloud-Network Integration
    Cai, Nishui
    Deng, Zhuxiang
    Wang, Hao
    CYBER SECURITY, CNCERT 2022, 2022, 1699 : 3 - 27
  • [27] Cloud Computing: Security Threats & Control Strategy using Tri-Mechanism
    Gupta, Arpit
    Chourey, Vaishali
    2014 INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION, COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICCICCT), 2014, : 309 - 316
  • [28] Network security situation evaluation strategy based on cloud gravity center judgment
    Zheng, Ruijuan
    Wei, Wangyang
    Zhang, Mingchuan
    Wu, Qingtao
    Zhang, Dan
    Journal of Networks, 2014, 9 (02) : 283 - 290
  • [29] Security-aware intermediate data placement strategy in scientific cloud workflows
    Liu, Wei
    Peng, Su
    Du, Wei
    Wang, Wei
    Zeng, Guo Sun
    KNOWLEDGE AND INFORMATION SYSTEMS, 2014, 41 (02) : 423 - 447
  • [30] Cloud Computing: Cloud Security to Trusted Cloud
    Wu Jiyi
    Shen Qianli
    Zhang Jianlin
    Xie Qi
    NEW TRENDS AND APPLICATIONS OF COMPUTER-AIDED MATERIAL AND ENGINEERING, 2011, 186 : 596 - 600