Cloud Attack and Risk Assessment Taxonomy

被引:39
|
作者
Juliadotter, Nina Viktoria [1 ]
Choo, Kim-Kwang Raymond [2 ]
机构
[1] Univ New South Wales Canberra, Cybersecur, Canberra, ACT, Australia
[2] Univ S Australia, Sch Informat Technol & Math Sci, Adelaide, SA 5001, Australia
来源
IEEE CLOUD COMPUTING | 2015年 / 2卷 / 01期
关键词
attack taxonomy; cloud; cloud and the law; risk assessment; security;
D O I
10.1109/MCC.2015.2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As businesses' dependence on cloud services increases, these services are vulnerable to security incidents, data breaches, and other malicious activities. To mitigate risks to the confidentiality, integrity, and availability of assets, as well as to minimize losses to cloud service providers and users, particularly organizational users, the attack risk elements must be identified, classified, quantified, and prioritized. This column presents a conceptual cloud attack and risk assessment taxonomy. © 2015 IEEE.
引用
收藏
页码:14 / 20
页数:7
相关论文
共 50 条
  • [31] A taxonomy of error types for failure analysis and risk assessment
    Sutcliffe, A
    Rugg, G
    INTERNATIONAL JOURNAL OF HUMAN-COMPUTER INTERACTION, 1998, 10 (04) : 381 - 405
  • [32] A Taxonomy for Risk Assessment of Cyberattacks on Critical Infrastructure (TRACI)
    Plachkinova, Miloslava
    Vo, Ace
    COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2023, 52
  • [33] Security risk assessment in IoT environments: A taxonomy and survey
    Waqdan, Mofareh
    Louafi, Habib
    Mouhoub, Malek
    COMPUTERS & SECURITY, 2025, 154
  • [34] Cloud Enterprise Dynamic Risk Assessment (CEDRA): a dynamic risk assessment using dynamic Bayesian networks for cloud environment
    Dawood Behbehani
    Nikos Komninos
    Khalid Al-Begain
    Muttukrishnan Rajarajan
    Journal of Cloud Computing, 12
  • [35] Cloud Enterprise Dynamic Risk Assessment (CEDRA): a dynamic risk assessment using dynamic Bayesian networks for cloud environment
    Behbehani, Dawood
    Komninos, Nikos
    Al-Begain, Khalid
    Rajarajan, Muttukrishnan
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2023, 12 (01):
  • [36] Attack of the Cloud People
    Bing, Stanley
    FORTUNE, 2011, 164 (01) : 116 - 116
  • [37] Are publications on zoological taxonomy under attack?
    Pinto, Angelo Parise
    Mejdalani, Gabriel
    Mounce, Ross
    Silveira, Luis Fabio
    Marinoni, Luciane
    Rafael, Jose Albertino
    ROYAL SOCIETY OPEN SCIENCE, 2021, 8 (02):
  • [38] Taxonomy of C Overflow Vulnerabilities Attack
    Ahmad, Nurul Haszeli
    Aljunid, Syed Ahmad
    Ab Manan, Jamalul-lail
    SOFTWARE ENGINEERING AND COMPUTER SYSTEMS, PT 2, 2011, 180 : 376 - +
  • [39] A taxonomy and discussion of software attack technologies
    Banks, SB
    Stytz, MR
    DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2005, 2005, 5812 : 92 - 101
  • [40] A Computer Network Attack Taxonomy and Ontology
    van Heerden, R. P.
    Irwin, B.
    Burke, I. D.
    Leenen, L.
    INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2012, 2 (03) : 12 - 25