Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników

Znaleziono wyników: 1

Liczba wyników na stronie
first rewind previous Strona / 1 next fast forward last
Wyniki wyszukiwania
Wyszukiwano:
w słowach kluczowych:  Iaas
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 1 next fast forward last
1
Content available remote Survey on cloud computing vulnerability and cyber attacks: a defensive approach
EN
Cyber attacks against cloud computing discourage users to migrate to cloud computing. Cloud computing currently has weaknesses in terms of securing data. Unprotected data and weak storage security are potential threats to cloud computing. There are security risks and they should be considered carefully before enterprises migrate to cloud computing. Specifying cloud computing vulnerabilities and defining cyber attacks against infrastructure of the Cloud are the targets of this research. Mitigation of the non-technical problems may decrease the security problems. However, cryptographies, distributed denial of service and flooding attacks damage the servers and services. In this research, my aim is to demonstrate cloud computing vulnerability and the threats against data and storage. Once the cloud security problems are defined, the next step is to look for a solution. Using forensic methods to inspect intrusion attempts, implementing an online forensic workstation monitoring the login details of cloud authentication server, providing evidence of cyber crime are recommended.
first rewind previous Strona / 1 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.