Cloud computing is a catchphrase for today's ICT world. The emerging trend of ``Everything as a service'' has made this rapid growing technology a very admired and highly demanding technology for a must adapted one. With the virtues of 24x7 service availability, multi tenancy, utility, speed, high productivity, agility, scalability of this technology, it has been proved as an emerging trend for the ICT industry as well as the academia. Today the rapid data analytics is changing the way companies try to win, and hence enabling them to generate instantaneous insights for supporting their most important business processes.In present technological era, cloud combining with IOT or Big Data, or highly popular commercial ERP solutions, namely SAP cloud, has touched the height of technological growth but one of the major reasons for the trepidation of its widespread adaptability is the security and authentication breach in cloud technology. Being used in highly commercial solutions, the security issues play a major role.Threat or vulnerability is more important to qualify rather than being quantified only. This paper is a proposal showing a quantifiable approach, focuses on several threats and security breaches and countermeasures their impact concentrating on a cloud based solutions, with the philosophy of the inevitability of testing on cloud security.
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.