• DocumentCode
    37357
  • Title

    Cloud Attack and Risk Assessment Taxonomy

  • Author

    Juliadotter, Nina Viktoria ; Choo, Kim-Kwang Raymond

  • Author_Institution
    Univ. of New South Wales, Canberra, ACT, Australia
  • Volume
    2
  • Issue
    1
  • fYear
    2015
  • fDate
    Jan.-Feb. 2015
  • Firstpage
    14
  • Lastpage
    20
  • Abstract
    As businesses´ dependence on cloud services increases, these services are vulnerable to security incidents, data breaches, and other malicious activities. To mitigate risks to the confidentiality, integrity, and availability of assets, as well as to minimize losses to cloud service providers and users, particularly organizational users, the attack risk elements must be identified, classified, quantified, and prioritized. This column presents a conceptual cloud attack and risk assessment taxonomy.
  • Keywords
    cloud computing; risk management; security of data; asset availability; asset confidentiality; asset integrity; attack risk elements; cloud attack taxonomy; cloud services; data breaches; loss minimization; malicious activities; risk assessment taxonomy; risk mitigation; security incidents; Cloud computing; Computer crime; Computer hacking; Computer security; Risk management; Taxonomy; attack taxonomy; cloud; cloud and the law; risk assessment; security;
  • fLanguage
    English
  • Journal_Title
    Cloud Computing, IEEE
  • Publisher
    ieee
  • ISSN
    2325-6095
  • Type

    jour

  • DOI
    10.1109/MCC.2015.2
  • Filename
    7091811