Author_Institution :
Univ. of New South Wales, Canberra, ACT, Australia
Abstract :
As businesses´ dependence on cloud services increases, these services are vulnerable to security incidents, data breaches, and other malicious activities. To mitigate risks to the confidentiality, integrity, and availability of assets, as well as to minimize losses to cloud service providers and users, particularly organizational users, the attack risk elements must be identified, classified, quantified, and prioritized. This column presents a conceptual cloud attack and risk assessment taxonomy.
Keywords :
cloud computing; risk management; security of data; asset availability; asset confidentiality; asset integrity; attack risk elements; cloud attack taxonomy; cloud services; data breaches; loss minimization; malicious activities; risk assessment taxonomy; risk mitigation; security incidents; Cloud computing; Computer crime; Computer hacking; Computer security; Risk management; Taxonomy; attack taxonomy; cloud; cloud and the law; risk assessment; security;