DocumentCode :
37357
Title :
Cloud Attack and Risk Assessment Taxonomy
Author :
Juliadotter, Nina Viktoria ; Choo, Kim-Kwang Raymond
Author_Institution :
Univ. of New South Wales, Canberra, ACT, Australia
Volume :
2
Issue :
1
fYear :
2015
fDate :
Jan.-Feb. 2015
Firstpage :
14
Lastpage :
20
Abstract :
As businesses´ dependence on cloud services increases, these services are vulnerable to security incidents, data breaches, and other malicious activities. To mitigate risks to the confidentiality, integrity, and availability of assets, as well as to minimize losses to cloud service providers and users, particularly organizational users, the attack risk elements must be identified, classified, quantified, and prioritized. This column presents a conceptual cloud attack and risk assessment taxonomy.
Keywords :
cloud computing; risk management; security of data; asset availability; asset confidentiality; asset integrity; attack risk elements; cloud attack taxonomy; cloud services; data breaches; loss minimization; malicious activities; risk assessment taxonomy; risk mitigation; security incidents; Cloud computing; Computer crime; Computer hacking; Computer security; Risk management; Taxonomy; attack taxonomy; cloud; cloud and the law; risk assessment; security;
fLanguage :
English
Journal_Title :
Cloud Computing, IEEE
Publisher :
ieee
ISSN :
2325-6095
Type :
jour
DOI :
10.1109/MCC.2015.2
Filename :
7091811
Link To Document :
بازگشت