DocumentCode
37357
Title
Cloud Attack and Risk Assessment Taxonomy
Author
Juliadotter, Nina Viktoria ; Choo, Kim-Kwang Raymond
Author_Institution
Univ. of New South Wales, Canberra, ACT, Australia
Volume
2
Issue
1
fYear
2015
fDate
Jan.-Feb. 2015
Firstpage
14
Lastpage
20
Abstract
As businesses´ dependence on cloud services increases, these services are vulnerable to security incidents, data breaches, and other malicious activities. To mitigate risks to the confidentiality, integrity, and availability of assets, as well as to minimize losses to cloud service providers and users, particularly organizational users, the attack risk elements must be identified, classified, quantified, and prioritized. This column presents a conceptual cloud attack and risk assessment taxonomy.
Keywords
cloud computing; risk management; security of data; asset availability; asset confidentiality; asset integrity; attack risk elements; cloud attack taxonomy; cloud services; data breaches; loss minimization; malicious activities; risk assessment taxonomy; risk mitigation; security incidents; Cloud computing; Computer crime; Computer hacking; Computer security; Risk management; Taxonomy; attack taxonomy; cloud; cloud and the law; risk assessment; security;
fLanguage
English
Journal_Title
Cloud Computing, IEEE
Publisher
ieee
ISSN
2325-6095
Type
jour
DOI
10.1109/MCC.2015.2
Filename
7091811
Link To Document