Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities

  • 2h 37m
  • T. Gunasekhar
  • IGI Global
  • 2019

Businesses constantly face online hacking threats or security breaches in their online mainframe that expose sensitive information to the wrong audience. Companies look to store their data in a separate location, distancing the availability of the information and reducing the risk of data breaches. Modern organizations need to remain vigilant against insider attacks, cloud computing risks, and security flaws within their mainframe.

Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities is an essential reference source that discusses maintaining a secure management of sensitive data, and intellectual property and provides a robust security algorithm on consumer data. Featuring research on topics such as public cryptography, security principles, and trustworthy computing, this book is ideally designed for IT professionals, business managers, researchers, students, and professionals seeking coverage on preventing and detecting the insider attacks using trusted cloud computing techniques.

In this Book

  • Security Architecture of Cloud Computing
  • Trusted Cloud Computing
  • A Survey on Insider Attacks in IAAS-Based Cloud
  • Security Flaws and Design Issues in Cloud Infrastructure
  • Trustworthy Framework for Insider Attack Prevention and Detection
  • Results and Discussions

YOU MIGHT ALSO LIKE

Rating 4.4 of 17 users Rating 4.4 of 17 users (17)
Rating 4.6 of 54 users Rating 4.6 of 54 users (54)
Rating 4.4 of 27 users Rating 4.4 of 27 users (27)