Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities
- 2h 37m
- T. Gunasekhar
- IGI Global
Businesses constantly face online hacking threats or security breaches in their online mainframe that expose sensitive information to the wrong audience. Companies look to store their data in a separate location, distancing the availability of the information and reducing the risk of data breaches. Modern organizations need to remain vigilant against insider attacks, cloud computing risks, and security flaws within their mainframe.
Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities is an essential reference source that discusses maintaining a secure management of sensitive data, and intellectual property and provides a robust security algorithm on consumer data. Featuring research on topics such as public cryptography, security principles, and trustworthy computing, this book is ideally designed for IT professionals, business managers, researchers, students, and professionals seeking coverage on preventing and detecting the insider attacks using trusted cloud computing techniques.
In this Book
Security Architecture of Cloud Computing
Trusted Cloud Computing
A Survey on Insider Attacks in IAAS-Based Cloud
Security Flaws and Design Issues in Cloud Infrastructure
Trustworthy Framework for Insider Attack Prevention and Detection
Results and Discussions