Identifying Cloud Computing Security Risks

dc.contributor.authorWooley, Paul S.
dc.date.accessioned2011-07-06T17:15:08Z
dc.date.available2011-07-06T17:15:08Z
dc.date.issued2011-02
dc.description84 p. This paper was completed as part of the final research component in the University of Oregon Applied Information Management Master's Degree Program [see htpp://aim.uoregon.edu].en_US
dc.description.abstractCloud computing services including Infrastructure as a Service promise potential cost savings for businesses by offering remote, scalable computing resources. However attractive these services are, they pose significant security risks to customer applications and data beyond what is expected using traditional on-premises architecture. This paper identifies three basic types of threats related to the IaaS layer and eight kinds of attacks. These are aligned within the CIA model as a way to determine security risk.en_US
dc.identifier.urihttps://hdl.handle.net/1794/11393
dc.language.isoen_USen_US
dc.relation.ispartofseriesAIM Capstone 2011;Paul S. Wooley
dc.subjectCloud computingen_US
dc.subjectC.I.A. security
dc.subjectInfrastructure as a Service
dc.subjectIsaaS
dc.subjectVirtual computing
dc.subjectAttack surface
dc.subjectApplied Information Management
dc.subjectAIM
dc.subjectData
dc.titleIdentifying Cloud Computing Security Risksen_US
dc.typeOtheren_US

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Wooley-2011.pdf
Size:
415.46 KB
Format:
Adobe Portable Document Format
Description:
AIM Terminal Project
License bundle
Now showing 1 - 1 of 1
Name:
license.txt
Size:
2.13 KB
Format:
Item-specific license agreed upon to submission
Description: