Identifying Cloud Computing Security Risks
dc.contributor.author | Wooley, Paul S. | |
dc.date.accessioned | 2011-07-06T17:15:08Z | |
dc.date.available | 2011-07-06T17:15:08Z | |
dc.date.issued | 2011-02 | |
dc.description | 84 p. This paper was completed as part of the final research component in the University of Oregon Applied Information Management Master's Degree Program [see htpp://aim.uoregon.edu]. | en_US |
dc.description.abstract | Cloud computing services including Infrastructure as a Service promise potential cost savings for businesses by offering remote, scalable computing resources. However attractive these services are, they pose significant security risks to customer applications and data beyond what is expected using traditional on-premises architecture. This paper identifies three basic types of threats related to the IaaS layer and eight kinds of attacks. These are aligned within the CIA model as a way to determine security risk. | en_US |
dc.identifier.uri | https://hdl.handle.net/1794/11393 | |
dc.language.iso | en_US | en_US |
dc.relation.ispartofseries | AIM Capstone 2011;Paul S. Wooley | |
dc.subject | Cloud computing | en_US |
dc.subject | C.I.A. security | |
dc.subject | Infrastructure as a Service | |
dc.subject | IsaaS | |
dc.subject | Virtual computing | |
dc.subject | Attack surface | |
dc.subject | Applied Information Management | |
dc.subject | AIM | |
dc.subject | Data | |
dc.title | Identifying Cloud Computing Security Risks | en_US |
dc.type | Other | en_US |