Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities

Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities
Author :
Publisher : IGI Global
Total Pages : 149
Release :
ISBN-10 : 9781522579250
ISBN-13 : 1522579257
Rating : 4/5 (257 Downloads)

Book Synopsis Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities by : Gunasekhar, T.

Download or read book Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities written by Gunasekhar, T. and published by IGI Global. This book was released on 2019-02-15 with total page 149 pages. Available in PDF, EPUB and Kindle. Book excerpt: Businesses constantly face online hacking threats or security breaches in their online mainframe that expose sensitive information to the wrong audience. Companies look to store their data in a separate location, distancing the availability of the information and reducing the risk of data breaches. Modern organizations need to remain vigilant against insider attacks, cloud computing risks, and security flaws within their mainframe. Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities is an essential reference source that discusses maintaining a secure management of sensitive data, and intellectual property and provides a robust security algorithm on consumer data. Featuring research on topics such as public cryptography, security principles, and trustworthy computing, this book is ideally designed for IT professionals, business managers, researchers, students, and professionals seeking coverage on preventing and detecting the insider attacks using trusted cloud computing techniques.


Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities Related Books

Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities
Language: en
Pages: 149
Authors: Gunasekhar, T.
Categories: Computers
Type: BOOK - Published: 2019-02-15 - Publisher: IGI Global

DOWNLOAD EBOOK

Businesses constantly face online hacking threats or security breaches in their online mainframe that expose sensitive information to the wrong audience. Compan
Insider Threats in Cyber Security
Language: en
Pages: 248
Authors: Christian W. Probst
Categories: Computers
Type: BOOK - Published: 2010-07-28 - Publisher: Springer Science & Business Media

DOWNLOAD EBOOK

Insider Threats in Cyber Security is a cutting edge text presenting IT and non-IT facets of insider threats together. This volume brings together a critical mas
The CERT Guide to Insider Threats
Language: en
Pages: 431
Authors: Dawn M. Cappelli
Categories: Computers
Type: BOOK - Published: 2012-01-20 - Publisher: Addison-Wesley

DOWNLOAD EBOOK

Since 2001, the CERT® Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute (SEI) has collected and analyzed information about
Modern Principles, Practices, and Algorithms for Cloud Security
Language: en
Pages: 361
Authors: Gupta, Brij B.
Categories: Computers
Type: BOOK - Published: 2019-09-27 - Publisher: IGI Global

DOWNLOAD EBOOK

In today’s modern age of information, new technologies are quickly emerging and being deployed into the field of information technology. Cloud computing is a
Detection and Mitigation of Insider Attacks in a Cloud Infrastructure
Language: en
Pages: 0
Authors: T. Gunasekhar
Categories: Computers
Type: BOOK - Published: 2019 - Publisher: Information Science Reference

DOWNLOAD EBOOK

Businesses constantly face online hacking threats or security breaches in their online mainframe that expose sensitive information to the wrong audience. Compan