You are not logged in.
Openly accessible

Analysis of insiders attack mitigation strategies

Yusop, Zulkefi Mohd and Abawajy, Jemal H 2014, Analysis of insiders attack mitigation strategies, Procedia - Social and Behavioral Sciences, vol. 129, pp. 611-618, doi: 10.1016/j.sbspro.2014.06.002.

Attached Files
Name Description MIMEType Size Downloads
yusop-analysisofinsiders-2014.pdf Published version application/pdf 401.90KB 17

Title Analysis of insiders attack mitigation strategies
Author(s) Yusop, Zulkefi Mohd
Abawajy, Jemal H
Journal name Procedia - Social and Behavioral Sciences
Volume number 129
Start page 611
End page 618
Total pages 8
Publisher Elsevier
Place of publication Amsterdam, Netherlands
Publication date 2014-05
ISSN 1877-0428
Keyword(s) cloud computing
insider attacks
malicious insider collusions
mitigation strategies
cloud computing security
data security
Summary Insider threat has become a serious information security issues within organizations. In this paper, we analyze the problem of insider threats with emphases on the Cloud computing platform. Security is one of the major anxieties when planning to adopt the Cloud. This paper will contribute towards the conception of mitigation strategies that can be relied on to solve the malicious insider threats. While Cloud computing relieves organizations from the burden of the data management and storage costs, security in general and the malicious insider threats in particular is the main concern in cloud environments. We will analyses the existing mitigation strategies to reduce malicious insiders threats in Cloud computing.
Language eng
DOI 10.1016/j.sbspro.2014.06.002
Field of Research 080402 Data Encryption
Socio Economic Objective 890101 Fixed Line Data Networks and Services
HERDC Research category C2 Other contribution to refereed journal
ERA Research output type C Journal article
Copyright notice ©2014, The Authors
Free to Read? Yes
Use Rights Creative Commons Attribution noncommercial no derivatives licence
Persistent URL http://hdl.handle.net/10536/DRO/DU:30070776

Document type: Journal Article
Collections: School of Information Technology
Open Access Collection
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 0 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 55 Abstract Views, 18 File Downloads  -  Detailed Statistics
Created: Thu, 19 Mar 2015, 16:15:42 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.