Deakin University
Browse
- No file added yet -

Analysis of insiders attack mitigation strategies

Download (401.9 kB)
Version 3 2024-06-17, 13:01
Version 2 2024-06-03, 11:54
Version 1 2015-03-17, 10:31
journal contribution
posted on 2024-06-17, 13:01 authored by ZM Yusop, Jemal AbawajyJemal Abawajy
Insider threat has become a serious information security issues within organizations. In this paper, we analyze the problem of insider threats with emphases on the Cloud computing platform. Security is one of the major anxieties when planning to adopt the Cloud. This paper will contribute towards the conception of mitigation strategies that can be relied on to solve the malicious insider threats. While Cloud computing relieves organizations from the burden of the data management and storage costs, security in general and the malicious insider threats in particular is the main concern in cloud environments. We will analyses the existing mitigation strategies to reduce malicious insiders threats in Cloud computing.

History

Journal

Procedia - Social and Behavioral Sciences

Volume

129

Article number

C

Pagination

611-618

Location

Amsterdam, Netherlands

Open access

  • Yes

ISSN

1877-0428

Language

eng

Publication classification

C Journal article, C2 Other contribution to refereed journal

Copyright notice

2014, The Authors

Publisher

Elsevier

Usage metrics

    Research Publications

    Categories

    No categories selected

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC