Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities

Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities
Author :
Publisher : IGI Global
Total Pages : 113
Release :
ISBN-13 : 9781522579250
ISBN-10 : 1522579257
Rating : 4/5 (57 Downloads)

Book Synopsis Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities by : Gunasekhar, T.

Download or read book Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities written by Gunasekhar, T. and published by IGI Global. This book was released on 2019-02-15 with total page 113 pages. Available in PDF, EPUB and Kindle. Book excerpt: Businesses constantly face online hacking threats or security breaches in their online mainframe that expose sensitive information to the wrong audience. Companies look to store their data in a separate location, distancing the availability of the information and reducing the risk of data breaches. Modern organizations need to remain vigilant against insider attacks, cloud computing risks, and security flaws within their mainframe. Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities is an essential reference source that discusses maintaining a secure management of sensitive data, and intellectual property and provides a robust security algorithm on consumer data. Featuring research on topics such as public cryptography, security principles, and trustworthy computing, this book is ideally designed for IT professionals, business managers, researchers, students, and professionals seeking coverage on preventing and detecting the insider attacks using trusted cloud computing techniques.


Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities Related Books

Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities
Language: en
Pages: 113
Authors: Gunasekhar, T.
Categories: Computers
Type: BOOK - Published: 2019-02-15 - Publisher: IGI Global

DOWNLOAD EBOOK

Businesses constantly face online hacking threats or security breaches in their online mainframe that expose sensitive information to the wrong audience. Compan
Detection and Mitigation of Insider Attacks in a Cloud Infrastructure
Language: en
Pages: 0
Authors: T. Gunasekhar
Categories: Computers
Type: BOOK - Published: 2019 - Publisher: Information Science Reference

DOWNLOAD EBOOK

Businesses constantly face online hacking threats or security breaches in their online mainframe that expose sensitive information to the wrong audience. Compan
Mitigation of Insider Attacks for Data Security in Distributed Computing Environments
Language: en
Pages: 157
Authors: Santosh Aditham
Categories: Big data
Type: BOOK - Published: 2017 - Publisher:

DOWNLOAD EBOOK

In big data systems, the infrastructure is such that large amounts of data are hosted away from the users. Information security is a major challenge in such sys
Insider Threat
Language: en
Pages: 254
Authors: Michael G. Gelles
Categories: Business & Economics
Type: BOOK - Published: 2016-05-28 - Publisher: Butterworth-Heinemann

DOWNLOAD EBOOK

Insider Threat: Detection, Mitigation, Deterrence and Prevention presents a set of solutions to address the increase in cases of insider threat. This includes e
The CERT Guide to Insider Threats
Language: en
Pages: 431
Authors: Dawn M. Cappelli
Categories: Computers
Type: BOOK - Published: 2012-01-20 - Publisher: Addison-Wesley

DOWNLOAD EBOOK

Since 2001, the CERT® Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute (SEI) has collected and analyzed information about