Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities

Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities
Author :
Publisher : IGI Global
Total Pages : 113
Release :
ISBN-10 : 9781522579250
ISBN-13 : 1522579257
Rating : 4/5 (50 Downloads)

Book Synopsis Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities by : Gunasekhar, T.

Download or read book Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities written by Gunasekhar, T. and published by IGI Global. This book was released on 2019-02-15 with total page 113 pages. Available in PDF, EPUB and Kindle. Book excerpt: Businesses constantly face online hacking threats or security breaches in their online mainframe that expose sensitive information to the wrong audience. Companies look to store their data in a separate location, distancing the availability of the information and reducing the risk of data breaches. Modern organizations need to remain vigilant against insider attacks, cloud computing risks, and security flaws within their mainframe. Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities is an essential reference source that discusses maintaining a secure management of sensitive data, and intellectual property and provides a robust security algorithm on consumer data. Featuring research on topics such as public cryptography, security principles, and trustworthy computing, this book is ideally designed for IT professionals, business managers, researchers, students, and professionals seeking coverage on preventing and detecting the insider attacks using trusted cloud computing techniques.


Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities Related Books

Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities
Language: en
Pages: 113
Authors: Gunasekhar, T.
Categories: Computers
Type: BOOK - Published: 2019-02-15 - Publisher: IGI Global

DOWNLOAD EBOOK

Businesses constantly face online hacking threats or security breaches in their online mainframe that expose sensitive information to the wrong audience. Compan
Detection and Mitigation of Insider Attacks in a Cloud Infrastructure
Language: en
Pages: 0
Authors: T. Gunasekhar
Categories: Computers
Type: BOOK - Published: 2019 - Publisher: Information Science Reference

DOWNLOAD EBOOK

Businesses constantly face online hacking threats or security breaches in their online mainframe that expose sensitive information to the wrong audience. Compan
Insider Attack and Cyber Security
Language: en
Pages: 228
Authors: Salvatore J. Stolfo
Categories: Computers
Type: BOOK - Published: 2008-08-29 - Publisher: Springer Science & Business Media

DOWNLOAD EBOOK

This book defines the nature and scope of insider problems as viewed by the financial industry. This edited volume is based on the first workshop on Insider Att
Big Data Analytics with Applications in Insider Threat Detection
Language: en
Pages: 953
Authors: Bhavani Thuraisingham
Categories: Computers
Type: BOOK - Published: 2017-11-22 - Publisher: CRC Press

DOWNLOAD EBOOK

Today's malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defenses on the
The CERT Guide to Insider Threats
Language: en
Pages: 431
Authors: Dawn M. Cappelli
Categories: Computers
Type: BOOK - Published: 2012-01-20 - Publisher: Addison-Wesley

DOWNLOAD EBOOK

Since 2001, the CERT® Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute (SEI) has collected and analyzed information about