2019 5th International Conference on Web Research (ICWR) 2019
DOI: 10.1109/icwr.2019.8765295
|View full text |Cite
|
Sign up to set email alerts
|

Cloud Security Issues Based on People, Process and Technology Model: A Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
10
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(10 citation statements)
references
References 18 publications
0
10
0
Order By: Relevance
“…An Iranian nuclear plant was subjected to an attack by a malicious computer virus, which resulted in the destruction of five centrifuges. The spread of these electronic viruses caused the centrifuges to overheat, which may have resulted in an explosion that took the lives of several people (Ghaffari et al, 2019).…”
Section: Their Efforts Make the Internet A Safer Place For Everyonementioning
confidence: 99%
See 2 more Smart Citations
“…An Iranian nuclear plant was subjected to an attack by a malicious computer virus, which resulted in the destruction of five centrifuges. The spread of these electronic viruses caused the centrifuges to overheat, which may have resulted in an explosion that took the lives of several people (Ghaffari et al, 2019).…”
Section: Their Efforts Make the Internet A Safer Place For Everyonementioning
confidence: 99%
“…These companies include Credit bureaus, a global credit rating agency that suffered unauthorized access that influenced numerous customers and for which the costs of recouping from the breach were lately approximated to be $439 million; Yahoo, a web giant whose breach impacted each of its 3 billion account holders; and Target, a retailer that afflicted a data breach that impacted many clients and for whom the costs of recouping from the breach were recently estimated to be one billion dollars. It is estimated that around three hundred and fifty million dollars have been directly spent on the rehabilitation effort (Ghaffari et al, 2019).…”
Section: Their Efforts Make the Internet A Safer Place For Everyonementioning
confidence: 99%
See 1 more Smart Citation
“…They addressed cloud security by recognizing security requirements and proposing solutions to reduce these potential threats. Finally, the authors in [72] identified the importance of relevant security issues knowledge related to processes, people, and technology. They divided cloud security issues into three categories: processes, people, and technology.…”
Section: Related Workmentioning
confidence: 99%
“…Many security challenges are faced by CSP, of which the main one is the trust that must be in place between CSP and the cloud customers. Trust is how the provider can protect the customer data from any breach ( Ghaffari, Gharaee & Arabsorkhi, 2019 ). One of the popular features of the cloud environment is multi-tenancy and virtualization.…”
Section: Introductionmentioning
confidence: 99%