2022
DOI: 10.29207/resti.v6i6.4714
|View full text |Cite
|
Sign up to set email alerts
|

Faux Insider Hazard Investigation on Non-Public Cloud Computing by Using ADAM’s Technique

Abstract: Cloud computing is a service system mechanism that businesses and organizations use to perform computerized and integrated transactions over computer networks. The service system must, of course, be”matched”with a”certain amount”of security. It is applied to” forecast the probability of cybercrime. A Cloud Service Provider (CSP) often offers cloud-based services with a basic level of security. Typically, CSPs are set up to offer their services on the open internet. Data security-focused organizations strive to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(5 citation statements)
references
References 18 publications
0
5
0
Order By: Relevance
“…7 No. 5 (2023) DOI: https://doi.org/10.29207/resti.v7i5.5279 Creative Commons Attribution 4.0 International License (CC BY 4.0) 1100 owncloud as well as the folder and file structures of several operating systems, both linux-based and windows-based operating systems [1].…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…7 No. 5 (2023) DOI: https://doi.org/10.29207/resti.v7i5.5279 Creative Commons Attribution 4.0 International License (CC BY 4.0) 1100 owncloud as well as the folder and file structures of several operating systems, both linux-based and windows-based operating systems [1].…”
Section: Resultsmentioning
confidence: 99%
“…The potential dangers of private cloud computing services include the risk of misuse by internal parties due to their private use. The potential for misuse of private cloud computing services can occur due to system weaknesses used or for other reasons [1] - [3].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…disrupt, steal data, and anything that harms system owners on computer networks are illegal and can be prosecuted in court. Criminals can be punished based on evidence found by network forensics mechanisms [6], [19], [23], [33], [42]. Investigators commonly use network monitoring systems such as IDS for forensic purposes, where investigations are conducted using IDS logs and attack notification systems.…”
Section: Dos Injectionmentioning
confidence: 99%