2015
DOI: 10.17706/jcp.10.3.184-194
|View full text |Cite
|
Sign up to set email alerts
|

Mean Failure Cost Extension Model towards Security Threats Assessment: A Cloud Computing Case Study

Abstract: Abstract:The development of information technology leads to several kind of security threats which can cause different damages like financial losses. Security threat breaches affect specially the confidentiality, the integrity and the availability of a system. Indeed, as the environment continues to become more dynamic the process of making good security decisions is becoming more and more challenging. Hence, managers have to adopt successful policies and practices to prevent security breaches. They need to ev… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 5 publications
0
4
0
Order By: Relevance
“…The client node communicates with the host server via registered cloud server to the host server. In this process, the client server request for a link to the host server via a cloud to exchange data between two nodes [18][19][20]. The best-fit selected path is illustrated in Figure 5.…”
Section: Methodsmentioning
confidence: 99%
“…The client node communicates with the host server via registered cloud server to the host server. In this process, the client server request for a link to the host server via a cloud to exchange data between two nodes [18][19][20]. The best-fit selected path is illustrated in Figure 5.…”
Section: Methodsmentioning
confidence: 99%
“…The authors of the paper introduced each method and briefly described the main areas where the methods differ. One of the method was previously described in [28]. The authors of the publication provided readers with cybersecurity metrics especially developed for the cloud computing environment.…”
Section: Literature Reviewmentioning
confidence: 99%
“…which shows how the entries of the control coverage vector are in linear dependence with the entries of the answer vector. It must be noticed that this matrix approach is rather classic and widely used in the literature [17,18]. e main novelty of our analysis is in the fact that the vector t is not used directly but it is combined with another vector resulting from empirical data.…”
Section: Data-driven Krismentioning
confidence: 99%