首页    期刊浏览 2025年02月21日 星期五
登录注册

文章基本信息

  • 标题:Novel Approach for Control Data Theft Attack in Cloud Computing
  • 其他标题:Novel Approach for Control Data Theft Attack in Cloud Computing
  • 本地全文:下载
  • 作者:K. Narasimha Sastry ; B. Thirumala Rao ; T Gunasekhar
  • 期刊名称:International Journal of Electrical and Computer Engineering
  • 电子版ISSN:2088-8708
  • 出版年度:2015
  • 卷号:5
  • 期号:6
  • 页码:1545-1552
  • DOI:10.11591/ijece.v5i6.pp1545-1552
  • 语种:English
  • 出版社:Institute of Advanced Engineering and Science (IAES)
  • 摘要:Information security is a major problem faced by cloud computing around the world. Because of their adverse effects on organizational information systems, viruses, hackers, and attackers insiders can jeopardize organizations capabilities to pursue their undertaken effectively. Although technology based solutions help to mitigate some of the many problems of information security, even the preeminent technology can’t work successfully unless effective human computer communication occurs.IT experts, users and administrators all play crucial role to determine the behavior that occurs as people interact with information technology will support the maintenance of effective security or threaten it. In the present paper we try to apply behavioral science concepts and techniques to understanding problems of information security in organizations.
  • 其他摘要:Information security is a major problem faced by cloud computing around the world. Because of their adverse effects on organizational information systems, viruses, hackers, and attackers insiders can jeopardize organizations capabilities to pursue their undertaken effectively. Although technology based solutions help to mitigate some of the many problems of information security, even the preeminent technology can’t work successfully unless effective human computer communication occurs.IT experts, users and administrators all play crucial role to determine the behavior that occurs as people interact with information technology will support the maintenance of effective security or threaten it. In the present paper we try to apply behavioral science concepts and techniques to understanding problems of information security in organizations.
  • 关键词:Insider; preeminent; jeopardize; mitigate
国家哲学社会科学文献中心版权所有