作者
Raja Mohamed Jabir, Salam Ismail Rasheed Khanji, Liza Abdallah Ahmad, Omar Alfandi, Huwida Said
发表日期
2016/1/31
研讨会论文
2016 18th international conference on advanced communication technology (ICACT)
页码范围
117-123
出版商
IEEE
简介
Business enterprises are competing to get their applications up and running faster with improved manageability and less maintenance by reassigning the ability to IT specialists to adjust resources in order to meet business fluctuating needs. This can be achieved through utilizing the Cloud Computing Model which is distinguished by `pay as you go' model. The model offers solutions of storage, convenient and on-demand access to a shared pool of configurable computing resources. As with any novel technology, Cloud Computing is subject to security threats and vulnerabilities including network threats, information threats and underlying infrastructure threats. In this paper, we present a framework by which penetration testing is conducted to highlight possible vulnerabilities within our private Cloud Computing infrastructure, simulate attacks to exploit discovered vulnerabilities such as Denial of Service (DoS) and …
引用总数
2016201720182019202020212022202320244351068281
学术搜索中的文章
RM Jabir, SIR Khanji, LA Ahmad, O Alfandi, H Said - 2016 18th international conference on advanced …, 2016