Cloud Security Baselines

Daniela Oliveira, Anna Squicciarini, Dan Lin

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

Soware, rmware, and hardware design and implementation processes have errors or corner cases that can be exploited by an adversary. In computer security we call these weaknesses vulnerabilities. Computer systems will never be free from vulnerabilities because they are designed, implemented, and tested by humans, who always make mistakes. A vulnerability is thus a threat to security. We call an attack a threat that is realized by an adversary, usually exploiting one or more of a system’s vulnerabilities.

Original languageEnglish (US)
Title of host publicationCloud Computing Security
Subtitle of host publicationFoundations and Challenges
PublisherCRC Press
Pages31-44
Number of pages14
ISBN (Electronic)9781482260953
ISBN (Print)9781482260946
DOIs
StatePublished - Jan 1 2016

All Science Journal Classification (ASJC) codes

  • General Computer Science

Fingerprint

Dive into the research topics of 'Cloud Security Baselines'. Together they form a unique fingerprint.

Cite this