Attack Types and Intrusion Detection Systems in Cloud Computing

Download Now
Provided by: Gazi University
Topic: Cloud
Format: PDF
In recent years, lots of organizations have adopted their systems for enabling cloud based computing to provide scalable, virtualized on-demand access to a shared pool of computing resources such as networks, servers, storage, applications and services. Mainly cloud computing technology enables users/enterprises to eliminate the requirements for setting up of expensive computing infrastructure and reduces systems' operating costs. As a result, this technology is used by an increasing number of end users. On the other hand, existing security deficiencies and vulnerabilities of underlying technologies can leave an open door for intrusions.
Download Now

Find By Topic