Cloud Computing Security: Abuse and Nefarious Use of Cloud Computing

Download Now
Provided by: IJCER
Topic: Cloud
Format: PDF
Cloud computing is an emerging and promising computing model that provides on-demand computing services which eliminates the need of bearing operational costs associated with deploying servers and software applications. As with any technology, cloud computing presents its adopters with security and privacy concerns that arise from exposing sensitive business information to unauthorized access. This paper will explore and investigate the scope and magnitude of one of the top cloud computing security threats \"Abuse and nefarious use of cloud computing\" and present some of the attacks specific to this top threat as it represents a major barrier for decision makers to adopting cloud computing model.
Download Now

Find By Topic