International Journal of Computer Technology and Electronics Engineering
In a malicious cloud system, handling of incident, challenges and risks, is an integral part of security management. In this paper, the authors discuss various detection and analysis of security incidents as well as the subsequent response (i.e., containment, eradication, and recovery, etc.). On side of existing processes and methods for incident and risk handling is geared towards infrastructures and operational models that will be increasingly outdated by cloud computing. So to update these systems on time to time, they need to discuss some risks and incident inside the cloud.