Cloud Security Baselines
Abstract
Soware, rmware, and hardware design and implementation processes have errors or corner cases that can be exploited by an adversary. In computer security we call these weaknesses vulnerabilities. Computer systems will never be free from vulnerabilities because they are designed, implemented, and tested by humans, who always make mistakes. A vulnerability is thus a threat to security. We call an attack a threat that is realized by an adversary, usually exploiting one or more of a system's vulnerabilities.
Recommended Citation
D. Oliveira et al., "Cloud Security Baselines," Cloud Computing Security: Foundations and Challenges, pp. 31 - 44, Taylor and Francis Group; Taylor and Francis, Jan 2016.
The definitive version is available at https://doi.org/10.1201/9781315372112-14
Department(s)
Computer Science
International Standard Book Number (ISBN)
978-148226095-3;978-148226094-6
Document Type
Article - Journal
Document Version
Citation
File Type
text
Language(s)
English
Rights
© 2024 Taylor and Francis Group; Taylor and Francis, All rights reserved.
Publication Date
01 Jan 2016