Cloud Security Baselines

Abstract

Soware, rmware, and hardware design and implementation processes have errors or corner cases that can be exploited by an adversary. In computer security we call these weaknesses vulnerabilities. Computer systems will never be free from vulnerabilities because they are designed, implemented, and tested by humans, who always make mistakes. A vulnerability is thus a threat to security. We call an attack a threat that is realized by an adversary, usually exploiting one or more of a system's vulnerabilities.

Department(s)

Computer Science

International Standard Book Number (ISBN)

978-148226095-3;978-148226094-6

Document Type

Article - Journal

Document Version

Citation

File Type

text

Language(s)

English

Rights

© 2024 Taylor and Francis Group; Taylor and Francis, All rights reserved.

Publication Date

01 Jan 2016

Share

 
COinS