語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Cybersecurity in Cloud-Based Environ...
~
Davis, Connor.
FindBook
Google Book
Amazon
博客來
Cybersecurity in Cloud-Based Environments.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Cybersecurity in Cloud-Based Environments./
作者:
Davis, Connor.
出版者:
Ann Arbor : ProQuest Dissertations & Theses, : 2020,
面頁冊數:
54 p.
附註:
Source: Masters Abstracts International, Volume: 82-04.
Contained By:
Masters Abstracts International82-04.
標題:
Information technology. -
電子資源:
https://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=28093663
ISBN:
9798678122728
Cybersecurity in Cloud-Based Environments.
Davis, Connor.
Cybersecurity in Cloud-Based Environments.
- Ann Arbor : ProQuest Dissertations & Theses, 2020 - 54 p.
Source: Masters Abstracts International, Volume: 82-04.
Thesis (M.Sc.)--Utica College, 2020.
This item must not be sold to any third party vendors.
The purpose of this research was to examine data security in cloud-based environments. The rapid expansion of companies and businesses migrating from traditional data storage to cloud environments introduces a variety of security related issues that must be recognized and addressed. This research determined that nearly 85% of enterprises have adopted some form of cloud computing. Cloud computing provides inherent advantages, such as expansive data storage capabilities, improved resource sharing, cost effectiveness and resource sharing, all of which are inter-related to the availability, scalability, and manageability effective business management systems.This research has also determined that cloud environments pose cybersecurity risks to individuals and companies. The billions of new devices associated Internet of Things (IoT) affords cybercriminals attack vectors not previously available, and cloud computing is no exception. Recent reports and surveys examined during this research point to the significance of cyber threats reflected in the significant escalation of cyberattacks such as phishing, business email compromise (BEC), and COVID-19 related attacks and fraudulent websites.This research has provided support for the conclusions that rapidly changing technology, such as 5G, migration to cloud environments, the inescapable reality that employees and other insiders also pose security threats, and the ingenuity and ability of cybercriminals to rapidly adapt their attacks through the exploitation of global events or threats, will in all likelihood, continue.
ISBN: 9798678122728Subjects--Topical Terms:
532993
Information technology.
Subjects--Index Terms:
CIA triad
Cybersecurity in Cloud-Based Environments.
LDR
:02579nmm a2200337 4500
001
2280417
005
20210827095944.5
008
220723s2020 ||||||||||||||||| ||eng d
020
$a
9798678122728
035
$a
(MiAaPQ)AAI28093663
035
$a
AAI28093663
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Davis, Connor.
$3
3558932
245
1 0
$a
Cybersecurity in Cloud-Based Environments.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2020
300
$a
54 p.
500
$a
Source: Masters Abstracts International, Volume: 82-04.
500
$a
Advisor: Corbo, Duane.
502
$a
Thesis (M.Sc.)--Utica College, 2020.
506
$a
This item must not be sold to any third party vendors.
520
$a
The purpose of this research was to examine data security in cloud-based environments. The rapid expansion of companies and businesses migrating from traditional data storage to cloud environments introduces a variety of security related issues that must be recognized and addressed. This research determined that nearly 85% of enterprises have adopted some form of cloud computing. Cloud computing provides inherent advantages, such as expansive data storage capabilities, improved resource sharing, cost effectiveness and resource sharing, all of which are inter-related to the availability, scalability, and manageability effective business management systems.This research has also determined that cloud environments pose cybersecurity risks to individuals and companies. The billions of new devices associated Internet of Things (IoT) affords cybercriminals attack vectors not previously available, and cloud computing is no exception. Recent reports and surveys examined during this research point to the significance of cyber threats reflected in the significant escalation of cyberattacks such as phishing, business email compromise (BEC), and COVID-19 related attacks and fraudulent websites.This research has provided support for the conclusions that rapidly changing technology, such as 5G, migration to cloud environments, the inescapable reality that employees and other insiders also pose security threats, and the ingenuity and ability of cybercriminals to rapidly adapt their attacks through the exploitation of global events or threats, will in all likelihood, continue.
590
$a
School code: 1754.
650
4
$a
Information technology.
$3
532993
650
4
$a
Computer science.
$3
523869
650
4
$a
Cloud computing.
$3
1016782
650
4
$a
Computer security.
$3
540555
650
4
$a
Internet of Things.
$3
3538511
650
4
$a
COVID-19.
$3
3554449
653
$a
CIA triad
653
$a
Cybersecurity
653
$a
Human element
690
$a
0489
690
$a
0984
710
2
$a
Utica College.
$b
Cybersecurity.
$3
2098218
773
0
$t
Masters Abstracts International
$g
82-04.
790
$a
1754
791
$a
M.Sc.
792
$a
2020
793
$a
English
856
4 0
$u
https://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=28093663
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9432150
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入