Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Cybersecurity in Cloud-Based Environ...
~
Davis, Connor.
Linked to FindBook
Google Book
Amazon
博客來
Cybersecurity in Cloud-Based Environments.
Record Type:
Electronic resources : Monograph/item
Title/Author:
Cybersecurity in Cloud-Based Environments./
Author:
Davis, Connor.
Published:
Ann Arbor : ProQuest Dissertations & Theses, : 2020,
Description:
54 p.
Notes:
Source: Masters Abstracts International, Volume: 82-04.
Contained By:
Masters Abstracts International82-04.
Subject:
Information technology. -
Online resource:
https://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=28093663
ISBN:
9798678122728
Cybersecurity in Cloud-Based Environments.
Davis, Connor.
Cybersecurity in Cloud-Based Environments.
- Ann Arbor : ProQuest Dissertations & Theses, 2020 - 54 p.
Source: Masters Abstracts International, Volume: 82-04.
Thesis (M.Sc.)--Utica College, 2020.
This item must not be sold to any third party vendors.
The purpose of this research was to examine data security in cloud-based environments. The rapid expansion of companies and businesses migrating from traditional data storage to cloud environments introduces a variety of security related issues that must be recognized and addressed. This research determined that nearly 85% of enterprises have adopted some form of cloud computing. Cloud computing provides inherent advantages, such as expansive data storage capabilities, improved resource sharing, cost effectiveness and resource sharing, all of which are inter-related to the availability, scalability, and manageability effective business management systems.This research has also determined that cloud environments pose cybersecurity risks to individuals and companies. The billions of new devices associated Internet of Things (IoT) affords cybercriminals attack vectors not previously available, and cloud computing is no exception. Recent reports and surveys examined during this research point to the significance of cyber threats reflected in the significant escalation of cyberattacks such as phishing, business email compromise (BEC), and COVID-19 related attacks and fraudulent websites.This research has provided support for the conclusions that rapidly changing technology, such as 5G, migration to cloud environments, the inescapable reality that employees and other insiders also pose security threats, and the ingenuity and ability of cybercriminals to rapidly adapt their attacks through the exploitation of global events or threats, will in all likelihood, continue.
ISBN: 9798678122728Subjects--Topical Terms:
532993
Information technology.
Subjects--Index Terms:
CIA triad
Cybersecurity in Cloud-Based Environments.
LDR
:02579nmm a2200337 4500
001
2280417
005
20210827095944.5
008
220723s2020 ||||||||||||||||| ||eng d
020
$a
9798678122728
035
$a
(MiAaPQ)AAI28093663
035
$a
AAI28093663
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Davis, Connor.
$3
3558932
245
1 0
$a
Cybersecurity in Cloud-Based Environments.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2020
300
$a
54 p.
500
$a
Source: Masters Abstracts International, Volume: 82-04.
500
$a
Advisor: Corbo, Duane.
502
$a
Thesis (M.Sc.)--Utica College, 2020.
506
$a
This item must not be sold to any third party vendors.
520
$a
The purpose of this research was to examine data security in cloud-based environments. The rapid expansion of companies and businesses migrating from traditional data storage to cloud environments introduces a variety of security related issues that must be recognized and addressed. This research determined that nearly 85% of enterprises have adopted some form of cloud computing. Cloud computing provides inherent advantages, such as expansive data storage capabilities, improved resource sharing, cost effectiveness and resource sharing, all of which are inter-related to the availability, scalability, and manageability effective business management systems.This research has also determined that cloud environments pose cybersecurity risks to individuals and companies. The billions of new devices associated Internet of Things (IoT) affords cybercriminals attack vectors not previously available, and cloud computing is no exception. Recent reports and surveys examined during this research point to the significance of cyber threats reflected in the significant escalation of cyberattacks such as phishing, business email compromise (BEC), and COVID-19 related attacks and fraudulent websites.This research has provided support for the conclusions that rapidly changing technology, such as 5G, migration to cloud environments, the inescapable reality that employees and other insiders also pose security threats, and the ingenuity and ability of cybercriminals to rapidly adapt their attacks through the exploitation of global events or threats, will in all likelihood, continue.
590
$a
School code: 1754.
650
4
$a
Information technology.
$3
532993
650
4
$a
Computer science.
$3
523869
650
4
$a
Cloud computing.
$3
1016782
650
4
$a
Computer security.
$3
540555
650
4
$a
Internet of Things.
$3
3538511
650
4
$a
COVID-19.
$3
3554449
653
$a
CIA triad
653
$a
Cybersecurity
653
$a
Human element
690
$a
0489
690
$a
0984
710
2
$a
Utica College.
$b
Cybersecurity.
$3
2098218
773
0
$t
Masters Abstracts International
$g
82-04.
790
$a
1754
791
$a
M.Sc.
792
$a
2020
793
$a
English
856
4 0
$u
https://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=28093663
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9432150
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login