3 research outputs found
Recommended from our members
Cyberattacks and security of cloud computing: a complete guideline
Cloud computing is an innovative technique that offers shared resources for stock cache and server management. Cloud computing saves time and monitoring costs for any organization and turns technological solutions for large-scale systems into server-to-service frameworks. However, just like any other technology, cloud computing opens up many forms of security threats and problems. In this work, we focus on discussing different cloud models and cloud services, respectively. Next, we discuss the security trends in the cloud models. Taking these security trends into account, we move to security problems, including data breaches, data confidentiality, data access controllability, authentication, inadequate diligence, phishing, key exposure, auditing, privacy preservability, and cloud-assisted IoT applications. We then propose security attacks and countermeasures specifically for the different cloud models based on the security trends and problems. In the end, we pinpoint some of the futuristic directions and implications relevant to the security of cloud models. The future directions will help researchers in academia and industry work toward cloud computing security
Cyberattacks and Security of Cloud Computing: A Complete Guideline
Cloud computing is an innovative technique that offers shared resources for stock cache and server management. Cloud computing saves time and monitoring costs for any organization and turns technological solutions for large-scale systems into server-to-service frameworks. However, just like any other technology, cloud computing opens up many forms of security threats and problems. In this work, we focus on discussing different cloud models and cloud services, respectively. Next, we discuss the security trends in the cloud models. Taking these security trends into account, we move to security problems, including data breaches, data confidentiality, data access controllability, authentication, inadequate diligence, phishing, key exposure, auditing, privacy preservability, and cloud-assisted IoT applications. We then propose security attacks and countermeasures specifically for the different cloud models based on the security trends and problems. In the end, we pinpoint some of the futuristic directions and implications relevant to the security of cloud models. The future directions will help researchers in academia and industry work toward cloud computing security
Modelización Matemática de la propagación de malware: Un nuevo enfoque basado en la seguridad de la información
[ES] En esta tesis se estudian modelos que simulan la propagación del malware.
Uno de los objetivos de estos modelos es prever si una epidemia desaparece o
permanece a lo largo del tiempo. Para ello se realiza un estudio de la estabilidad
del modelo y se calcula el número reproductivo básico, denotado por R0. Para
estudiar la estabilidad se usan los valores propios de las matrices Jacobianas, las
funciones de Liapunov y el enfoque geométrico, mientras que para obtener el número reproductivo básico se utiliza el método de la siguiente generación.
De este modo, se obtiene que la epidemia desaparece si R0 es menor o igual a 1 y
la epidemia se mantiene si R0 > 1, entre otras propiedades.
Haciendo un análisis de estos modelos se han propuesto tres mejoras en esta
tesis:
1. La creación de una familia de modelos que tiene en cuenta el compartimento
de los portadores, es decir, aquellos dispositivos que están infectados pero el
malware no les afecta.
2. El estudio del número reproductivo básico en varias variables.
3. La redefinición de los parámetros de los modelos teniendo en cuenta las
características del malware