Novel Approach for Control Data Theft Attack in Cloud Computing

K. Narasimha Sastry, B. Thirumala Rao, T Gunasekhar

Abstract


Information security is a major problem faced by cloud computing around the world. Because of their adverse effects on organizational information systems, viruses, hackers, and attackers insiders can jeopardize organizations capabilities to pursue their undertaken effectively. Although technology based solutions help to mitigate some of the many problems of information security, even the preeminent technology can’t work successfully unless effective human computer communication occurs.IT experts, users and administrators all play crucial role to determine the behavior that occurs as people interact with information technology will support the maintenance of effective security or threaten it. In the present paper we try to apply behavioral science concepts and techniques to understanding problems of information security in organizations.

Keywords


Insider; preeminent; jeopardize; mitigate;

Full Text:

PDF


DOI: http://doi.org/10.11591/ijece.v5i6.pp1545-1552
Total views : 92 times


Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

ISSN 2088-8708, e-ISSN 2722-2578