Cloud computing security: Difference between revisions

Content deleted Content added
Security and privacy: added author, publisher and dates
Security and privacy: added authors, journal, more specific page numbers, updated url.
Line 43:
 
==Security and privacy==
Any service without a "hardened" environment is considered a "soft" target. Virtual servers should be protected just like a physical server against [[Data leakage prevention|data leakage]], [[malware]], and exploited vulnerabilities. "Data loss or leakage represents 24.6% and cloud related malware 3.4% of threats causing cloud outages”.<ref name=JA_1>{{Citecite journal|last title=ThangasamyLimitations and challenges on Security Cloud Testing|first author1=VeeraiyahAhmad Dahari Bin Jarno|date author2=2017|title=JournalShahrin ofBin AppliedBaharom| Technologyauthor3=Maryam andShahpasand| Innovation|url=httphttps://www.apu.edu.my/ejournals/jati/journal/JATI-VOLUME_1-ISSUE_2-2017.pdf| journal=Journal of Applied Technology and Innovation| volume=1| issue=2| pages=9789-90| date=2017}}</ref>
 
===Identity management ===