A combined attack-tree and kill-chain approach to designing attack-detection strategies for malicious insiders in cloud computing

Attacks on cloud-computing services are becoming more prevalent with recent victims including Tesla, Aviva Insurance and SIM-card manufacturer Gemalto[1]. The risk posed to organisations from malicious insiders is becoming more widely known about and consequently many are now investing in hardware,...

Full description

Bibliographic Details
Main Authors: Duncan, A, Creese, S, Goldsmith, M
Format: Conference item
Published: IEEE 2019