A combined attack-tree and kill-chain approach to designing attack-detection strategies for malicious insiders in cloud computing

Attacks on cloud-computing services are becoming more prevalent with recent victims including Tesla, Aviva Insurance and SIM-card manufacturer Gemalto[1]. The risk posed to organisations from malicious insiders is becoming more widely known about and consequently many are now investing in hardware,...

Descripción completa

Detalles Bibliográficos
Autores principales: Duncan, A, Creese, S, Goldsmith, M
Formato: Conference item
Publicado: IEEE 2019