A combined attack-tree and kill-chain approach to designing attack-detection strategies for malicious insiders in cloud computing
Attacks on cloud-computing services are becoming more prevalent with recent victims including Tesla, Aviva Insurance and SIM-card manufacturer Gemalto[1]. The risk posed to organisations from malicious insiders is becoming more widely known about and consequently many are now investing in hardware,...
Autores principales: | , , |
---|---|
Formato: | Conference item |
Publicado: |
IEEE
2019
|