{"title":"Making the Cloud Secure: Cirrus or Cumulonimbus?","authors":"E. Smith, M. Ugolini","doi":"10.1109/fitce53297.2021.9588515","DOIUrl":null,"url":null,"abstract":"We build on our experience of the commercial Information and Communications Technology (ICT) environment, market data from respected organisations and the technical literature; to examine how the sophistication offered by the cloud impacts approaches to defending information from attack by malignant actors. The cloud provides a networked and distributed approach to computing, using commercial models that are congruent with the outsourced principle of more efficient use of technology resources. The model however creates more complexity and more interfaces, which will in turn impact the approach needed to protect facilities against attack.","PeriodicalId":205216,"journal":{"name":"2021 60th FITCE Communication Days Congress for ICT Professionals: Industrial Data – Cloud, Low Latency and Privacy (FITCE)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 60th FITCE Communication Days Congress for ICT Professionals: Industrial Data – Cloud, Low Latency and Privacy (FITCE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/fitce53297.2021.9588515","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
We build on our experience of the commercial Information and Communications Technology (ICT) environment, market data from respected organisations and the technical literature; to examine how the sophistication offered by the cloud impacts approaches to defending information from attack by malignant actors. The cloud provides a networked and distributed approach to computing, using commercial models that are congruent with the outsourced principle of more efficient use of technology resources. The model however creates more complexity and more interfaces, which will in turn impact the approach needed to protect facilities against attack.