{"title":"Prioritizing Cloud Security Controls","authors":"M. Alani","doi":"10.1145/3231830.3231831","DOIUrl":null,"url":null,"abstract":"As more and more organization move to the cloud, security remains a major concern. Given the unique nature of a cloud computing system, security threats take a different form in the cloud. These unique threats require unique security measures and security management.\n This paper introduces a simplified method to calculate the effect of adding different security controls to the cloud system and prioritize security management in limited budget situations. These calculations help in prioritizing security controls and security spending to get an optimal security for a given limited budget.\n To clarify the proposed method, a case study is considered for a University that have shifted its systems to the cloud and needs to prioritize its security spending.","PeriodicalId":102458,"journal":{"name":"International Conference on Advanced Wireless Information, Data, and Communication Technologies","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Advanced Wireless Information, Data, and Communication Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3231830.3231831","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
As more and more organization move to the cloud, security remains a major concern. Given the unique nature of a cloud computing system, security threats take a different form in the cloud. These unique threats require unique security measures and security management.
This paper introduces a simplified method to calculate the effect of adding different security controls to the cloud system and prioritize security management in limited budget situations. These calculations help in prioritizing security controls and security spending to get an optimal security for a given limited budget.
To clarify the proposed method, a case study is considered for a University that have shifted its systems to the cloud and needs to prioritize its security spending.