{"title":"云环境下渗透测试与漏洞评估综述","authors":"Ilke Yurtseven, Selami Bagriyanik","doi":"10.1109/UYMS50627.2020.9247071","DOIUrl":null,"url":null,"abstract":"Cloud computing continues to provide easy, flexible, and cost-effective solutions and services to both enterprises and unprofessional users. Many small and large-scale organizations transform their system structures from on-prem to the cloud because of the wide opportunities for cloud services. While the demand for the cloud expands each day, the possible security issues of the cloud are discussed by researchers and organizations. Ease of using the cloud also may cause security flaws and due to this reason, security issues of cloud computing should be examined in-depth. The main goal of this paper is to answer the question that how we can measure vulnerabilities in cloud computing and what the main penetration testing practices are in cloud environments.","PeriodicalId":358654,"journal":{"name":"2020 Turkish National Software Engineering Symposium (UYMS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"A Review of Penetration Testing and Vulnerability Assessment in Cloud Environment\",\"authors\":\"Ilke Yurtseven, Selami Bagriyanik\",\"doi\":\"10.1109/UYMS50627.2020.9247071\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing continues to provide easy, flexible, and cost-effective solutions and services to both enterprises and unprofessional users. Many small and large-scale organizations transform their system structures from on-prem to the cloud because of the wide opportunities for cloud services. While the demand for the cloud expands each day, the possible security issues of the cloud are discussed by researchers and organizations. Ease of using the cloud also may cause security flaws and due to this reason, security issues of cloud computing should be examined in-depth. The main goal of this paper is to answer the question that how we can measure vulnerabilities in cloud computing and what the main penetration testing practices are in cloud environments.\",\"PeriodicalId\":358654,\"journal\":{\"name\":\"2020 Turkish National Software Engineering Symposium (UYMS)\",\"volume\":\"9 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-10-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 Turkish National Software Engineering Symposium (UYMS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/UYMS50627.2020.9247071\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 Turkish National Software Engineering Symposium (UYMS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/UYMS50627.2020.9247071","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Review of Penetration Testing and Vulnerability Assessment in Cloud Environment
Cloud computing continues to provide easy, flexible, and cost-effective solutions and services to both enterprises and unprofessional users. Many small and large-scale organizations transform their system structures from on-prem to the cloud because of the wide opportunities for cloud services. While the demand for the cloud expands each day, the possible security issues of the cloud are discussed by researchers and organizations. Ease of using the cloud also may cause security flaws and due to this reason, security issues of cloud computing should be examined in-depth. The main goal of this paper is to answer the question that how we can measure vulnerabilities in cloud computing and what the main penetration testing practices are in cloud environments.