Security Enhancements for Cloud Applications
Downloads
This study scrutinizes the cloud applications infrastructure and the associated vulnerabilities that could allow unauthorized access to users’ accounts. The research is based on a Fault Tree Analysis that uncovers various security design flaws and their occurrence probabilities. For each undesirable event, a preventive mechanism is suggested and validated by the testing results, decreasing to a minimum the risk exposure of unauthorized access to users’ sensitive data.
Downloads
S. Mandal and D. A. Khan, "A Study of Security Threats in Cloud: Passive Impact of COVID-19 Pandemic," 2020 International Conference on Smart Electronics and Communication (ICOSEC), pp. 837-842, doi 10.1109/ICOSEC49089.2020.9215374, 2020.
J. Carson, "3 Top Takeaways from the 2021 Verizon Data Breach Investigations Report," 29 06 2021. [Online]. Available: https://thycotic.com/company/blog/2021/06/29/verizon-data-breach-investigations-report-top-takeaways/. [Accessed 25 02 2022].
Verizon, "Data Breach Investigations Report," 2021. [Online]. Available: https://www.verizon.com/business/resources/reports/dbir/2021/. [Accessed 27 02 2022].
C. Umbrella, 2021. [Online]. Available: https://learn-umbrella.cisco.com/ebook-library/2021-cyber-security-threat-trends-phishing-crypto-top-the-list. [Accessed 27 02 2022].
N. Lord, "Uncovering Password Habits: Are Users’ Password Security Habits Improving? (Infographic)," 29 09 2020. [Online]. Available: https://digitalguardian.com/blog/uncovering-password-habits-are-users-password-security-habits-improving-infographic. [Accessed 23 03 2022].
L. Leuthvilay, "New Password Study by HYPR Finds 78% of People Had to Reset a Password They Forgot in Past 90 Days," 10 12 2019. [Online]. Available: https://blog.hypr.com/hypr-password-study-findings. [Accessed 23 03 2022].
J. Lapienytė, "Top 5 industries that fall victim to phishing scams," 28 10 2020. [Online]. Available: https://cybernews.com/security/top-5-industries-that-fall-victim-to-phishing-scams/. [Accessed 23 03 2022].
P. I. LLC, "resources.yubico.com," January 2019. [Online]. Available: https://resources.yubico.com/53ZDUYE6/as/q3tmql-974v8g-g8llc3/Ponemon_2019_State_of_Password_and_Authentication_Security_Behaviors_Report.pdf. [Accessed 13 03 2022].
Have I been pwned, "https://haveibeenpwned.com" [Online]. [Accessed 01 04 2022].
A. Lukehart, "2022 Cyber Attack Statistics, Data, and Trends," 04 01 2022. [Online]. Available: https://parachute.cloud/2022-cyber-attack-statistics-data-and-trends/. [Accessed 18 03 2022].




