About this item
- Title
- Analysis and prevention of account hijacking based incidents in cloud environment
- Content partner
- Unitec
- Collection
- Research Bank
- Description
Cloud computing is a technological breakthrough in computing. It has affected each and every part of the information technology, from infrastructure to the software deployment, from programming to the application maintenance. Cloud offers a wide array of solutions for the current day computing needs aided with benefits like elasticity, affordability and scalability. But at the same time, the incidence of malicious cyber activity is progressively increasing at an unprecedented rate posing crit...
- Format
- Research paper
- Research format
- Conference item
- Date created
- 2015-12
- Creator
- Tirumala, Sreenivas Sremath / Sathu, Hira / Naidu, Vijay
- URL
- https://hdl.handle.net/10652/3353
- Related subjects
- account hijacking / identity theft / phishing / New York Times Company / Immediate Incident Response (IIR) / Syrian Electronic Army (SEA) / cloud security incidents / Computer System Security
What can I do with this item?
Check copyright status and what you can do with this item
Check informationReport this item
If you believe this item breaches our terms of use please report this item
Report this itemDigitalNZ brings together more than 30 million items from institutions so that they are easy to find and use. This information is the best information we could find on this item. This item was added on 09 December 2021, and updated 16 April 2024.
Learn more about how we work.
Share
What is the copyright status of this item?

All Rights Reserved
This item is all rights reserved, which means you'll have to get permission from Unitec before using it.

More Information
Unitec has this to say about the rights status of this item:
All rights reserved
What can I do with this item?
You must always check with Unitec to confirm the specific terms of use, but this is our understanding:

Non-infringing use
NZ Copyright law does not prevent every use of a copyright work. You should consider what you can and cannot do with a copyright work.

No sharing
You may not copy and/or share this item with others without further permission. This includes posting it on your blog, using it in a presentation, or any other public use.

No modifying
You are not allowed to adapt or remix this item into any other works.

No commercial use
You may not use this item commercially.
What can I do with this item?
Check copyright status and what you can do with this item
Check informationReport this item
If you believe this item breaches our terms of use please report this item
Report this itemDigitalNZ brings together more than 30 million items from institutions so that they are easy to find and use. This information is the best information we could find on this item. This item was added on 09 December 2021, and updated 16 April 2024.
Learn more about how we work.
Share
Related items
Loading...