Research paper

Analysis and prevention of account hijacking based incidents in cloud environment

View original item

About this item

Title
Analysis and prevention of account hijacking based incidents in cloud environment
Content partner
Unitec
Collection
Research Bank
Description

Cloud computing is a technological breakthrough in computing. It has affected each and every part of the information technology, from infrastructure to the software deployment, from programming to the application maintenance. Cloud offers a wide array of solutions for the current day computing needs aided with benefits like elasticity, affordability and scalability. But at the same time, the incidence of malicious cyber activity is progressively increasing at an unprecedented rate posing crit...

Format
Research paper
Research format
Conference item
Date created
2015-12
Creator
Tirumala, Sreenivas Sremath / Sathu, Hira / Naidu, Vijay
URL
https://hdl.handle.net/10652/3353
Related subjects
account hijacking / identity theft / phishing / New York Times Company / Immediate Incident Response (IIR) / Syrian Electronic Army (SEA) / cloud security incidents / Computer System Security

What can I do with this item?

Check copyright status and what you can do with this item

Check information

Report this item

If you believe this item breaches our terms of use please report this item

Report this item

DigitalNZ brings together more than 30 million items from institutions so that they are easy to find and use. This information is the best information we could find on this item. This item was added on 09 December 2021, and updated 16 April 2024.
Learn more about how we work.

Share

What can I do with this item?

You must always check with Unitec to confirm the specific terms of use, but this is our understanding:

Research icon

Non-infringing use

NZ Copyright law does not prevent every use of a copyright work. You should consider what you can and cannot do with a copyright work.

NZ Copyright law does not prevent every use of a copyright work. You should consider what you can and cannot do with a copyright work.

No sharing icon

No sharing

You may not copy and/or share this item with others without further permission. This includes posting it on your blog, using it in a presentation, or any other public use.

You may not copy and/or share this item with others without further permission. This includes posting it on your blog, using it in a presentation, or any other public use.

No modifying icon

No modifying

You are not allowed to adapt or remix this item into any other works.

You are not allowed to adapt or remix this item into any other works.

No commercial use icon

No commercial use

You may not use this item commercially.

You may not use this item commercially.

View original item

What can I do with this item?

Check copyright status and what you can do with this item

Check information

Report this item

If you believe this item breaches our terms of use please report this item

Report this item

DigitalNZ brings together more than 30 million items from institutions so that they are easy to find and use. This information is the best information we could find on this item. This item was added on 09 December 2021, and updated 16 April 2024.
Learn more about how we work.

Share

Related items

Loading...