A comparative study of the evolution of vulnerabilities in IT systems and its relation to the new concept of cloud computing
Purpose - The purpose of this paper is to classify and categorize the vulnerability types emerged with time as information technology (IT) systems evolved. This comparative study aims to compare the seriousness of the old well-known vulnerabilities that may still exist with lower possibility of happ...
Saved in:
| Main Author: | Kouatli, Issam (author) |
|---|---|
| Format: | article |
| Published: |
2014
|
| Online Access: | http://hdl.handle.net/10725/3700 http://dx.doi.org/10.1108/JMH-02-2014-0018 http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php http://www.emeraldinsight.com/doi/full/10.1108/JMH-02-2014-0018 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Global business vulnerabilities in cloud computing services
by: Kouatli, Issam
Published: (2016) -
Managing Cloud Computing Environment
by: Kouatli, Issam
Published: (2016) -
The ten commandments of cloud computing security management
by: Kouatli, Issam
Published: (2014) -
Emotions in the cloud
by: Kouatli, Issam
Published: (2018) -
Definition and selection of fuzzy sets in genetic‐fuzzy systems using the concept of fuzzimetric arcs
by: Kouatli, Issam
Published: (2008)