In recent years, the market of cloud services has been growing rapidly. Consequently, cloud security has become a heavily discussed topic in the industry. If cloud assets are misconfigured, it can lead to severe security issues and be exposured to cybersecurity attacks. It is of great importance that industry practitioners understand the security challenges and their responsibilities to protect cloud assets. We designed a serious game: Cloud of Assets and Threats (CATS) as an enrichment to the traditional training method to empower users of the cloud infrastructure in terms of cloud security awareness. In this work, we propose a new ontology-based model to support the evaluation of the simulated attack scenarios in CATS. We share the implem...
As the usage of the Cloud proliferates, the need for security evaluation of the Cloud also grows. Th...
A multitude of issues affect the broader adoption of Cloud computing, with security arguably being a...
Today, many products and solutions are provided on the cloud; however, the amount and financial loss...
Cloud computing has become a convenient technology widely used in industry, providing profit and fle...
Critical Infrastructures (CIs) such as e-commerce, energy, transportation, defense, monitoring etc.,...
Cloud computing has become a convenient technology widely used in industry, providing profit and fle...
Abstract — As vulnerabilities keep increasing exponentially every year, the need to efficiently clas...
Today, many products and solutions are provided on the cloud; however, the amount and financial loss...
[[abstract]]Cloud computing is a model for enabling convenient, on-demand network access to a shared...
Widespread deployment of the Internet enabled building of an emerging IT delivery model, i.e., cloud...
Cloud computing is becoming more and more popular, but security concerns overshadow its technical an...
Nowadays, the security of the Internet is always dressing severe challenges. To achieve network syst...
When a vulnerability is discovered in a system, some key questions often asked by the security analy...
When a vulnerability is discovered in a system, some key questions often asked by the security analy...
Nowadays, companies are increasingly using cloud-based platform for its convenience and flexibility....
As the usage of the Cloud proliferates, the need for security evaluation of the Cloud also grows. Th...
A multitude of issues affect the broader adoption of Cloud computing, with security arguably being a...
Today, many products and solutions are provided on the cloud; however, the amount and financial loss...
Cloud computing has become a convenient technology widely used in industry, providing profit and fle...
Critical Infrastructures (CIs) such as e-commerce, energy, transportation, defense, monitoring etc.,...
Cloud computing has become a convenient technology widely used in industry, providing profit and fle...
Abstract — As vulnerabilities keep increasing exponentially every year, the need to efficiently clas...
Today, many products and solutions are provided on the cloud; however, the amount and financial loss...
[[abstract]]Cloud computing is a model for enabling convenient, on-demand network access to a shared...
Widespread deployment of the Internet enabled building of an emerging IT delivery model, i.e., cloud...
Cloud computing is becoming more and more popular, but security concerns overshadow its technical an...
Nowadays, the security of the Internet is always dressing severe challenges. To achieve network syst...
When a vulnerability is discovered in a system, some key questions often asked by the security analy...
When a vulnerability is discovered in a system, some key questions often asked by the security analy...
Nowadays, companies are increasingly using cloud-based platform for its convenience and flexibility....
As the usage of the Cloud proliferates, the need for security evaluation of the Cloud also grows. Th...
A multitude of issues affect the broader adoption of Cloud computing, with security arguably being a...
Today, many products and solutions are provided on the cloud; however, the amount and financial loss...