In this chapter, we focus only on the tier 3 security risk related to the operation and use of cloud-based information systems. To prevent and mitigate any threats, adverse actions, service disruptions, attacks, or compromises, organizations need to quantify their residual risk below the threshold of the acceptable level of risk.
CITATION STYLE
Iorga, M., & Karmel, A. (2016). Managing Risk in the Cloud. In Cloud Computing Security: Foundations and Challenges (pp. 79–86). CRC Press. https://doi.org/10.1201/9781315372112-19
Mendeley helps you to discover research relevant for your work.