Managing Risk in the Cloud

0Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this chapter, we focus only on the tier 3 security risk related to the operation and use of cloud-based information systems. To prevent and mitigate any threats, adverse actions, service disruptions, attacks, or compromises, organizations need to quantify their residual risk below the threshold of the acceptable level of risk.

Cite

CITATION STYLE

APA

Iorga, M., & Karmel, A. (2016). Managing Risk in the Cloud. In Cloud Computing Security: Foundations and Challenges (pp. 79–86). CRC Press. https://doi.org/10.1201/9781315372112-19

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free