The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Three approaches exist for a company to migrate its services in the cloud. The first is select the most appropriate commercial cloud provider, such as Microsoft, Amazon, Google or SalesForce, and to rent their resources and deploy its services. These cloud service providers The second approach is to build a private cloud with some of the open source cloud frameworks like Eucalyptus, OpenStack, OpenNebula...
Mitigating security threats is a big challenge for network administrator, because threats can be exploited by attackers and lead to a cyber-attack. Therefore, network administrator should spend budget to eliminate vulnerabilities and prevent attacks. Removing all the vulnerabilities is not cost-effective and in some cases impractical. The primary goal of this paper is to prioritize network nodes based...
Penetration Testing is a security research and study of exploitation methods with counter measures to protect web applications from attacks and intruders. It is the art of exploiting the weakness that has been identified in the system under test. Identifying the insecure areas is the major task; the goal is to protect sensitive and the valuable data. All the safety vulnerabilities which are present...
Measuring the attack damage cost and monitoring the sequence of privilege escalations play a critical role in choosing the right countermeasure by Intrusion Response System (IRS). The existing attack damage cost evaluation approaches inherit some limitations, such as neglecting the dependencies between system assets, ignoring the backward damage of exploited non-goal services, or omitting the potential...
Cloud computing has emerged as an increasingly popular means of delivering IT-enabled business services and a potential technology resource choice for many private and government organizations in today's rapidly changing computing environment. Consequently, as cloud computing technology, functionality and usability expands unique security vulnerabilities and treats requiring timely attention arise...
Cloud computing delivery model can significantly reduce enterprise IT costs and complexities. This technology can handle the rapidly gowning environment and provide more flexible resources sharing and hence it has become as anew information technology infrastructure recently. In contrast to traditional enterprise IT solution, cloud computing moves the application software and databases to the servers...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.