Cobit 4.1
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
Proceedings of the 16th ACM conference on Computer and communications security
Cloud security is not (just) virtualization security: a short paper
Proceedings of the 2009 ACM workshop on Cloud computing security
Intrusion Detection in the Cloud
DASC '09 Proceedings of the 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing
Understanding Cloud Computing Vulnerabilities
IEEE Security and Privacy
Searching for processes and threads in Microsoft Windows memory dumps
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Trustworthy clouds underpinning the future internet
The future internet
SP 800-144. Guidelines on Security and Privacy in Public Cloud Computing
SP 800-144. Guidelines on Security and Privacy in Public Cloud Computing
Structured and Interoperable Logging for the Cloud Computing Era: The Pitfalls and Benefits
UCC '13 Proceedings of the 2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing
Computer Standards & Interfaces
Hi-index | 0.00 |
Security incident handling, an integral part of security management, treats detection and analysis of security incidents as well as the subsequent response (i.e., containment, eradication, and recovery.) Existing processes and methods for incident handling are geared towards infrastructures and operational models that will be increasingly outdated by cloud computing. This paper examines, how the changes introduced by cloud computing influence the incident handling process. It identifies problems that cloud customers encounter in each of the incident handling steps and provides possible approaches and corresponding challenges. The identified approaches provide guidance for cloud customers and cloud service providers towards effective incident handling in the cloud; the identified challenges may serve as basis for a research agenda in cloud incident handling.