The Effect of Firewall Testing Types on Cloud Security Policies

  • Authors:
  • Annie Shebanow;Richard Perez;Caroline Howard

  • Affiliations:
  • Colorado Technical University, USA;Colorado Technical University, USA;Colorado Technical University, USA

  • Venue:
  • International Journal of Strategic Information Technology and Applications
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

An important aspect of security requirements is a firm understanding of the threats to systems so that specific defense mechanisms can be implemented. Globally scattered network systems and on-demand access to systems such as cloud computing require a high level of security, because the software and hardware of networks are integrated in vulnerable shared or outsourced environments. Hackers are relentless in finding new techniques to gain access to sensitive data. Securing infrastructures is a challenging task, but when researchers identify and investigate potential threats and create solutions, vulnerabilities may be reduced. The purpose of this paper is to explore how use, misuse, positive and negative, obstacle, and abuse testing cases of firewalls have broadened the security policies that mitigate or prevent threats in a cloud environment.