Methodology of Vulnerability Assessment for Various Types of Cloud Structures
PDF

Keywords

cloud computing, information security threats, attack, damage, system vulnerability assessment, factor counteracting

How to Cite

Tsaregorodtsev, A., Zelenina, A., & Ružický, E. (2023). Methodology of Vulnerability Assessment for Various Types of Cloud Structures. Information Technology Applications, 6(1), 51–59. Retrieved from https://www.itajournal.com/index.php/ita/article/view/98

Abstract

Today organizations increasingly consider cloud computing as an alternative way of using information technology. At the same time, the use of different vulnerabilities of infrastructure components, network services and applications remains are the major threat to the cloud. The article proposes a methodology of vulnerability assessment for any type of cloud structures, which will allow to determine the coefficient of counter to possible attacks and to correlate the amount of damage to the total cost of ownership of IT-infrastructure of organization.

PDF
Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright (c) 2017 International Journal of Information Technology Applications