Recommended Actions
Tobias Ackermann
Additional contact information
Tobias Ackermann: Fachgebiet Wirtschaftsinformatik TU Darmstadt
Chapter Chapter 5 in IT Security Risk Management, 2013, pp 127-140 from Springer
Abstract:
Abstract Based on the results of this thesis, recommended actions for Cloud Computing users and the four phases of their IT risk management process. These advises are presented in sections 5.1 to 5.4. Additionally, we provide recommended actions for providers of Cloud Computing services in section 5.5.
Keywords: Cloud Computing; Potential Loss; Intrusion Detection System; Recommended Action; Security Risk (search for similar items in EconPapers)
Date: 2013
References: Add references at CitEc
Citations:
There are no downloads for this item, see the EconPapers FAQ for hints about obtaining it.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:spr:sprchp:978-3-658-01115-4_5
Ordering information: This item can be ordered from
http://www.springer.com/9783658011154
DOI: 10.1007/978-3-658-01115-4_5
Access Statistics for this chapter
More chapters in Springer Books from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().