Title
Cloud security: Can the cloud be secured?
Abstract
Techniques used for attacking the legacy web applications are still valid on the cloud, but the legacy security methods are no longer valid. Welcome to the new world! Cloud computing is ubiquitous with ease of use, zero hardware issues, pay as you grow and other trendy terminologies. It is also perceived as being more secure on cloud. Does that mean there is no need for any penetration testing for cloud-based applications? If needed, what should be those set of tests, and which tools are best suited to perform these? How different is cloud security testing from the legacy three-tier architecture testing? It is a known fact that companies invest less when it comes to security. So what alternatives are we left with? These, among other questions are answered during the course of this white paper.
Year
Venue
Keywords
2012
ICITST
web applications,open source tools for security testing,pen testing,legacy security methods,cloud security,metasploit,cloud computing,wireless,software maintenance,backtrack,security on cloud,mobile,cloud based applications,security of data
DocType
ISSN
ISBN
Conference
2164-7046
978-1-4673-5325-0
Citations 
PageRank 
References 
0
0.34
0
Authors
2
Name
Order
Citations
PageRank
Kiran Karnad100.34
Saravanan Nagenthram200.34