Theoretical Perspective It Is a Dissertation

Total Length: 704 words ( 2 double-spaced pages)

Total Sources: 2

Page 1 of 2

Once this has been done in a thorough and global manner, comparative studies can be conducted in order to assess any similarities among the historical threats to determine measures to take against potential future threats.

Capelli and Moore (2011, p. 25) go a step further in suggesting that targeted research, not only on language, but on the security environment in general, will greatly assist in both predicting and preventing insider threats in the online world. The organization CERT (Computer Emergency Response Team), for example, is part of the Software Engineering Institute (SEI) at Carnegie Mellon University. The Team has investigated the problems and concerns surrounding insider cloud computing threats since 2001. During this investigation, a database of more than 300 criminal cases have been compiled where persons with online access to company information, such as former employees, contractors, or business partners have abused the access and trust placed upon them. Databases like these can assist in determining the common factors in the economic, psychological, financial, and technological backgrounds of the individuals found guilty of such crimes.
CERT, for example, have constructed models of the four main classes of insider cloud computing crimes, including it sabotage, intellectual property theft, espionage, and fraud. With the use of system dynamics techniques, these models can be used to determine the potential of future threats in order to prevent them.

In conclusion, cloud computing threats are a vital area of study in order to assess current threats and prevent future ones.

References

Cappelli, D. And Moore, a.P. (2011, Spring). Insider Threat Center at GERT Grows Solutions from Reality-Based Research. IAnewsletter, Vol. 13, No. 2. Retrieved from: http://iac.dtic.mil/iatac/download/Vol13_No2.pdf

Ho, S.M. And Lee, H. (n.d.) Journal of Wireless Mobile networks, Ubiquitous Computing, and Dependable Applications, vol. 3, no. 1/2. Retrieved from: http://isyou.info/jowua/papers/jowua-v3n12-6.pdf

Hori, Y., Claycomb, W., and Yim, K. (n.d.) Frontiers in Insider Threats and Data Leakage Prevention. Journal of Wireless Mobile networks, Ubiquitous Computing, and Dependable Applications, vol. 3, no. 1/2. Retrieved from: http://isyou.info/jowua/papers/jowua-v3n12-0.pdf.....

Need Help Writing Your Essay?